Daejeon, South Korea

Kyung Hee Oh

USPTO Granted Patents = 1 

Average Co-Inventor Count = 6.0

ph-index = 1


Company Filing History:


Years Active: 2013

Loading Chart...
1 patent (USPTO):Explore Patents

Title: Innovator Kyung Hee Oh: Pioneering Symmetric Key Encryption

Introduction: Kyung Hee Oh is a notable inventor hailing from Daejeon, South Korea. With a keen mind for cryptography and security, she has made significant contributions to the field, particularly in the realm of encryption technologies. Her work is exemplified through a patented innovation specifically designed to counteract power analysis attacks, which are critical in safeguarding sensitive information.

Latest Patents: Kyung Hee Oh holds one patent titled "Method for implementing symmetric key encryption algorithm against power analysis attacks." This invention provides a robust method for executing a symmetric key encryption algorithm that effectively mitigates risks associated with power analysis attacks. The method involves generating and storing an affine transform table, a masked inversion table, and operating a masked S-box utilizing both tables to enhance security in encryption processes.

Career Highlights: Kyung Hee Oh is currently employed at the Electronics and Telecommunications Research Institute, where she continues to advance her research and development in information security. Her expertise in implementing cryptographic algorithms places her at the forefront of innovation in the technology sector.

Collaborations: Throughout her career, Kyung Hee Oh has collaborated with esteemed colleagues such as Doo Ho Choi and Yong-Je Choi. These collaborations contribute to a dynamic exchange of ideas and research efforts, ultimately leading to the development of more sophisticated encryption techniques.

Conclusion: Kyung Hee Oh's innovative approach to encryption and her proactive contributions to information security underscore her role as a pivotal figure in the field. Her patent not only signifies a personal achievement but also enhances the broader landscape of cybersecurity, exemplifying the critical need for advancements that safeguard data integrity in an increasingly interconnected world.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…