Mr. GEUMTAE KIM | Cryptography Award | Best Researcher Award
Ph.D. candidate, Seoul National University, South Korea
Geumtae Kim is a dedicated Ph.D. candidate at Seoul National University, specializing in the Department of Electrical and Computer Engineering. Guided by Prof. Jong-Seon No, he focuses on advancing the fields of cryptography and secure computing. With a strong academic foundation, Geumtae’s research centers on innovative cryptographic techniques, including post-quantum cryptography and homomorphic encryption. His contributions are marked by publications in prominent journals and conferences, showcasing his commitment to cutting-edge research in cybersecurity.
Publication Profile
Education
Geumtae Kim began his academic journey at Pohang University of Science and Technology (POSTECH), earning a Bachelor of Science in Electrical Engineering in 2019. Pursuing further excellence, he joined Seoul National University in 2019, where he is currently advancing his expertise as a Ph.D. candidate in Electrical and Computer Engineering.
Experience
Since 2019, Geumtae has been immersed in research at Seoul National University under the mentorship of Prof. Jong-Seon No. His work emphasizes cryptographic algorithms and systems that enhance digital security. With years of rigorous study and hands-on experience, he continues to contribute significantly to the fields of cryptography and encryption.
Research Interests
Geumtae’s research is driven by a passion for creating robust security solutions in the digital age. His primary interests include cryptography, post-quantum cryptography, and homomorphic encryption. These focus areas aim to address the emerging challenges of quantum computing and ensure the confidentiality and integrity of sensitive data.
Awards
While specific awards were not provided, Geumtae’s consistent publication record in peer-reviewed journals and conferences highlights his recognition within the academic and research communities. His work reflects a strong commitment to excellence and innovation in cryptography.
Publications
Lazy Modular Reduction for NTT
Masked Ciphertext Comparison without Masking Conversions Using Register Rotation and Chinese Remainder Theorem