{"id":19921018,"url":"https://github.com/hacker-code-j/hacker-code-j","last_synced_at":"2026-03-04T16:02:13.417Z","repository":{"id":153411367,"uuid":"614377067","full_name":"Hacker-Code-J/Hacker-Code-J","owner":"Hacker-Code-J","description":"Who am I?","archived":false,"fork":false,"pushed_at":"2025-12-05T08:02:36.000Z","size":102,"stargazers_count":0,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-12-08T16:29:15.117Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Hacker-Code-J.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2023-03-15T13:17:36.000Z","updated_at":"2025-12-05T08:02:40.000Z","dependencies_parsed_at":"2023-11-03T19:31:01.811Z","dependency_job_id":"6329eec3-44c1-47c8-993e-8e77b8ae467e","html_url":"https://github.com/Hacker-Code-J/Hacker-Code-J","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/Hacker-Code-J/Hacker-Code-J","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hacker-Code-J%2FHacker-Code-J","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hacker-Code-J%2FHacker-Code-J/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hacker-Code-J%2FHacker-Code-J/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hacker-Code-J%2FHacker-Code-J/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Hacker-Code-J","download_url":"https://codeload.github.com/Hacker-Code-J/Hacker-Code-J/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hacker-Code-J%2FHacker-Code-J/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":30085818,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-03-04T15:40:14.053Z","status":"ssl_error","status_checked_at":"2026-03-04T15:40:13.655Z","response_time":59,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-11-12T22:06:32.069Z","updated_at":"2026-03-04T16:02:13.401Z","avatar_url":"https://github.com/Hacker-Code-J.png","language":null,"readme":"\u003cdiv align=\"center\"\u003e\n\n\u003ch1 align=\"center\"\u003e Welcome to Hacker-Code-J's Hub :octocat: \n   \u003ca href=\"https://www.githubwrapped.io/Hacker-Code-J\"\u003e\n    \u003cimg src=\"https://img.shields.io/badge/GitHub%20Trends-2024-9cf?style=for-the-badge\u0026logo=github\" alt=\"GitHub Trends\"\u003e\n  \u003c/a\u003e\n\u003c/h1\u003e\n\u003ch3 align=\"center\"\u003e Department of Information Security, Cryptology and Mathematics\u003c/h3\u003e\n\u003c!-- \u003ch3 align=\"center\"\u003e Kookmin University, Seoul, Repulic of Korea \u003c/h3\u003e --\u003e\n\u003ch3 align=\"center\"\u003e\n\n[![Hits](https://myhits.vercel.app/api/hit/https%3A%2F%2Fgithub.com%2FHacker-Code-J?color=green\u0026label=Hits\u0026size=medium)](https://myhits.vercel.app)\n  \n\u003c!-- \u003cp align=\"center\"\u003e --\u003e\n\u003c!--  \u003ca href=\"https://www.linkedin.com/in/yong-hyeon-ji\"\u003e\u003cimg src=\"https://img.shields.io/badge/-LinkedIn-blue?style=flat\u0026logo=Linkedin\u0026logoColor=white\"\u003e\u003c/a\u003e --\u003e\n\u003c!--  \u003ca href=\"mailto:hacker3740@gmail.com\"\u003e\u003cimg src=\"https://img.shields.io/badge/-Email-D14836?style=flat\u0026logo=Gmail\u0026logoColor=white\"\u003e\u003c/a\u003e --\u003e\n\u003c!-- \u003c/p\u003e --\u003e\n\n\u003c/div\u003e\n\n---\n\n## \u003cspan style=\"color:#ffa500;\"\u003eAbout Me\u003c/span\u003e :man_technologist:\n\nHello! 👋\n\nI'm Ji Yong-Hyeon, deeply passionate about Mathematics and Cryptography. My academic path is driven by a profound interest in the complexities of cryptographic systems. What really captivates me is the design and implementation side of cryptography, where I aim to blend theoretical insights with practical solutions.\n\nMy goal is to be a frontrunner in both theoretical and engineering aspects of this field. I strongly believe in the power of combining theoretical knowledge with practical know-how to spur innovations in cryptography. To this end, I'm constantly engaged in projects and research that push my boundaries and enhance my skills.\n\nOn my GitHub, you'll find my contributions to a variety of cryptography-related projects. My work spans from theoretical studies to crafting cryptographic algorithms and systems. I'm always keen on collaborating on projects that challenge and deepen our grasp of cryptographic concepts.\n\nIf you're keen on cryptography, mathematics, or looking for a collaboration, don't hesitate to get in touch!\n\n## \u003cspan style=\"color:#f8b88b;\"\u003eTechnologies \u0026 Tools\u003c/span\u003e :wrench:\n\n\u003c!-- ![](https://img.shields.io/badge/Code-JavaScript-yellow) --\u003e\n\u003c!-- ![](https://img.shields.io/badge/Tools-Docker-blue) --\u003e\n\u003c!-- Add more badges from https://shields.io/ --\u003e\n\n\u003cdiv align=\"center\"\u003e\n\n\u003ctable width=\"100%\" style=\"border-collapse: collapse;\"\u003e\n  \u003ctr\u003e\n    \u003c!-- First Column --\u003e\n    \u003ctd valign=\"top\" style=\"padding: 0;\"\u003e\n         \u003cimg src=\"https://img.shields.io/badge/Language-Assembly-6E4C13?style=flat\u0026logo=cpu\u0026logoColor=white\"\u003e\u003cbr\u003e\n         \u003cimg src=\"https://img.shields.io/badge/Language-C-A8B9CC?style=flat\u0026logo=C\u0026logoColor=black\"\u003e\u003cbr\u003e\n         \u003cimg src=\"https://img.shields.io/badge/Language-Rust-DEA584?style=flat\u0026logo=Rust\u0026logoColor=white\"\u003e\u003cbr\u003e\n         \u003cimg src=\"https://img.shields.io/badge/Language-Haskell-5D4F85?style=flat\u0026logo=Haskell\u0026logoColor=white\"\u003e\u003cbr\u003e\n         \u003cimg src=\"https://img.shields.io/badge/Language-OCaml-EF7A0D?style=flat\u0026logo=OCaml\u0026logoColor=white\"\u003e\u003cbr\u003e\n         \u003cimg src=\"https://img.shields.io/badge/Language-Python-3776AB?style=flat\u0026logo=Python\u0026logoColor=white\"\u003e\u003cbr\u003e\n         \u003cimg src=\"https://img.shields.io/badge/Language-SageMath-800442?style=flat\u0026logo=Python\u0026logoColor=white\"\u003e\u003cbr\u003e\n         \u003cimg src=\"https://img.shields.io/badge/Language-TeX-008080?style=flat\u0026logo=LaTeX\u0026logoColor=white\"\u003e\u003cbr\u003e\n        \u003c!-- Add more badges or content here --\u003e\n    \u003c/td\u003e\n    \u003c!-- Second Column --\u003e\n    \u003ctd valign=\"top\" style=\"padding: 0;\"\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Tool-Linux-000000?style=flat\u0026logo=linux\u0026logoColor=white\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Tool-NeoVim-57A143?style=flat\u0026logo=neovim\u0026logoColor=white\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Tool-Git-F05032?style=flat\u0026logo=git\u0026logoColor=white\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Tool-GitHub-181717?style=flat\u0026logo=github\u0026logoColor=white\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Tool-Visual%20Studio%20Code-007ACC?style=flat\u0026logo=visual-studio-code\u0026logoColor=white\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Tool-ChatGPT--4-AB68FF?style=flat\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Tool-AutoGPT-FF4500?style=flat\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Tool-Ollama-FF69B4?style=flat\"\u003e\u003cbr\u003e\n      \u003c!-- \u003cimg src=\"https://img.shields.io/badge/Tool-AutoGPT-EE69A4?style=flat\"\u003e\u003cbr\u003e --\u003e\n      \u003c!-- Add more badges or content here --\u003e\n    \u003c/td\u003e\n    \u003c!-- Third Column --\u003e\n    \u003ctd valign=\"top\" style=\"padding: 0;\"\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Productivity-Obsidian-483699?style=flat\u0026logo=obsidian\u0026logoColor=white\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Productivity-Eraser-FFC0CB?style=flat\u0026logo=diagramsdotnet\u0026logoColor=white\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Productivity-TeXStudio-3D6117?style=flat\u0026logo=latex\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Productivity-Notion-000000?style=flat\u0026logo=notion\u0026logoColor=white\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Productivity-Discord-5865F2?style=flat\u0026logo=discord\u0026logoColor=white\"\u003e\u003cbr\u003e\n      \u003c!-- Add more badges or content here --\u003e\n    \u003c/td\u003e\n  \u003c/tr\u003e\n\u003c/table\u003e\n\n\u003ctable width=\"100%\" style=\"border-collapse: collapse;\"\u003e\n    \u003c!-- Fourth Column --\u003e\n    \u003ctd valign=\"top\" style=\"padding: 0;\"\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Mathematics-Set%20Theory-4e79a7?style=flat\u0026logo=influxdb\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Mathematics-Number%20Theory-9467bd?style=flat\u0026logo=influxdb\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Mathematics-Abstract%20Algebra-1f77b4?style=flat\u0026logo=influxdb\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Mathematics-Calculus-2ca02c?style=flat\u0026logo=influxdb\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Mathematics-Linear%20Algebra-FFA07A?style=flat\u0026logo=influxdb\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Mathematics-Probability%20Theory-17becf?style=flat\u0026logo=influxdb\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Mathematics-Statistics-167f7f?style=flat\u0026logo=influxdb\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Mathematics-Analysis-167f7f?style=flat\u0026logo=influxdb\"\u003e\u003cbr\u003e\n      \u003c!-- Add more badges or content here --\u003e\n    \u003c/td\u003e\n    \u003c!-- Fiveth Column --\u003e\n    \u003ctd valign=\"top\" style=\"padding: 0;\"\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Cryptography-Symmetric%20Key%20Cryptography-5050f3?style=flat\u0026logo=cryptpad\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Cryptography-Public%20Key%20Cryptography-0077CC?style=flat\u0026logo=cryptpad\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Cryptography-Cryptanalysis-CC0000?style=flat\u0026logo=cryptpad\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Cryptography-Hash%20Functions-00008B?style=flat\u0026logo=cryptpad\"\u003e\u003cbr\u003e\n      \u003cimg src=\"https://img.shields.io/badge/Cryptography-Discrete%20Logarithm-800080?style=flat\u0026logo=cryptpad\"\u003e\u003cbr\u003e\n      \u003c!-- Add more badges or content here --\u003e\n    \u003c/td\u003e\n  \u003c/tr\u003e\n\u003c/table\u003e\n\n\u003c/div\u003e\n\n## \u003cspan style=\"color:#9acd32;\"\u003eStatistics\u003c/span\u003e :bar_chart:\n\n\u003cp align=\"center\"\u003e\n  \u003ctable width=\"100%\" style=\"table-layout: fixed;\"\u003e\n    \u003c!-- New row for the first and second images side by side --\u003e\n    \u003ctr\u003e\n      \u003c!-- First image on the left --\u003e\n      \u003ctd width=\"50%\"\u003e\n        \u003cimg src=\"https://github-readme-stats.vercel.app/api?username=Hacker-Code-J\u0026show_icons=true\u0026theme=tokyo\" alt=\"Hacker-Code-J's GitHub Stats\" width=\"100%\" style=\"max-height: 300px; display: block; object-fit: contain;\" /\u003e\n      \u003c/td\u003e\n      \u003c!-- Second image on the right --\u003e\n      \u003ctd width=\"50%\"\u003e\n        \u003cimg src=\"https://github-readme-streak-stats.herokuapp.com/?user=Hacker-Code-J\u0026theme=tokyo\" alt=\"Hacker-Code-J's GitHub Streak\" width=\"100%\" style=\"max-height: 300px; display: block; object-fit: contain;\" /\u003e\n      \u003c/td\u003e\n    \u003c/tr\u003e\n    \u003c!-- New row for the GitHub Trends image on the left and empty space on the right --\u003e\n    \u003ctr\u003e\n      \u003c!-- GitHub Trends image on the left --\u003e\n      \u003ctd width=\"50%\"\u003e\n        \u003cimg src=\"https://api.githubtrends.io/user/svg/Hacker-Code-J/repos?time_range=three_months\u0026group=other\u0026loc_metric=changed\u0026theme=classic\" alt=\"Hacker-Code-J's GitHub Trends\" width=\"100%\" style=\"display: block; object-fit: contain;\" /\u003e\n      \u003c/td\u003e\n      \u003c!-- Empty cell on the right --\u003e\n      \u003ctd width=\"50%\"\u003e\n        \u003cimg src=\"https://github-readme-stats.vercel.app/api/top-langs/?username=Hacker-Code-J\u0026langs_count=5\u0026theme=tokyo\" alt=\"Hacker-Code-J's Top Languages\" width=\"100%\" style=\"display: block; object-fit: contain;\" /\u003e         \n      \u003c/td\u003e\n    \u003c/tr\u003e\n  \u003c/table\u003e\n\u003c/p\u003e\n\n---\n\n## Core Competencies 💡\n- **Cryptographic Algorithm Implementation:** Proficient in the hands-on implementation of complex cryptographic algorithms, ensuring high performance and robust security.\n  \n- **Algorithm Analysis \u0026 Validation:** Adept at conducting rigorous analysis and validation of cryptographic algorithms to ensure their integrity and resistance to various attack vectors.\n\n- **Optimization for Constrained Environments:** Specialized in optimizing cryptographic solutions for environments with limited computational resources, balancing efficiency and security.\n\n- **Mathematical Proficiency:** Solid foundation in mathematical concepts pertinent to cryptography, enabling effective problem-solving and algorithmic design.\n\n---\n\n\u003c/div\u003e\n\n## \u003cspan style=\"color:#8a2be2;\"\u003eFeatured Projects\u003c/span\u003e :trophy:\n\n\u003c!-- Showcase your best repositories here \n- 🔭 [Innovative Project 1](https://github.com/Hacker-Code-J/project-1)\n- 🌱 [Creative Project 2](https://github.com/Hacker-Code-J/project-2)\n- 👯 [Collaborative Project 3](https://github.com/Hacker-Code-J/project-3)--\u003e\n\n\u003c/div\u003e\n\n## \u003cspan style=\"color:#ff4500;\"\u003eConnect with Me\u003c/span\u003e :handshake:\n\n\u003c!-- Social icons section --\u003e\n\u003cp align=\"center\"\u003e\n  \u003c!-- \u003ca href=\"https://linkedin.com/in/Hacker-Code-J\"\u003e\u003cimg src=\"https://img.icons8.com/fluent/48/000000/linkedin.png\"/\u003e\u003c/a\u003e --\u003e\n  \u003c!-- \u003ca href=\"https://twitter.com/Hacker-Code-J\"\u003e\u003cimg src=\"https://img.icons8.com/fluent/48/000000/twitter.png\"/\u003e\u003c/a\u003e --\u003e\n  \u003ca href=\"mailto:hacker3740@gmail.com\"\u003e\u003cimg src=\"https://img.icons8.com/fluent/48/000000/gmail.png\"/\u003e\u003c/a\u003e\n\u003c/p\u003e\n\n\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fhacker-code-j%2Fhacker-code-j","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fhacker-code-j%2Fhacker-code-j","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fhacker-code-j%2Fhacker-code-j/lists"}