{"id":19921064,"url":"https://github.com/hacker-code-j/myobsidiannote","last_synced_at":"2025-05-03T06:31:17.983Z","repository":{"id":212596086,"uuid":"731860231","full_name":"Hacker-Code-J/MyObsidianNote","owner":"Hacker-Code-J","description":"The Second Brain","archived":false,"fork":false,"pushed_at":"2024-04-13T16:01:13.000Z","size":76231,"stargazers_count":4,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2024-04-14T07:43:50.268Z","etag":null,"topics":["obsidian"],"latest_commit_sha":null,"homepage":"","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Hacker-Code-J.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null}},"created_at":"2023-12-15T03:41:28.000Z","updated_at":"2024-04-15T14:08:34.762Z","dependencies_parsed_at":"2024-04-15T14:18:36.625Z","dependency_job_id":null,"html_url":"https://github.com/Hacker-Code-J/MyObsidianNote","commit_stats":null,"previous_names":["hacker-code-j/myobsidianmemo","hacker-code-j/myobsidiannote"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hacker-Code-J%2FMyObsidianNote","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hacker-Code-J%2FMyObsidianNote/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hacker-Code-J%2FMyObsidianNote/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Hacker-Code-J%2FMyObsidianNote/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Hacker-Code-J","download_url":"https://codeload.github.com/Hacker-Code-J/MyObsidianNote/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":252154738,"owners_count":21702983,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["obsidian"],"created_at":"2024-11-12T22:06:37.211Z","updated_at":"2025-05-03T06:31:12.974Z","avatar_url":"https://github.com/Hacker-Code-J.png","language":null,"readme":"---\ntitle: \"MyObsidianNote\"\ndescription: \"The Second Brain.\"\nauthor: \"Ji, Yong-hyeon\"\ndate: \"2024-09-06\"\nversion: \"1.0.0\"\nlicense: \"MIT\"\ntags:\n  - github\nrepository: \"https://github.com/Hacker-Code-J/MyObsidianNote\"\nstatus: \"Active\"\ncategories:\n  - The-Second-Brain\n  - Zettelkasten\n---\n\n# MyObsidianNote\n\n## \u003cspan style=\"color:#8a2be2;\"\u003eCareer Highlights\u003c/span\u003e 🌟\n\n### Kongju University - Information Security Gifted Education Center 🏅\n- **Best Completion Award (2016 \u0026 2017)**\n  - Recognized for outstanding performance and commitment to excellence in the specialized curriculum focused on advanced cryptographic techniques and information security principles. Demonstrated exceptional skills in problem-solving, mathematical analysis, and the practical application of cryptographic concepts.\n\n### Crypto \u0026 Security Engineering Lab - Undergraduate Research Student Internship (2024. 01 ~ 02) 🔍\n- **LEA Implementation and Verification**\n  - Engaged in the practical implementation of the Lightweight Encryption Algorithm (LEA), focusing on optimizing performance and ensuring robust security. Conducted thorough verification processes to validate the algorithm's effectiveness against various cryptographic attacks.\n- **AES Implementation and Validation**\n  - Implemented the Advanced Encryption Standard (AES) algorithm, with a keen focus on ensuring the integrity, confidentiality, and authenticity of information. Performed comprehensive validation tests to assess the strength and reliability of the implementation under diverse scenarios.\n- **AES 32-bit Optimal Implementation**\n  - Developed an optimal 32-bit implementation of AES, aiming to enhance computational efficiency while maintaining the highest security standards. This implementation is tailored for systems with limited resources, demonstrating my ability to optimize cryptographic solutions in constrained environments.\n- **Big Number Operation on P-256**\n\n### Crypto \u0026 Security Engineering Lab - Undergraduate Research Students (2024. 03 ~ ) 🧮\n- **Cryptol**\n- **EasyCrypt**\n\n### Crypto \u0026 Security Engineering Lab - Graduate Research Students (2025. 03 ~ ) 🧮\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fhacker-code-j%2Fmyobsidiannote","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fhacker-code-j%2Fmyobsidiannote","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fhacker-code-j%2Fmyobsidiannote/lists"}