Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kyoil Chung is active.

Publication


Featured researches published by Kyoil Chung.


workshop on information security applications | 2004

Hyperelliptic curve coprocessors on a FPGA

Ho Won Kim; Thomas J. Wollinger; Yong-Je Choi; Kyoil Chung; Christof Paar

Cryptographic algorithms are used in a large variety of different applications to ensure security services. It is, thus, very interesting to investigate various implementation platforms. Hyperelliptic curve schemes are cryptographic primitives to which a lot of attention was recently given due to the short operand size compared to other algorithms. They are specifically interesting for special-purpose hardware. This paper provides a comprehensive investigation of high-efficient HEC architectures. We propose a genus-2 hyperelliptic curve cryptographic coprocessor using affine coordinates. We implemented a special class of hyperelliptic curves, namely using the parameter h(x)=x and f=x5+f1x+f0 and the base field GF(289). In addition, we only consider the most frequent case in our implementation and assume that the other cases are handled, e.g. by the protocol. We provide three different implementations ranging from high speed to moderate area. Hence, we provide a solution for a variety of applications. Our high performance HECC coprocessor is 78.5% faster than the best previous implementation and our low area implementation utilizes only 22.7% of the area that the smallest published design uses. Taking into account both area and latency, our coprocessor is an order of magnitude more efficient than previous implementations. We hope that the work at hand provides a step towards introducing HEC systems in practical applications.


international symposium on consumer electronics | 2006

Design of an Extended Architecture for Secure Low-Cost 900MHz UHF Mobile RFID Systems

Namje Park; Howon Kim; Kyoil Chung; Sungwon Sohn

The mobile RFID (radio frequency identification) is a technology for developing a RFID reader embedded in a mobile terminal and providing various application services over wireless networks. Various security issues-Inter domain security, privacy, authentication, E2E (end-to-end) security, and untraceability etc.-need to be addressed before the widespread use of mobile RFID. Low cost mobile RFID systems are increasingly being deployed in industry and m-commerce. These contactless devices have raised public concern regarding violation of privacy and information security. There is a growing need in the mobile RFID community to discover and develop techniques and methods to overcome several problems posed by the above-mentioned concerns. This paper presents proposals on feasible security mechanisms for low-cost mobile RFID systems and analyses them from both security and privacy points of view


signal-image technology and internet-based systems | 2007

Design of Embedded Multimodal Biometric Systems

Jang-Hee Yoo; Jong-Gook Ko; Yun-Su Chung; Sung-Uk Jung; Ki Hyun Kim; Kiyoung Moon; Kyoil Chung

The embedded devices in biometrics have gained increasing attention due to the demand for reliable and cost-effective personal identification systems. However, the current available embedded devices are not suitable for the real-time implementation of a biometric application system because of the limited computational resource and memory space. In this paper, we describe the design of embedded biometric systems that identify person by using face-fingerprint or iris-fingerprint multimodal biometrics technology. To implement real-time system, the biometric algorithms are efficiently enhanced for fixed-point representation and optimized for memory and computational capacity. In addition, the most time consuming components of each biometric algorithm are implemented in a field programmable gate arrays (FPGA).


computational intelligence | 2006

Face Recognition with Multiscale Data Fusion of Visible and Thermal Images

Sangwoo Moon; Seong G. Kong; Jang-hee Yoo; Kyoil Chung

This paper presents face recognition with activity level fusion of visible and thermal image using multiscale decomposition. Image fusion combines images with different features to obtain a single composite image with extended information for better recognition performance. The proposed fusion technique adoptively controls the fusion ratio between visible and thermal information with multiscale analysis. Experimental results demonstrate that the proposed method effectively overcomes the weaknesses of visible and thermal images. The performance of the fusion is evaluated by classification rate with support vector machines


international conference on computational science and its applications | 2006

XML-signcryption based LBS security protocol acceleration methods in mobile distributed computing

Namje Park; Howon Kim; Kyoil Chung; Sungwon Sohn; Dongho Won

This paper describes the open security architecture for LBS (Location- based Services) platform ensuring interoperability among the wireless networks and various location-based application services and the functional security requirements for the LBS platform. The goal of this paper is to investigate how well the most limited wireless devices can make use of LBS security services. In this paper, we suggest security acceleration methods for high speed open LBS using XML signcryption mechanism. And proposed secure LBS security protocols allows a client to offload mobile certificate handling to the server and to enable the central administration of privacy polices. The idea is to create a signcryption technique for software based XML signature acceleration.


international conference on advanced communication technology | 2006

The design of dynamic authorization model for user centric service in mobile environment

Byung-Gil Lee; Howon Kim; Kyoil Chung

Diameter protocol provides authentication, authorization, and accounting service for mobile node which request network access. In addition, diameter protocol should provide authorization service for efficient resource management. The AAA system for authorization was suggested before, but the real-time environments and context service of user are not reflected. This paper suggests a new AAA model for the user centric and real-time based dynamic authorization service. The user centric and dynamic authorization means user customized and real-time authorization service between user and network for service mode of multi-wireless system, version of IP network, quality of service and security etc. These user centric authorization services give a guideline for ubiquitous network service


workshop on information security applications | 2003

A Location Privacy Protection Mechanism for Smart Space

Yeong-Sub Cho; Sangrae Cho; Daeseon Choi; Seung-Hun Jin; Kyoil Chung; Cheehang Park

Ubicomp (Ubiquitous Computing) makes computers ubiquitous in anywhere and anytime, and so provides users with seamless services. In this paper, we present a user location privacy protection mechanism for Smart Space which is a feasible Ubicomp environment. At first, we present a feasible Ubicomp use scenario and define Smart Space to support this derived scenario. Then, we analyze security requirements for Smart Space and derive conceptual security model for that Space. Among the conceptual security model, we focus on user location privacy protection. In order to protect user location privacy, we propose a location privacy protection mechanism based on policy. We classify the policy as user policy and space policy and present policy resolution mechanism to resolve policy conflicts. Further we present system configuration to execute the proposed mechanism.


Healthcare Informatics Research | 2010

Review of Semantically Interoperable Electronic Health Records for Ubiquitous Healthcare

Kyung Hoon Hwang; Kyoil Chung; Myung-Ae Chung; Duck-Joo Choi

In order to provide more effective and personalized healthcare services to patients and healthcare professionals, intelligent active knowledge management and reasoning systems with semantic interoperability are needed. Technological developments have changed ubiquitous healthcare making it more semantically interoperable and individual patient-based; however, there are also limitations to these methodologies. Based upon an extensive review of international literature, this paper describes two technological approaches to semantically interoperable electronic health records for ubiquitous healthcare data management: the ontology-based model and the information, or openEHR archetype model, and the link to standard terminologies such as SNOMED-CT.


international conference on web engineering | 2005

A security acceleration using XML signcryption scheme in mobile grid web services

Namje Park; Kiyoung Moon; Kyoil Chung; Dongho Won; Yuliang Zheng

Todays grid architecture encompasses a far greater breadth of applications than the traditional grid, which focused on distributed applications processing large amounts of data. Newer grid applications are more data-centric and more focused on distributed services. As these trends, mobile internet and the grid, are likely to find each other the resource constraints that wireless devices pose today affect the level of interoperability between them. The goal of this paper is to investigate how well the most limited wireless devices can make the use of grid security services. This paper describes a novel security approach on fast mobile grid services based on current mobile web services platform environment using XML signcryption mechanism.


international symposium on consumer electronics | 2007

Home Device Authentication Method in Ubiquitous Environment

Yun-Kyung Lee; Jong-Wook Han; Kyoil Chung

The home network is most based in our life and occupies many parts in the life. So the security at the home network is very important factor foe secure life. Moreover, device authentication supplies user convenience for the home network service user because it can replace the user authentication according to the used home network service. And the safety of the home network can be more strengthened by considering the device authentication in addition to an authentication and access control about the home network user. In this paper, we describe home device authentication which is the basic and essential element in the home network security. We propose home device authentication framework, home device registration and certificate issuing method, and home device certificate profile. Our home device certificate profile is based on the Internet X.509 certificate. And our device authentication concept can offer home network service users convenience and security.

Collaboration


Dive into the Kyoil Chung's collaboration.

Top Co-Authors

Avatar

Howon Kim

Pusan National University

View shared research outputs
Top Co-Authors

Avatar

Dowon Hong

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Namje Park

Jeju National University

View shared research outputs
Top Co-Authors

Avatar

Sungwon Sohn

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jong-Wook Han

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Kiyoung Moon

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Sung-Ik Jun

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Byungho Chung

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yun-Kyung Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge