Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/hacker-code-j/myobsidiannote

The Second Brain
https://github.com/hacker-code-j/myobsidiannote

obsidian

Last synced: about 1 month ago
JSON representation

The Second Brain

Awesome Lists containing this project

README

        

---
title: "MyObsidianNote"
description: "The Second Brain."
author: "Ji, Yong-hyeon"
date: "2024-09-06"
version: "1.0.0"
license: "MIT"
tags:
- github
repository: "https://github.com/Hacker-Code-J/MyObsidianNote"
status: "Active"
categories:
- The-Second-Brain
- Zettelkasten
---

# MyObsidianNote

## Career Highlights 🌟

### Kongju University - Information Security Gifted Education Center 🏅
- **Best Completion Award (2016 & 2017)**
- Recognized for outstanding performance and commitment to excellence in the specialized curriculum focused on advanced cryptographic techniques and information security principles. Demonstrated exceptional skills in problem-solving, mathematical analysis, and the practical application of cryptographic concepts.

### Crypto & Security Engineering Lab - Undergraduate Research Student Internship (2024. 01 ~ 02) 🔍
- **LEA Implementation and Verification**
- Engaged in the practical implementation of the Lightweight Encryption Algorithm (LEA), focusing on optimizing performance and ensuring robust security. Conducted thorough verification processes to validate the algorithm's effectiveness against various cryptographic attacks.
- **AES Implementation and Validation**
- Implemented the Advanced Encryption Standard (AES) algorithm, with a keen focus on ensuring the integrity, confidentiality, and authenticity of information. Performed comprehensive validation tests to assess the strength and reliability of the implementation under diverse scenarios.
- **AES 32-bit Optimal Implementation**
- Developed an optimal 32-bit implementation of AES, aiming to enhance computational efficiency while maintaining the highest security standards. This implementation is tailored for systems with limited resources, demonstrating my ability to optimize cryptographic solutions in constrained environments.
- **Big Number Operation on P-256**

### Crypto & Security Engineering Lab - Undergraduate Research Students (2024. 03 ~ ) 🧮
- **Cryptol**
- **EasyCrypt**

### Crypto & Security Engineering Lab - Graduate Research Students (2025. 03 ~ ) 🧮