2008 | ||
---|---|---|
29 | EE | Soonhak Kwon, Taekyoung Kwon, Young-Ho Park: New Hardware Architecture for Multiplication over GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography. IEICE Transactions 91-A(1): 236-243 (2008) |
28 | EE | Taek-Young Youn, Young-Ho Park, Taekyoung Kwon, Soonhak Kwon, Jongin Lim: Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications. IEICE Transactions 91-D(5): 1481-1484 (2008) |
27 | EE | Taek-Young Youn, Young-Ho Park, Changhan Kim, Jongin Lim: Weakness in a RSA-based password authenticated key exchange protocol. Inf. Process. Lett. 108(6): 339-342 (2008) |
2007 | ||
26 | EE | Woong-Kee Loh, Young-Ho Park, Yong-Ik Yoon: Fast Recognition of Asian Characters Based on Database Methodologies. BNCOD 2007: 37-48 |
25 | EE | Young-Ho Park, Hwangjun Song, KyungKeun Lee, CheolSoo Kim, Sanggon Lee, Sang-Jae Moon: Secure Route Discovery Protocol for Ad Hoc Networks. IEICE Transactions 90-A(2): 539-541 (2007) |
2006 | ||
24 | EE | Young-Ho Park, Yong-Ik Yoon, Jong-Woo Lee: A Filtered Retrieval Technique for Structural Information. ICHIT 2006: 219-228 |
23 | EE | Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim: An Efficient ID-Based Delegation Network. OTM Workshops (1) 2006: 382-391 |
22 | EE | Hee Jung Lee, Young-Ho Park, Taekyoung Kwon: Partial Key Exposure Attacks on Unbalanced RSA with the CRT. IEICE Transactions 89-A(2): 626-629 (2006) |
21 | EE | Dong-Guk Han, Katsuyuki Okeya, Tae-Hyun Kim, Yoon Sung Hwang, Beomin Kim, Young-Ho Park: Enhanced Exhaustive Search Attack on Randomized BSD Type Countermeasure. IEICE Transactions 89-A(5): 1316-1327 (2006) |
20 | EE | KyungKeun Lee, Young-Ho Park, Sang-Jae Moon: Cryptanalysis on the Robust and Simple Authentication Protocol for Secure Communication on the Web. IEICE Transactions 89-A(6): 1859-1862 (2006) |
19 | EE | Young-Ho Park, Kyu-Young Whang, Byung Suk Lee, Wook-Shin Han: Efficient evaluation of linear path expressions on large-scale heterogeneous XML documents using information retrieval techniques. Journal of Systems and Software 79(2): 180-190 (2006) |
2005 | ||
18 | EE | Sosun Kim, Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim: A Fast Inversion Algorithm and Low-Complexity Architecture over GF(2m). CIS (2) 2005: 1-8 |
17 | EE | Young-Ho Park, Kyu-Young Whang, Byung Suk Lee, Wook-Shin Han: Efficient Evaluation of Partial Match Queries for XML Documents Using Information Retrieval Techniques. DASFAA 2005: 95-112 |
16 | EE | Dong Jin Yang, Chang Han Kim, Young-Ho Park, Yongtae Kim, Jongin Lim: Modified Sequential Normal Basis Multipliers for Type II Optimal Normal Bases. ICCSA (2) 2005: 647-656 |
15 | EE | Soonhak Kwon, Taekyoung Kwon, Young-Ho Park: New Architecture for Multiplication in GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography. ICISC 2005: 335-351 |
14 | EE | Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim: A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm. ISC 2005: 288-299 |
13 | EE | Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim: An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism. Selected Areas in Cryptography 2005: 144-158 |
12 | EE | Sanggon Lee, Yvonne Hitchcock, Young-Ho Park, Sang-Jae Moon: Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. Selected Areas in Cryptography 2005: 205-220 |
11 | EE | Soonhak Kwon, Taekyoung Kwon, Young-Ho Park: Efficient Linear Array for Multiplication over NIST Recommended Binary Fields. WILF 2005: 427-436 |
10 | EE | Hwangjun Song, Sun Chung, Young-Ho Park: An Online Face Recognition System Using Multiple Compressed Images over the Internet. WISE 2005: 569-576 |
9 | EE | Kyung Hyune Rhee, Young-Ho Park, Gene Tsudik: A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks. J. Inf. Sci. Eng. 21(2): 415-428 (2005) |
2004 | ||
8 | EE | Dong-Guk Han, Katsuyuki Okeya, Tae-Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan Jung: Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. ACNS 2004: 398-413 |
7 | EE | Young-Ho Park, Deukjo Hong, Hichun Eun: On the Linear Complexity of Some Generalized Cyclotomic Sequences. IJAC 14(4): 431-439 (2004) |
2003 | ||
6 | EE | Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park, Chang Han Kim, Heuisu Ryu: Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains. ACISP 2003: 67-78 |
2002 | ||
5 | EE | Dong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee, Hyungjin Yang: A Practical Approach Defeating Blackmailing. ACISP 2002: 464-481 |
4 | EE | Young-Ho Park, Sangtae Jeong, Jongin Lim: Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms. EUROCRYPT 2002: 197-208 |
3 | EE | Young-Ho Park, Sangho Oh, Sangjin Lee, Jongin Lim, Maenghee Sung: An Improved Method of Multiplication on Certain Elliptic Curves. Public Key Cryptography 2002: 310-322 |
2 | EE | Young-Ho Park, Sangtae Jeong, Chang Han Kim, Jongin Lim: An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves. Public Key Cryptography 2002: 323-334 |
1 | EE | Dong-Guk Han, Ki Soon Yoon, Young-Ho Park, Chang Han Kim, Jongin Lim: Optimal Extension Fields for XTR. Selected Areas in Cryptography 2002: 369-384 |