dblp.uni-trier.dewww.uni-trier.de

Kee-Young Yoo

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
176EEEun-Jun Yoon, Kee-Young Yoo: Enhanced Three-Round Smart Card-Based Key Exchange Protocol. ATC 2008: 507-515
175EESang-Eon Lee, Sang-Ho Shin, Geum-Dal Park, Kee-Young Yoo: Wireless Sensor Network Protocols for Secure and Energy-Efficient Data Transmission. CISIM 2008: 157-162
174EESang-Eon Lee, Sang-Ho Shin, Geum-Dal Park, Kee-Young Yoo: Wireless Sensor Network Protocols for Secure and Energy-Efficient Data Transmission. CISIM 2008: 157-162
173EEKi-Jong Kim, Ki-Hyun Jung, Kee-Young Yoo: A High Capacity Data Hiding Method Using PVD and LSB. CSSE (3) 2008: 876-879
172EEJin-Yong Byun, Ki-Hyun Jung, Kee-Young Yoo: Improved Data Hiding Method by Block Parity for Binary Images. CSSE (3) 2008: 931-934
171EESang-Ho Shin, Geum-Dal Park, Kee-Young Yoo: A Virtual Three-Dimension Cellular Automata Pseudorandom Number Generator Based on the Moore Neighborhood Method. ICIC (2) 2008: 174-181
170EEEun-Jun Yoon, Kee-Young Yoo: Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce. ICIC (3) 2008: 533-540
169EEJae-Gil Yu, Eun-Joon Yoon, Sang-Ho Shin, Kee-Young Yoo: A New Image Steganography Based on 2k Correction and Edge-Detection. ITNG 2008: 563-568
168EESe-Min Kim, Gil-Je Lee, Kee-Young Yoo: Palette and Index Change Technique for Steganoraphy Based on an Indexcolor. ITNG 2008: 569-574
167EEEun-Jun Yoon, Eun-Jung Lee, Kee-Young Yoo: Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. ITNG 2008: 575-580
166EEEun-Jun Yoon, Kee-Young Yoo: A New Key Agreement Protocol Based on Chaotic Maps. KES-AMSTA 2008: 897-906
165EEEun-Jun Yoon, Kee-Young Yoo: An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography. MUE 2008: 87-91
164EEEun-Jun Yoon, Kee-Young Yoo: An Efficient Authentication and Key Agreement Protocol in RFID System. NPC 2008: 320-326
163EEEun-Jun Yoon, Kee-Young Yoo: Improving the Host Authentication Mechanism for POD Copy Protection System. New Directions in Intelligent Interactive Multimedia 2008: 373-383
162EEEun-Jun Yoon, Kee-Young Yoo: Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem. Fundam. Inform. 87(3-4): 483-492 (2008)
161EEJun-Cheol Jeon, Kee-Young Yoo: Montgomery exponent architecture based on programmable cellular automata. Mathematics and Computers in Simulation 79(4): 1189-1196 (2008)
160EEJun-Cheol Jeon, Kee-Young Yoo: Elliptic curve based hardware architecture using cellular automata. Mathematics and Computers in Simulation 79(4): 1197-1203 (2008)
2007
159EEEun-Jun Yoon, Kee-Young Yoo: A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices. APWeb/WAIM Workshops 2007: 612-623
158EEEun-Jun Yoon, Kee-Young Yoo: A Secret-Key Exponential Key Agreement Protocol with Smart Cards. ATC 2007: 430-440
157EEEun-Jun Yoon, Kee-Young Yoo: Token-Based Authenticated Key Establishment Protocols for Three-Party Communication. EUC Workshops 2007: 758-769
156EEEun-Jun Yoon, Kee-Young Yoo: Vulnerability of User Identification and Key Agreement Protocol with User Anonymity. FGCN (1) 2007: 516-521
155EEEun-Jun Yoon, Kee-Young Yoo: Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement. FGCN (2) 2007: 66-70
154EEEun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo: Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols. ICCSA (1) 2007: 926-936
153EEEun-Jun Yoon, Kee-Young Yoo: Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. ICIC (3) 2007: 1103-1109
152EEEun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo: Secure PAP-Based RADIUS Protocol in Wireless Networks. ICIC (3) 2007: 689-694
151EEJai-Boo Oh, Eun-Jun Yoon, Kee-Young Yoo: An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings. ISPA 2007: 446-456
150EEKi-Hyun Jung, Jae-Gil Yu, Se-Min Kim, Ki-Jong Kim, Jin-Yong Byun, Kee-Young Yoo: The Hiding of Secret Data Using the Run Length Matching Method. KES-AMSTA 2007: 1027-1034
149EEZhen-Ai Jin, Hyun-Ju Cho, Kee-Young Yoo: An Efficient Authentication Protocol for Low-Cost RFID Systems. KES-AMSTA 2007: 999-1006
148 Hyun-Jin Park, Eun-Jun Yoon, Kee-Young Yoo: A New Steganography Scheme using a Frame. Security and Management 2007: 118-122
147 Se-Min Kim, Jun-Cheol Jeon, Byung-Heon Kang, Sang-Ho Shin, Kee-Young Yoo: Non-linear and Non-group Cellular Automata for Cryptographic Applications. Security and Management 2007: 432-438
146 Nu-El Choi, Eun-Jun Yoon, Hyun-Jin Park, Kee-Young Yoo: Visual Multi-Secret Sharing Scheme with Cheater Identification. Security and Management 2007: 90-96
145EEEun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo: Secure Remote User Authentication Scheme Using Bilinear Pairings. WISTP 2007: 102-114
144EEJun-Cheol Jeon, Kee-Young Yoo: Programmable cellular automata based Montgomery hardware architecture. Applied Mathematics and Computation 186(1): 915-922 (2007)
143EEJun-Cheol Jeon, Kee-Young Yoo: Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns. Applied Mathematics and Computation 186(2): 1423-1428 (2007)
142EEEun-Jun Yoon, Kee-Young Yoo: Comments on Modified User Friendly Remote Authentication Scheme with Smart Cards. IEICE Transactions 90-B(2): 331-333 (2007)
141EEKee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo: Efficient and secure password authentication schemes for low-power devices. IJSNet 2(1/2): 77-81 (2007)
2006
140EEByung-Heon Kang, Jun-Cheol Jeon, Kee-Young Yoo: Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition. ACRI 2006: 104-111
139EEJun-Cheol Jeon, Kee-Young Yoo: Cellular Automata Based Role-Delegation in RBAC. ACRI 2006: 588-594
138EEJun-Cheol Jeon, Kee-Young Yoo: Authentication Based on Singular Cellular Automata. ACRI 2006: 605-610
137EEEun-Jun Yoon, Kee-Young Yoo: Improving the ID-Based Key Exchange Protocol in Wireless Mobile Ad Hoc Networks. ADHOC-NOW 2006: 349-354
136EEEun-Jun Yoon, Kee-Young Yoo: A Secure Password-Authenticated Key Exchange Between Clients with Different Passwords. APWeb Workshops 2006: 659-663
135EEEun-Jun Yoon, Kee-Young Yoo: Enhanced Forward-Secure User Authentication Scheme with Smart Cards. EuroPKI 2006: 197-206
134EEEun-Jun Yoon, Kee-Young Yoo: An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card. EuroPKI 2006: 45-53
133EEEun-Jun Yoon, Kee-Young Yoo: Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks. ICCSA (1) 2006: 1156-1165
132EEEun-Jun Yoon, Kee-Young Yoo: An Improved Popescu's Authenticated Key Agreement Protocol. ICCSA (5) 2006: 276-283
131EEEun-Jun Yoon, Kee-Young Yoo: One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity. ICCSA (5) 2006: 303-311
130EEJun-Cheol Jeon, Kee-Young Yoo: Conflict Detection in Role-Based Access Control Using Multiple-Attractor Cellular Automata. ICIC (1) 2006: 533-541
129EEByung-Heon Kang, Jun-Cheol Jeon, Kee-Young Yoo: Evolutionary Algorithms for Group/Non-group Decision in Periodic Boundary CA. ICNC (1) 2006: 629-632
128EEJai-Boo Oh, Jun-Cheol Jeon, Kee-Young Yoo: Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. ISPA Workshops 2006: 57-64
127EEEun-Jun Yoon, Kee-Young Yoo: An Optimized Two Factor Authenticated Key Exchange Protocol in PWLANs. International Conference on Computational Science (2) 2006: 1000-1007
126EEJun-Cheol Jeon, Kee-Won Kim, Byung-Heon Kang, Kee-Young Yoo: Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware. International Conference on Computational Science (3) 2006: 329-336
125EEJun-Cheol Jeon, Kee-Won Kim, Jai-Boo Oh, Kee-Young Yoo: Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA. International Conference on Computational Science (4) 2006: 661-668
124EEJun-Cheol Jeon, Byung-Heon Kang, Se-Min Kim, Wan-Soo Lee, Kee-Young Yoo: An Improvement of Remote User Authentication Scheme Using Smart Cards. MSN 2006: 416-423
123EEEun-Jun Yoon, Kee-Young Yoo: Biometrics Authenticated Key Agreement Scheme. NGITS 2006: 345-349
122EEEun-Jun Yoon, Kee-Young Yoo: Improving the Dynamic ID-Based Remote Mutual Authentication Scheme. OTM Workshops (1) 2006: 499-507
121EEJun-Cheol Jeon, Eun-Yeung Choi, Kee-Young Yoo: Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks. PRIMA 2006: 807-812
120EEEun-Jun Yoon, Kee-Young Yoo: Efficient Mutual Authentication Scheme with Smart Card. PRIMA 2006: 813-818
119EEEun-Jun Yoon, Kee-Young Yoo: An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority. SOFSEM 2006: 548-555
118EEEun-Jun Yoon, Kee-Young Yoo: An Optimizing Authenticated Key Exchange Protocol for Self-organizing Sensor Networks. UCS 2006: 537-546
117EEEun-Jun Yoon, Kee-Young Yoo: A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting. WISI 2006: 165-166
2005
116 Hee-Jung Yoon, Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo: A Secure One-Time Password Authentication Using Cellular Automata. CAINE 2005: 376-381
115 Hye-Jin Yang, Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo: New Authentication Scheme with No Verification Table. CAINE 2005: 387-389
114EEEun-Jun Yoon, Kee-Young Yoo: New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange. CANS 2005: 147-160
113EEEun-Jun Yoon, Kee-Young Yoo: New Efficient Simple Authenticated Key Agreement Protocol. COCOON 2005: 945-954
112EEEun-Jun Yoon, Kee-Young Yoo: Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem. EUC Workshops 2005: 586-591
111EEEun-Jun Yoon, Kee-Young Yoo: A New Simple Authenticated Key Agreement and Protected Password Change Protocol. EUC Workshops 2005: 955-964
110EEEun-Jun Yoon, Kee-Young Yoo: An Efficient Password Authentication Schemes Without Using the Server Public Key for Grid Computing. GCC 2005: 149-154
109EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Optimized Initiation Phases for Anonymous Auction Protocols. Human.Society@Internet 2005: 19-27
108EEEun-Jun Yoon, Kee-Young Yoo: Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity. ICICS 2005: 315-322
107EEEun-Jun Yoon, Kee-Young Yoo: New Multi-server Password Authentication Scheme Using Neural Networks. ICNC (2) 2005: 512-519
106EEJun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo: Evolutionary Hardware Architecture for Division in Elliptic Curve Cryptosystems over GF(2n). ICNC (3) 2005: 348-355
105EEEun-Jun Yoon, Kee-Young Yoo: More Efficient and Secure Remote User Authentication Scheme using Smart Cards. ICPADS (2) 2005: 73-77
104EEEun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo: Robust and Simple Authentication Protocol for Secure Communication on the Web. ICWE 2005: 352-362
103EEWoo-Hun Kim, Kee-Young Yoo: Group-Oriented Channel Protection for Mobile Devices in Digital Multimedia Broadcasting. ISCIS 2005: 103-112
102EEWoo-Hun Kim, Kee-Young Yoo: New Anonymous User Identification and Key Establishment Protocol in Distributed Networks. IWDC 2005: 410-415
101EEEun-Jun Yoon, Kee-Young Yoo: A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems. KES (3) 2005: 332-338
100EEEun-Jun Yoon, Kee-Young Yoo: Robust Authenticated Encryption Scheme with Message Linkages. KES (4) 2005: 281-288
99EEJun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo: Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks. MADNES 2005: 110-116
98EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Secure Protected Password Change Scheme. MMM-ACNS 2005: 472-477
97EEJun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo: Low-Complexity Authentication Scheme Based on Cellular Automata in Wireless Network. MSN 2005: 413-421
96EEKee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo: Efficient and Secure Password Authentication Schemes for Low-Power Devices. MSN 2005: 73-82
95EEEun-Jun Yoon, Kee-Young Yoo: Robust Secret Key Based Authentication Scheme Using Smart Cards. PCM (2) 2005: 723-734
94 Eun-Jun Yoon, Jae-Hyung Jung, Woo-Hun Kim, Kee-Young Yoo: A Secret Key Based Authentication Scheme Using Smart Cards. Security and Management 2005: 65-71
93 Eun-Jun Yoon, Eun-Kyung Ryu, Woo-Hun Kim, Kee-Young Yoo: Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms. Security and Management 2005: 72-78
92EEEun-Jun Yoon, Woo-Hun Kim, Kee-Young Yoo: Security Enhancement for Password Authentication Schemes with Smart Cards. TrustBus 2005: 311-320
91EEEun-Jun Yoon, Kee-Young Yoo: Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards. WINE 2005: 405-413
90EEWoo-Hun Kim, Eun-Jun Yoon, Kee-Young Yoo: New Authentication Protocol Providing User Anonymity in Open Network. WINE 2005: 414-423
89EESung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo: Improvement of Lee and Lee's authenticated key agreement scheme. Applied Mathematics and Computation 162(3): 1049-1053 (2005)
88EESung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo: Improvement of HWWM-authenticated key agreement protocol. Applied Mathematics and Computation 162(3): 1315-1320 (2005)
87EEKee-Won Kim, Eun-Kyung Ryu, Kee-Young Yoo: Cryptanalysis of Lee-Lee authenticated key agreement scheme. Applied Mathematics and Computation 163(1): 193-198 (2005)
86EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Fixing problems in Lin et al.'s OSPA protocol. Applied Mathematics and Computation 166(1): 46-57 (2005)
85EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm. Applied Mathematics and Computation 167(1): 274-280 (2005)
84EESung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo: Efficient nonce-based remote user authentication scheme using smart cards. Applied Mathematics and Computation 167(1): 355-361 (2005)
83EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Improvement of Chien-Jan's authenticated multiple-key agreement protocol without using conventional one-way function. Applied Mathematics and Computation 167(1): 711-715 (2005)
82EEEun-Kyung Ryu, Jae-Yuel Im, Kee-Young Yoo: Security of Tseng-Jan's conference key distribution system. Applied Mathematics and Computation 167(2): 833-839 (2005)
81EESung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo: Efficient verifier-based key agreement protocol for three parties without server's public key. Applied Mathematics and Computation 167(2): 996-1003 (2005)
80EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme. Applied Mathematics and Computation 168(2): 788-794 (2005)
79EEEun-Jun Yoon, Kee-Young Yoo: On the security of Wu-Lin's robust key authentication scheme. Applied Mathematics and Computation 169(1): 1-7 (2005)
78EEEun-Jun Yoon, Kee-Young Yoo: Weakness and solution of Yang et al.'s protected password changing scheme. Applied Mathematics and Computation 169(1): 295-304 (2005)
77EEKee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo: An improvement on Yang et al.'s password authentication schemes. Applied Mathematics and Computation 170(1): 207-215 (2005)
76EEEun-Jun Yoon, Kee-Young Yoo: Cryptanalysis of Zhang-Xiao's multisignature scheme for specified group of verifiers. Applied Mathematics and Computation 170(1): 226-229 (2005)
75EEEun-Kyung Ryu, Kee-Young Yoo: On the security of efficient user identification scheme. Applied Mathematics and Computation 171(2): 1201-1205 (2005)
74EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: An improvement of Hwang-Lee-Tang's simple remote user authentication scheme. Computers & Security 24(1): 50-56 (2005)
73EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards. IEICE Transactions 88-A(1): 319-321 (2005)
72EEEun-Jun Yoon, Kee-Young Yoo: Cryptanalysis of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. IEICE Transactions 88-B(6): 2627-2628 (2005)
71EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Attacks and Solutions of Yang et al.'s Protected Password Changing Scheme. Informatica, Lith. Acad. Sci. 16(2): 285-294 (2005)
2004
70EEJeung-Seop Kim, Hyo-Chul Kim, Kyeoung Ju Ha, Kee-Young Yoo: One Round Identity-Based Authenticated Conference Key Agreement Protocol. ECUMN 2004: 407-416
69EEWon-Ho Lee, Keon-Jik Lee, Kee-Young Yoo: New Digit-Serial Systolic Arrays for Power-Sum and Division Operation in GF(2m). ICCSA (3) 2004: 638-647
68EEKyo-Min Ku, Kyeoung Ju Ha, Wi Hyun Yoo, Kee-Young Yoo: Parallel Montgomery Multiplication and Squaring over GF(2m) Based on Cellular Automata. ICCSA (4) 2004: 196-205
67EEEun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo: An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack. ICCSA (4) 2004: 603-610
66EESung-Woon Lee, Woo-Hun Kim, Hyun-Sung Kim, Kee-Young Yoo: Efficient Password-Based Authenticated Key Agreement Protocol. ICCSA (4) 2004: 617-626
65EEKee-Young Yoo, Eun-Kyung Ryu, Jae-Yuel Im: Multiparty Key Agreement Protocol with Cheater Identification Based on Shamir Secret Sharing. ICCSA (4) 2004: 655-664
64EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Security of Shen et al.'s Timestamp-Based Password Authentication Scheme. ICCSA (4) 2004: 665-671
63EEKee-Won Kim, Eun-Kyung Ryu, Kee-Young Yoo: ID-Based Authenticated Multiple-Key Agreement Protocol from Pairings. ICCSA (4) 2004: 672-680
62EENam-Yeun Kim, Kee-Young Yoo: Digit-Serial AB2 Systolic Array for Division in GF(2m). ICCSA (4) 2004: 87-96
61EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: Robust Remote User Authentication Scheme. ICOIN 2004: 935-942
60EEEun-Kyung Ryu, Eun-Jun Yoon, Kee-Young Yoo: An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. NETWORKING 2004: 1458-1463
59EEJun-Cheol Jeon, Kee-Young Yoo: An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields. PRICAI 2004: 241-250
58 Yong-Seok Kim, Jun-Cheol Jeon, Jin-woo Jeon, Kee-Young Yoo: An Efficient Access Control Model Based on User-Classification and Role-Division. Security and Management 2004: 300-304
57EEHyun-Sung Kim, Kee-Young Yoo: AOP arithmetic architectures over GF(2m). Applied Mathematics and Computation 158(1): 7-18 (2004)
56EESung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo: Cryptanalysis of a user authentication scheme using hash functions. Operating Systems Review 38(1): 24-28 (2004)
55EEEun-Jun Yoon, Eun-Kyung Ryu, Kee-Young Yoo: A secure user authentication scheme using hash functions. Operating Systems Review 38(2): 62-68 (2004)
54EEJung-Seuk Lee, Jun-Cheol Jeon, Kee-Young Yoo: A security scheme for protecting security policies in firewall. Operating Systems Review 38(2): 69-72 (2004)
2003
53 Kee-Won Kim, Eun-Kyung Ryu, Hyung-Mok Lee, Kee-Young Yoo: A New Authenticated Key Agreement Protocol. CAINE 2003: 91-94
52 Kyo-Min Ku, Kyeoung Ju Ha, Hyun-Sung Kim, Kee-Young Yoo: New AB2 Multiplier over GF(2m) using Cellular Automata. Computers and Their Applications 2003: 283-286
51 Woo-Hun Kim, Hyun-Sung Kim, Sung-Woon Lee, Kee-Young Yoo: Secure Authenticated Key Exchange Protocol. Computers and Their Applications 2003: 5-8
50 Hyoung-Mok Lee, Eun-Kyung Ryu, Kee-Won Kim, Jae-Min Lee, Kee-Young Yoo: A Robust Authenticated Key Agreement Protocol. Computers and Their Applications 2003: 76-79
49 Nam-Yeun Kim, Kee-Young Yoo: Look-Up Table-based Montgomery Algorithm in GF(2k) for Public-Key Cryptosystem. Computers and Their Applications 2003: 9-12
48EENam-Yeun Kim, Kee-Young Yoo: Montgomery Multiplication and Squaring Algorithms in GF(2k). ICCSA (1) 2003: 865-874
47EEKyo-Min Ku, Kyeoung Ju Ha, Kee-Young Yoo: Time-Space Efficient Exponentiation over GF(2m). ICCSA (1) 2003: 875-882
46EEWon-Ho Lee, Young-Jun Heo, Kee-Young Yoo: Efficient Architecture for Exponentiation and Division in GF(2m) Using Irreducible AOP. ICCSA (1) 2003: 883-892
45EEJun-Cheol Jeon, Kee-Young Yoo: Computational Algorithm and Architecture for AB2 Multiplication in Finite Fields. ICCSA (1) 2003: 947-956
44EEEun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo: A Promising Key Agreement Protocol. ISAAC 2003: 655-662
43 Hun-Joong Bae, Hyun-Sung Kim, Kee-Young Yoo: ID-based Key Exchange Protocol using Smart Cards with Fingerprint. ISCA PDCS 2003: 448-452
42 Jun-Cheol Jeon, Kee-Young Yoo: Design of Bit-parallel Multiplier Based on Programmable Cellular Automata. ISCA PDCS 2003: 94-98
41EEKyo-Min Ku, Kyeoung Ju Ha, Kee-Young Yoo: Fast Exponentiaion over GF(2) Based on Cellular Automata. International Conference on Computational Science 2003: 841-850
40EESung-Woon Lee, Kee-Young Yoo: Parallelizable Password-Authenticated Key Exchange Protocol. PPAM 2003: 1014-1019
39EEHyun-Sung Kim, Kee-Young Yoo: Cellular Automata Based Multiplier for Public-Key Cryptosystem. SPC 2003: 227-236
38 Keon-Jik Lee, Kee-Won Kim, Won-Ho Lee, Young-Jun Heo, Kee-Young Yoo: Design of a Linear Systolic Modular Multiplier/Squarer for the Fast Modular Exponentiation. I. J. Comput. Appl. 10(1): 34-42 (2003)
37EENam-Yeun Kim, Kee-Young Yoo: Systolic architectures for inversion/division using AB2 circuits in GF(2m). Integration 35(1): 11-24 (2003)
36EESung-Woon Lee, Woo-Hun Kim, Hyun-Sung Kim, Kee-Young Yoo: Parallizable simple authenticated key agreement protocol . Operating Systems Review 37(2): 13-18 (2003)
35EESung-Woon Lee, Woo-Hun Kim, Hyun-Sung Kim, Kee-Young Yoo: Parallizable simple authenticated key agreement protocol. Operating Systems Review 37(3): 17-22 (2003)
34EEHyun-Sung Kim, Sung-Woon Lee, Kee-Young Yoo: ID-based password authentication scheme using smart cards and fingerprints. Operating Systems Review 37(4): 32-41 (2003)
2002
33EENam-Yeun Kim, Won-Ho Lee, Kee-Young Yoo: Efficient Power-Sum Systolic Architectures for Public-Key Cryptosystems in GF(2m). COCOON 2002: 153-161
32 Nam-Yeun Kim, Hyun-Sung Kim, Won-Ho Lee, Kee-Won Kim, Kee-Young Yoo: New AB2 Systolic Architectures in GF(2m). Computers and Their Applications 2002: 394-397
31 Hyun-Sung Kim, Kee-Young Yoo: Basic Architecture for Modular Exponentiation over GF(2m). Computers and Their Applications 2002: 438-441
30 Kyo-Min Ku, Kyeoung Ju Ha, Hyun-Sung Kim, Kee-Young Yoo: Design of New Multiplier/Squarer using Montgomery Algorithm over GF(2m) Based on Cellular Automata. Computers and Their Applications 2002: 442-445
29 Won-Ho Lee, Kee-Won Kim, Nam-Yeun Kim, Kee-Young Yoo, Chang Hoon Kim, Chun Pyo Hong: Architecture for AB2 Operation over GF(2m) using Irreducible AOP and Its Applications. Computers and Their Applications 2002: 446-449
28 Keum-Sook Ha, Eun-Kyung Ryu, Kee-Young Yoo: A Promising Labeling Scheme for On-the-fly Data Race Detection. Computers and Their Applications 2002: 475-478
27EEHyun-Sung Kim, Kee-Young Yoo: Parallel Algorithm and Architecture for Public-Key Cryptosystem. EurAsia-ICT 2002: 145-153
26EENam-Yeun Kim, Hyun-Sung Kim, Won-Ho Lee, Kee-Young Yoo: A Power-Sum Systolic Architecture in GF(2m). ICOIN (2) 2002: 409-417
25EENam-Yeun Kim, Dae-Ghon Kho, Kee-Young Yoo: Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m). ISC 2002: 289-299
24EEHyun-Sung Kim, Kee-Young Yoo: Bit-Serial AOP Arithmetic Architectures over GF (2m). InfraSec 2002: 303-313
23EEKeum-Sook Ha, Eun-Kyung Ryu, Kee-Young Yoo: Space-Efficient First Race Detection in Shared Memory Programs with Nested Parallelism. PARA 2002: 253-263
22EEEun-Kyung Ryu, Keum-Sook Ha, Kee-Young Yoo: A Practical Method for On-the-Fly Data Race Detection. PARA 2002: 264-273
21EEKyo-Min Ku, Kyeoung Ju Ha, Hyun-Sung Kim, Kee-Young Yoo: New Parallel Architecture for Modular Multiplication and Squaring Based on Cellular Automata. PARA 2002: 359-369
20EEKeon-Jik Lee, Kee-Won Kim, Kee-Young Yoo: Digit-serial-in-serial-out systolic multiplier for Montgomery algorithm. Inf. Process. Lett. 82(2): 65-71 (2002)
19EEKeon-Jik Lee, Kee-Young Yoo: Systolic multiplier for Montgomery's algorithm. Integration 32(1-2): 99-109 (2002)
18EEJun-Cheol Jeon, Hyun-Sung Kim, Hyoung-Mok Lee, Kee-Young Yoo: Bit-serial AB2 Multiplier Using Modified Inner Product. J. Inf. Sci. Eng. 18(4): 507-518 (2002)
2001
17 Kee-Won Kim, Keon-Jik Lee, Kee-Young Yoo: Efficient Digital-Serial Systolic Multiplier for Finite Fields GF(2m). CAINE 2001: 205-208
16 Hyo-Cheol Kim, Hyun-Chul Kim, Kee-Young Yoo: A Study on the Precise Extraction of Watermark. CAINE 2001: 37-40
15 Jong-Kook Lee, Shi-Ryong Ryu, Hyun-Chul Kim, Kee-Young Yoo: A Smart Card-based Authentication System for Undeniable Digital Signature. CAINE 2001: 62-65
14 Keon-Jik Lee, Kee-Won Kim, Kee-Young Yoo: Bit-Serial Systolic Multiplier/Squarer for Montgomery's Algorithm. CAINE 2001: 70-73
13EEHyun-Sung Kim, Kee-Young Yoo: Area Efficient Exponentiation Using Modular Multiplier/Squarer in GF(2m. COCOON 2001: 262-267
12 Hyun-Chul Kim, Hyo-Cheol Kim, Kee-Young Yoo: Exploitation of functional parallelism in hierarchical task graph using thread. Computers and Their Applications 2001: 179-182
11 Hyo-Cheol Kim, Jeung-Seop Kim, Hyun-Chul Kim, Kee-Young Yoo: Cross-correlation property for the public watermarking. Computers and Their Applications 2001: 196-199
10 Won-Ho Lee, Hyun-Sung Kim, Kee-Young Yoo: Area Efficient Architecture for Multiplication and Squaring in GF(2^m) using Irreducible AOP. ISCA PDCS 2001: 496-499
9 Keon-Jik Lee, Kee-Won Kim, Kee-Young Yoo: Digit Serial-In-Serial-Out Systolic Multiplier for Montogomery's Algorithm. ISCA PDCS 2001: 500-504
2000
8EESung-Woo Lee, Kee-Young Yoo: Using the Resizable Working-set Notion for Software Distributed Shared Memory. CLUSTER 2000: 373-374
7EESung-Woo Lee, Kee-Young Yoo: The Working-Set Based Adaptive Protocol for Software Distributed Shared Memory. HiPC 2000: 73-82
6EEByoung-Ho Cho, Jeung-Seop Kim, Jae-Hyung Bae, In-Gu Bae, Kee-Young Yoo: Core-Based Fingerprint Image Classification. ICPR 2000: 2859-2862
5EEKeon-Jik Lee, Kee-Young Yoo: Linear systolic multiplier/squarer for fast exponentiation. Inf. Process. Lett. 76(3): 105-111 (2000)
4EEHyun-Sung Kim, Sung-Woo Lee, Kee-Young Yoo: Partitioned systolic architecture for modular multiplication in GF(2m). Inf. Process. Lett. 76(3): 135-139 (2000)
1999
3EESung-Woo Lee, Hyun-Sung Kim, Jung-Joon Kim, Tae-Geun Kim, Kee-Young Yoo: Efficient Fixed-Size Systolic Arrays for the Modular Multiplication. COCOON 1999: 442-451
2EEHyun-Sung Kim, Keon-Jik Lee, Jung-Joon Kim, Kee-Young Yoo: Partitioned Systolic Multiplier for GF(2m). ICPP Workshops 1999: 192-197
1 Hyun-Sung Kim, Kee-Young Yoo, Jung-Joon Kim, Tae-Geun Kim: Pipelined Systolic Multiplier for Finite Fields GF (2m). PDPTA 1999: 1224-1229

Coauthor Index

1Hun-Joong Bae [43]
2In-Gu Bae [6]
3Jae-Hyung Bae [6]
4Jin-Yong Byun [150] [172]
5Byoung-Ho Cho [6]
6Hyun-Ju Cho [149]
7Eun-Yeung Choi [121]
8Nu-El Choi [146]
9Keum-Sook Ha [22] [23] [28]
10Kyeoung Ju Ha [21] [30] [41] [47] [52] [68] [70]
11Young-Jun Heo [38] [46]
12Chun Pyo Hong [29]
13Jae-Yuel Im [65] [82]
14Jin-woo Jeon [58]
15Jun-Cheol Jeon [18] [42] [45] [54] [58] [59] [77] [96] [97] [99] [106] [115] [116] [121] [124] [125] [126] [128] [129] [130] [138] [139] [140] [141] [143] [144] [147] [160] [161]
16Zhen-Ai Jin [149]
17Jae-Hyung Jung [94]
18Ki-Hyun Jung [150] [172] [173]
19Byung-Heon Kang [124] [126] [129] [140] [147]
20Dae-Ghon Kho [25]
21Chang Hoon Kim [29]
22Hyo-Cheol Kim [11] [12] [16]
23Hyo-Chul Kim [70]
24Hyun-Chul Kim [11] [12] [15] [16]
25Hyun-Sung Kim [1] [2] [3] [4] [10] [13] [18] [21] [24] [26] [27] [30] [31] [32] [34] [35] [36] [39] [43] [51] [52] [56] [57] [66] [81] [84] [88] [89]
26Jeung-Seop Kim [6] [11] [70]
27Jung-Joon Kim [1] [2] [3]
28Kee-Won Kim [9] [14] [17] [20] [29] [32] [38] [44] [50] [53] [63] [67] [77] [87] [96] [97] [99] [106] [115] [116] [125] [126] [141]
29Ki-Jong Kim [150] [173]
30Nam-Yeun Kim [25] [26] [29] [32] [33] [37] [48] [49] [62]
31Se-Min Kim [124] [147] [150] [168]
32Tae-Geun Kim [1] [3]
33Woo-Hun Kim [35] [36] [51] [66] [90] [92] [93] [94] [102] [103] [104]
34Yong-Seok Kim [58]
35Kyo-Min Ku [21] [30] [41] [47] [52] [68]
36Eun-Jung Lee [167]
37Gil-Je Lee [168]
38Hyoung-Mok Lee [18] [50]
39Hyung-Mok Lee [53]
40Jae-Min Lee [50]
41Jong-Kook Lee [15]
42Jung-Seuk Lee [54]
43Keon-Jik Lee [2] [5] [9] [14] [17] [19] [20] [38] [69]
44Sang-Eon Lee [174] [175]
45Sung-Woo Lee [3] [4] [7] [8]
46Sung-Woon Lee [34] [35] [36] [40] [51] [56] [66] [81] [84] [88] [89]
47Wan-Soo Lee [124] [145] [152] [154]
48Won-Ho Lee [10] [26] [29] [32] [33] [38] [46] [69]
49Jai-Boo Oh [125] [128] [151]
50Geum-Dal Park [171] [174] [175]
51Hyun-Jin Park [146] [148]
52Eun-Kyung Ryu [22] [23] [28] [44] [50] [53] [55] [60] [61] [63] [64] [65] [67] [71] [73] [74] [75] [80] [82] [83] [85] [86] [87] [93] [98] [109]
53Shi-Ryong Ryu [15]
54Sang-Ho Shin [147] [169] [171] [174] [175]
55Hye-Jin Yang [115]
56Wi Hyun Yoo [68]
57Eun-Joon Yoon [169]
58Eun-Jun Yoon [55] [60] [61] [64] [71] [72] [73] [74] [76] [78] [79] [80] [83] [85] [86] [90] [91] [92] [93] [94] [95] [98] [100] [101] [104] [105] [107] [108] [109] [110] [111] [112] [113] [114] [117] [118] [119] [120] [122] [123] [127] [131] [132] [133] [134] [135] [136] [137] [142] [145] [146] [148] [151] [152] [153] [154] [155] [156] [157] [158] [159] [162] [163] [164] [165] [166] [167] [170] [176]
59Hee-Jung Yoon [116]
60Jae-Gil Yu [150] [169]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)