
{"id":6136,"date":"2019-08-10T21:49:58","date_gmt":"2019-08-10T12:49:58","guid":{"rendered":"http:\/\/infosec.pusan.ac.kr\/?p=6136"},"modified":"2025-12-23T19:51:15","modified_gmt":"2025-12-23T10:51:15","slug":"%ec%82%ac%eb%ac%bc%ec%9d%b8%ed%84%b0%eb%84%b7%ec%9a%a9-%eb%b3%b4%ec%95%88-%ec%b9%a9-%ea%b0%9c%eb%b0%9caes-aria-lea-ecc-cryptochip","status":"publish","type":"post","link":"https:\/\/infosec.pusan.ac.kr\/index.php\/6136\/","title":{"rendered":"\uc0ac\ubb3c\uc778\ud130\ub137\uc6a9 \ubcf4\uc548 \uce69 \uac1c\ubc1c(AES, ARIA, LEA, ECC Cryptochip)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5238\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2017\/07\/temp_1515392963944100.gif\" alt=\"\" width=\"600\" height=\"366\" \/><\/p>\n<p>\u2013 \uc0ac\ubb3c\uc778\ud130\ub137\uc6a9 \uacbd\ub7c9 \uc554\ud638 \uae30\uc220 \uc5f0\uad6c(Lightweight Cryptography for Resource Constrained IoT Device)<br \/>\n\u2013 \ucc28\uc138\ub300 \uc591\uc790\ud6c4 \uc554\ud638 \uae30\uc220 \uc5f0\uad6c(Next Generation Post-Quantum Cryptography)<br \/>\n\u2013 \uc554\ud638 \uc54c\uace0\ub9ac\uc998(Simon, AES, LEA, ARIA, ECC \ub4f1) \ucd5c\uc801\ud654 \uc5f0\uad6c(Optimal Implementation on Crypto-algorithms)<br \/>\n\u2013 \uc0ac\ubb3c\uc778\ud130\ub137 \ud50c\ub7ab\ud3fc \ubcf4\uc548 \uae30\uc220 \uc5f0\uad6c(OneM2M, LwM2M, TLS, DTLS \uad6c\ud604 \ubc0f \ucd5c\uc801\ud654 \uc5f0\uad6c)<br \/>\n\u2013 \uc0ac\ubb3c\uc778\ud130\ub137 \ubcf4\uc548 \uce69 \uae30\uc220 \uc5f0\uad6c(Hardware Implementation of Crypto Hardware: FPGA \uad6c\ud604 \ubc0f ASIC \uad6c\ud604)<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u2013 \uc0ac\ubb3c\uc778\ud130\ub137\uc6a9 \uacbd\ub7c9 \uc554\ud638 \uae30\uc220 \uc5f0\uad6c(Lightweight Cryptography for Resource Constrained IoT Device) \u2013 \ucc28\uc138\ub300 \uc591\uc790\ud6c4 \uc554\ud638 \uae30\uc220 \uc5f0\uad6c(Next Generation Post-Quantum Cryptography) \u2013 \uc554\ud638 \uc54c\uace0\ub9ac\uc998(Simon, AES, LEA, ARIA, ECC \ub4f1) \ucd5c\uc801\ud654 \uc5f0\uad6c(Optimal Implementation on Crypto-algorithms) \u2013 \uc0ac\ubb3c\uc778\ud130\ub137 \ud50c\ub7ab\ud3fc \ubcf4\uc548 \uae30\uc220 \uc5f0\uad6c(OneM2M, LwM2M, TLS, DTLS \uad6c\ud604 \ubc0f \ucd5c\uc801\ud654 \uc5f0\uad6c) \u2013 \uc0ac\ubb3c\uc778\ud130\ub137 \ubcf4\uc548 \uce69 \uae30\uc220 \uc5f0\uad6c(Hardware Implementation of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5238,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[140,138],"tags":[],"class_list":["post-6136","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kimhaeyong_research_project","category-kimhaeyong_research"],"_links":{"self":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/6136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/comments?post=6136"}],"version-history":[{"count":2,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/6136\/revisions"}],"predecessor-version":[{"id":9365,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/6136\/revisions\/9365"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/media\/5238"}],"wp:attachment":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/media?parent=6136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/categories?post=6136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/tags?post=6136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}