2008 |
29 | EE | Soonhak Kwon,
Taekyoung Kwon,
Young-Ho Park:
New Hardware Architecture for Multiplication over GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography.
IEICE Transactions 91-A(1): 236-243 (2008) |
28 | EE | Taek-Young Youn,
Young-Ho Park,
Taekyoung Kwon,
Soonhak Kwon,
Jongin Lim:
Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications.
IEICE Transactions 91-D(5): 1481-1484 (2008) |
27 | EE | Taek-Young Youn,
Young-Ho Park,
Changhan Kim,
Jongin Lim:
Weakness in a RSA-based password authenticated key exchange protocol.
Inf. Process. Lett. 108(6): 339-342 (2008) |
2007 |
26 | EE | Woong-Kee Loh,
Young-Ho Park,
Yong-Ik Yoon:
Fast Recognition of Asian Characters Based on Database Methodologies.
BNCOD 2007: 37-48 |
25 | EE | Young-Ho Park,
Hwangjun Song,
KyungKeun Lee,
CheolSoo Kim,
Sanggon Lee,
Sang-Jae Moon:
Secure Route Discovery Protocol for Ad Hoc Networks.
IEICE Transactions 90-A(2): 539-541 (2007) |
2006 |
24 | EE | Young-Ho Park,
Yong-Ik Yoon,
Jong-Woo Lee:
A Filtered Retrieval Technique for Structural Information.
ICHIT 2006: 219-228 |
23 | EE | Taek-Young Youn,
Young-Ho Park,
Chang Han Kim,
Jongin Lim:
An Efficient ID-Based Delegation Network.
OTM Workshops (1) 2006: 382-391 |
22 | EE | Hee Jung Lee,
Young-Ho Park,
Taekyoung Kwon:
Partial Key Exposure Attacks on Unbalanced RSA with the CRT.
IEICE Transactions 89-A(2): 626-629 (2006) |
21 | EE | Dong-Guk Han,
Katsuyuki Okeya,
Tae-Hyun Kim,
Yoon Sung Hwang,
Beomin Kim,
Young-Ho Park:
Enhanced Exhaustive Search Attack on Randomized BSD Type Countermeasure.
IEICE Transactions 89-A(5): 1316-1327 (2006) |
20 | EE | KyungKeun Lee,
Young-Ho Park,
Sang-Jae Moon:
Cryptanalysis on the Robust and Simple Authentication Protocol for Secure Communication on the Web.
IEICE Transactions 89-A(6): 1859-1862 (2006) |
19 | EE | Young-Ho Park,
Kyu-Young Whang,
Byung Suk Lee,
Wook-Shin Han:
Efficient evaluation of linear path expressions on large-scale heterogeneous XML documents using information retrieval techniques.
Journal of Systems and Software 79(2): 180-190 (2006) |
2005 |
18 | EE | Sosun Kim,
Nam Su Chang,
Chang Han Kim,
Young-Ho Park,
Jongin Lim:
A Fast Inversion Algorithm and Low-Complexity Architecture over GF(2m).
CIS (2) 2005: 1-8 |
17 | EE | Young-Ho Park,
Kyu-Young Whang,
Byung Suk Lee,
Wook-Shin Han:
Efficient Evaluation of Partial Match Queries for XML Documents Using Information Retrieval Techniques.
DASFAA 2005: 95-112 |
16 | EE | Dong Jin Yang,
Chang Han Kim,
Young-Ho Park,
Yongtae Kim,
Jongin Lim:
Modified Sequential Normal Basis Multipliers for Type II Optimal Normal Bases.
ICCSA (2) 2005: 647-656 |
15 | EE | Soonhak Kwon,
Taekyoung Kwon,
Young-Ho Park:
New Architecture for Multiplication in GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography.
ICISC 2005: 335-351 |
14 | EE | Nam Su Chang,
Chang Han Kim,
Young-Ho Park,
Jongin Lim:
A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm.
ISC 2005: 288-299 |
13 | EE | Taek-Young Youn,
Young-Ho Park,
Chang Han Kim,
Jongin Lim:
An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism.
Selected Areas in Cryptography 2005: 144-158 |
12 | EE | Sanggon Lee,
Yvonne Hitchcock,
Young-Ho Park,
Sang-Jae Moon:
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves.
Selected Areas in Cryptography 2005: 205-220 |
11 | EE | Soonhak Kwon,
Taekyoung Kwon,
Young-Ho Park:
Efficient Linear Array for Multiplication over NIST Recommended Binary Fields.
WILF 2005: 427-436 |
10 | EE | Hwangjun Song,
Sun Chung,
Young-Ho Park:
An Online Face Recognition System Using Multiple Compressed Images over the Internet.
WISE 2005: 569-576 |
9 | EE | Kyung Hyune Rhee,
Young-Ho Park,
Gene Tsudik:
A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks.
J. Inf. Sci. Eng. 21(2): 415-428 (2005) |
2004 |
8 | EE | Dong-Guk Han,
Katsuyuki Okeya,
Tae-Hyun Kim,
Yoon Sung Hwang,
Young-Ho Park,
Souhwan Jung:
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits.
ACNS 2004: 398-413 |
7 | EE | Young-Ho Park,
Deukjo Hong,
Hichun Eun:
On the Linear Complexity of Some Generalized Cyclotomic Sequences.
IJAC 14(4): 431-439 (2004) |
2003 |
6 | EE | Dong-Guk Han,
Nam Su Chang,
Seok Won Jung,
Young-Ho Park,
Chang Han Kim,
Heuisu Ryu:
Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains.
ACISP 2003: 67-78 |
2002 |
5 | EE | Dong-Guk Han,
Hye-Young Park,
Young-Ho Park,
Sangjin Lee,
Dong Hoon Lee,
Hyungjin Yang:
A Practical Approach Defeating Blackmailing.
ACISP 2002: 464-481 |
4 | EE | Young-Ho Park,
Sangtae Jeong,
Jongin Lim:
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms.
EUROCRYPT 2002: 197-208 |
3 | EE | Young-Ho Park,
Sangho Oh,
Sangjin Lee,
Jongin Lim,
Maenghee Sung:
An Improved Method of Multiplication on Certain Elliptic Curves.
Public Key Cryptography 2002: 310-322 |
2 | EE | Young-Ho Park,
Sangtae Jeong,
Chang Han Kim,
Jongin Lim:
An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves.
Public Key Cryptography 2002: 323-334 |
1 | EE | Dong-Guk Han,
Ki Soon Yoon,
Young-Ho Park,
Chang Han Kim,
Jongin Lim:
Optimal Extension Fields for XTR.
Selected Areas in Cryptography 2002: 369-384 |