2008 |
176 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Enhanced Three-Round Smart Card-Based Key Exchange Protocol.
ATC 2008: 507-515 |
175 | EE | Sang-Eon Lee,
Sang-Ho Shin,
Geum-Dal Park,
Kee-Young Yoo:
Wireless Sensor Network Protocols for Secure and Energy-Efficient Data Transmission.
CISIM 2008: 157-162 |
174 | EE | Sang-Eon Lee,
Sang-Ho Shin,
Geum-Dal Park,
Kee-Young Yoo:
Wireless Sensor Network Protocols for Secure and Energy-Efficient Data Transmission.
CISIM 2008: 157-162 |
173 | EE | Ki-Jong Kim,
Ki-Hyun Jung,
Kee-Young Yoo:
A High Capacity Data Hiding Method Using PVD and LSB.
CSSE (3) 2008: 876-879 |
172 | EE | Jin-Yong Byun,
Ki-Hyun Jung,
Kee-Young Yoo:
Improved Data Hiding Method by Block Parity for Binary Images.
CSSE (3) 2008: 931-934 |
171 | EE | Sang-Ho Shin,
Geum-Dal Park,
Kee-Young Yoo:
A Virtual Three-Dimension Cellular Automata Pseudorandom Number Generator Based on the Moore Neighborhood Method.
ICIC (2) 2008: 174-181 |
170 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce.
ICIC (3) 2008: 533-540 |
169 | EE | Jae-Gil Yu,
Eun-Joon Yoon,
Sang-Ho Shin,
Kee-Young Yoo:
A New Image Steganography Based on 2k Correction and Edge-Detection.
ITNG 2008: 563-568 |
168 | EE | Se-Min Kim,
Gil-Je Lee,
Kee-Young Yoo:
Palette and Index Change Technique for Steganoraphy Based on an Indexcolor.
ITNG 2008: 569-574 |
167 | EE | Eun-Jun Yoon,
Eun-Jung Lee,
Kee-Young Yoo:
Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards.
ITNG 2008: 575-580 |
166 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A New Key Agreement Protocol Based on Chaotic Maps.
KES-AMSTA 2008: 897-906 |
165 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Improvement of Password-Only Authenticated Key Establishment Protocol without Public Key Cryptography.
MUE 2008: 87-91 |
164 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Efficient Authentication and Key Agreement Protocol in RFID System.
NPC 2008: 320-326 |
163 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Improving the Host Authentication Mechanism for POD Copy Protection System.
New Directions in Intelligent Interactive Multimedia 2008: 373-383 |
162 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Robust User Password Change Scheme based on the Elliptic Curve Cryptosystem.
Fundam. Inform. 87(3-4): 483-492 (2008) |
161 | EE | Jun-Cheol Jeon,
Kee-Young Yoo:
Montgomery exponent architecture based on programmable cellular automata.
Mathematics and Computers in Simulation 79(4): 1189-1196 (2008) |
160 | EE | Jun-Cheol Jeon,
Kee-Young Yoo:
Elliptic curve based hardware architecture using cellular automata.
Mathematics and Computers in Simulation 79(4): 1197-1203 (2008) |
2007 |
159 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices.
APWeb/WAIM Workshops 2007: 612-623 |
158 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A Secret-Key Exponential Key Agreement Protocol with Smart Cards.
ATC 2007: 430-440 |
157 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Token-Based Authenticated Key Establishment Protocols for Three-Party Communication.
EUC Workshops 2007: 758-769 |
156 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Vulnerability of User Identification and Key Agreement Protocol with User Anonymity.
FGCN (1) 2007: 516-521 |
155 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement.
FGCN (2) 2007: 66-70 |
154 | EE | Eun-Jun Yoon,
Wan-Soo Lee,
Kee-Young Yoo:
Improving the Single-Assumption Authenticated Diffie-Hellman Key Agreement Protocols.
ICCSA (1) 2007: 926-936 |
153 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation.
ICIC (3) 2007: 1103-1109 |
152 | EE | Eun-Jun Yoon,
Wan-Soo Lee,
Kee-Young Yoo:
Secure PAP-Based RADIUS Protocol in Wireless Networks.
ICIC (3) 2007: 689-694 |
151 | EE | Jai-Boo Oh,
Eun-Jun Yoon,
Kee-Young Yoo:
An Efficient ID-Based Authenticated Key Agreement Protocol with Pairings.
ISPA 2007: 446-456 |
150 | EE | Ki-Hyun Jung,
Jae-Gil Yu,
Se-Min Kim,
Ki-Jong Kim,
Jin-Yong Byun,
Kee-Young Yoo:
The Hiding of Secret Data Using the Run Length Matching Method.
KES-AMSTA 2007: 1027-1034 |
149 | EE | Zhen-Ai Jin,
Hyun-Ju Cho,
Kee-Young Yoo:
An Efficient Authentication Protocol for Low-Cost RFID Systems.
KES-AMSTA 2007: 999-1006 |
148 | | Hyun-Jin Park,
Eun-Jun Yoon,
Kee-Young Yoo:
A New Steganography Scheme using a Frame.
Security and Management 2007: 118-122 |
147 | | Se-Min Kim,
Jun-Cheol Jeon,
Byung-Heon Kang,
Sang-Ho Shin,
Kee-Young Yoo:
Non-linear and Non-group Cellular Automata for Cryptographic Applications.
Security and Management 2007: 432-438 |
146 | | Nu-El Choi,
Eun-Jun Yoon,
Hyun-Jin Park,
Kee-Young Yoo:
Visual Multi-Secret Sharing Scheme with Cheater Identification.
Security and Management 2007: 90-96 |
145 | EE | Eun-Jun Yoon,
Wan-Soo Lee,
Kee-Young Yoo:
Secure Remote User Authentication Scheme Using Bilinear Pairings.
WISTP 2007: 102-114 |
144 | EE | Jun-Cheol Jeon,
Kee-Young Yoo:
Programmable cellular automata based Montgomery hardware architecture.
Applied Mathematics and Computation 186(1): 915-922 (2007) |
143 | EE | Jun-Cheol Jeon,
Kee-Young Yoo:
Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns.
Applied Mathematics and Computation 186(2): 1423-1428 (2007) |
142 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Comments on Modified User Friendly Remote Authentication Scheme with Smart Cards.
IEICE Transactions 90-B(2): 331-333 (2007) |
141 | EE | Kee-Won Kim,
Jun-Cheol Jeon,
Kee-Young Yoo:
Efficient and secure password authentication schemes for low-power devices.
IJSNet 2(1/2): 77-81 (2007) |
2006 |
140 | EE | Byung-Heon Kang,
Jun-Cheol Jeon,
Kee-Young Yoo:
Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition.
ACRI 2006: 104-111 |
139 | EE | Jun-Cheol Jeon,
Kee-Young Yoo:
Cellular Automata Based Role-Delegation in RBAC.
ACRI 2006: 588-594 |
138 | EE | Jun-Cheol Jeon,
Kee-Young Yoo:
Authentication Based on Singular Cellular Automata.
ACRI 2006: 605-610 |
137 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Improving the ID-Based Key Exchange Protocol in Wireless Mobile Ad Hoc Networks.
ADHOC-NOW 2006: 349-354 |
136 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A Secure Password-Authenticated Key Exchange Between Clients with Different Passwords.
APWeb Workshops 2006: 659-663 |
135 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Enhanced Forward-Secure User Authentication Scheme with Smart Cards.
EuroPKI 2006: 197-206 |
134 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Improved Lu-Cao's Remote User Authentication Scheme Using Smart Card.
EuroPKI 2006: 45-53 |
133 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks.
ICCSA (1) 2006: 1156-1165 |
132 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Improved Popescu's Authenticated Key Agreement Protocol.
ICCSA (5) 2006: 276-283 |
131 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity.
ICCSA (5) 2006: 303-311 |
130 | EE | Jun-Cheol Jeon,
Kee-Young Yoo:
Conflict Detection in Role-Based Access Control Using Multiple-Attractor Cellular Automata.
ICIC (1) 2006: 533-541 |
129 | EE | Byung-Heon Kang,
Jun-Cheol Jeon,
Kee-Young Yoo:
Evolutionary Algorithms for Group/Non-group Decision in Periodic Boundary CA.
ICNC (1) 2006: 629-632 |
128 | EE | Jai-Boo Oh,
Jun-Cheol Jeon,
Kee-Young Yoo:
Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards.
ISPA Workshops 2006: 57-64 |
127 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Optimized Two Factor Authenticated Key Exchange Protocol in PWLANs.
International Conference on Computational Science (2) 2006: 1000-1007 |
126 | EE | Jun-Cheol Jeon,
Kee-Won Kim,
Byung-Heon Kang,
Kee-Young Yoo:
Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware.
International Conference on Computational Science (3) 2006: 329-336 |
125 | EE | Jun-Cheol Jeon,
Kee-Won Kim,
Jai-Boo Oh,
Kee-Young Yoo:
Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA.
International Conference on Computational Science (4) 2006: 661-668 |
124 | EE | Jun-Cheol Jeon,
Byung-Heon Kang,
Se-Min Kim,
Wan-Soo Lee,
Kee-Young Yoo:
An Improvement of Remote User Authentication Scheme Using Smart Cards.
MSN 2006: 416-423 |
123 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Biometrics Authenticated Key Agreement Scheme.
NGITS 2006: 345-349 |
122 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Improving the Dynamic ID-Based Remote Mutual Authentication Scheme.
OTM Workshops (1) 2006: 499-507 |
121 | EE | Jun-Cheol Jeon,
Eun-Yeung Choi,
Kee-Young Yoo:
Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks.
PRIMA 2006: 807-812 |
120 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Efficient Mutual Authentication Scheme with Smart Card.
PRIMA 2006: 813-818 |
119 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority.
SOFSEM 2006: 548-555 |
118 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Optimizing Authenticated Key Exchange Protocol for Self-organizing Sensor Networks.
UCS 2006: 537-546 |
117 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A New Secure Key Exchange Protocol Between STB and Smart Card in DTV Broadcasting.
WISI 2006: 165-166 |
2005 |
116 | | Hee-Jung Yoon,
Jun-Cheol Jeon,
Kee-Won Kim,
Kee-Young Yoo:
A Secure One-Time Password Authentication Using Cellular Automata.
CAINE 2005: 376-381 |
115 | | Hye-Jin Yang,
Jun-Cheol Jeon,
Kee-Won Kim,
Kee-Young Yoo:
New Authentication Scheme with No Verification Table.
CAINE 2005: 387-389 |
114 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
New Authentication Scheme Based on a One-Way Hash Function and Diffie-Hellman Key Exchange.
CANS 2005: 147-160 |
113 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
New Efficient Simple Authenticated Key Agreement Protocol.
COCOON 2005: 945-954 |
112 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Improvement of an Efficient User Identification Scheme Based on ID-Based Cryptosystem.
EUC Workshops 2005: 586-591 |
111 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A New Simple Authenticated Key Agreement and Protected Password Change Protocol.
EUC Workshops 2005: 955-964 |
110 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
An Efficient Password Authentication Schemes Without Using the Server Public Key for Grid Computing.
GCC 2005: 149-154 |
109 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Optimized Initiation Phases for Anonymous Auction Protocols.
Human.Society@Internet 2005: 19-27 |
108 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Cryptanalysis of Two User Identification Schemes with Key Distribution Preserving Anonymity.
ICICS 2005: 315-322 |
107 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
New Multi-server Password Authentication Scheme Using Neural Networks.
ICNC (2) 2005: 512-519 |
106 | EE | Jun-Cheol Jeon,
Kee-Won Kim,
Kee-Young Yoo:
Evolutionary Hardware Architecture for Division in Elliptic Curve Cryptosystems over GF(2n).
ICNC (3) 2005: 348-355 |
105 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
More Efficient and Secure Remote User Authentication Scheme using Smart Cards.
ICPADS (2) 2005: 73-77 |
104 | EE | Eun-Jun Yoon,
Woo-Hun Kim,
Kee-Young Yoo:
Robust and Simple Authentication Protocol for Secure Communication on the Web.
ICWE 2005: 352-362 |
103 | EE | Woo-Hun Kim,
Kee-Young Yoo:
Group-Oriented Channel Protection for Mobile Devices in Digital Multimedia Broadcasting.
ISCIS 2005: 103-112 |
102 | EE | Woo-Hun Kim,
Kee-Young Yoo:
New Anonymous User Identification and Key Establishment Protocol in Distributed Networks.
IWDC 2005: 410-415 |
101 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
A New Efficient Fingerprint-Based Remote User Authentication Scheme for Multimedia Systems.
KES (3) 2005: 332-338 |
100 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Robust Authenticated Encryption Scheme with Message Linkages.
KES (4) 2005: 281-288 |
99 | EE | Jun-Cheol Jeon,
Kee-Won Kim,
Kee-Young Yoo:
Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks.
MADNES 2005: 110-116 |
98 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Secure Protected Password Change Scheme.
MMM-ACNS 2005: 472-477 |
97 | EE | Jun-Cheol Jeon,
Kee-Won Kim,
Kee-Young Yoo:
Low-Complexity Authentication Scheme Based on Cellular Automata in Wireless Network.
MSN 2005: 413-421 |
96 | EE | Kee-Won Kim,
Jun-Cheol Jeon,
Kee-Young Yoo:
Efficient and Secure Password Authentication Schemes for Low-Power Devices.
MSN 2005: 73-82 |
95 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Robust Secret Key Based Authentication Scheme Using Smart Cards.
PCM (2) 2005: 723-734 |
94 | | Eun-Jun Yoon,
Jae-Hyung Jung,
Woo-Hun Kim,
Kee-Young Yoo:
A Secret Key Based Authentication Scheme Using Smart Cards.
Security and Management 2005: 65-71 |
93 | | Eun-Jun Yoon,
Eun-Kyung Ryu,
Woo-Hun Kim,
Kee-Young Yoo:
Cryptanalysis of A Key Authentication Scheme Based on Discrete Logarithms.
Security and Management 2005: 72-78 |
92 | EE | Eun-Jun Yoon,
Woo-Hun Kim,
Kee-Young Yoo:
Security Enhancement for Password Authentication Schemes with Smart Cards.
TrustBus 2005: 311-320 |
91 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Secure Fingerprint-Based Remote User Authentication Scheme Using Smartcards.
WINE 2005: 405-413 |
90 | EE | Woo-Hun Kim,
Eun-Jun Yoon,
Kee-Young Yoo:
New Authentication Protocol Providing User Anonymity in Open Network.
WINE 2005: 414-423 |
89 | EE | Sung-Woon Lee,
Hyun-Sung Kim,
Kee-Young Yoo:
Improvement of Lee and Lee's authenticated key agreement scheme.
Applied Mathematics and Computation 162(3): 1049-1053 (2005) |
88 | EE | Sung-Woon Lee,
Hyun-Sung Kim,
Kee-Young Yoo:
Improvement of HWWM-authenticated key agreement protocol.
Applied Mathematics and Computation 162(3): 1315-1320 (2005) |
87 | EE | Kee-Won Kim,
Eun-Kyung Ryu,
Kee-Young Yoo:
Cryptanalysis of Lee-Lee authenticated key agreement scheme.
Applied Mathematics and Computation 163(1): 193-198 (2005) |
86 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Fixing problems in Lin et al.'s OSPA protocol.
Applied Mathematics and Computation 166(1): 46-57 (2005) |
85 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm.
Applied Mathematics and Computation 167(1): 274-280 (2005) |
84 | EE | Sung-Woon Lee,
Hyun-Sung Kim,
Kee-Young Yoo:
Efficient nonce-based remote user authentication scheme using smart cards.
Applied Mathematics and Computation 167(1): 355-361 (2005) |
83 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Improvement of Chien-Jan's authenticated multiple-key agreement protocol without using conventional one-way function.
Applied Mathematics and Computation 167(1): 711-715 (2005) |
82 | EE | Eun-Kyung Ryu,
Jae-Yuel Im,
Kee-Young Yoo:
Security of Tseng-Jan's conference key distribution system.
Applied Mathematics and Computation 167(2): 833-839 (2005) |
81 | EE | Sung-Woon Lee,
Hyun-Sung Kim,
Kee-Young Yoo:
Efficient verifier-based key agreement protocol for three parties without server's public key.
Applied Mathematics and Computation 167(2): 996-1003 (2005) |
80 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme.
Applied Mathematics and Computation 168(2): 788-794 (2005) |
79 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
On the security of Wu-Lin's robust key authentication scheme.
Applied Mathematics and Computation 169(1): 1-7 (2005) |
78 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Weakness and solution of Yang et al.'s protected password changing scheme.
Applied Mathematics and Computation 169(1): 295-304 (2005) |
77 | EE | Kee-Won Kim,
Jun-Cheol Jeon,
Kee-Young Yoo:
An improvement on Yang et al.'s password authentication schemes.
Applied Mathematics and Computation 170(1): 207-215 (2005) |
76 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Cryptanalysis of Zhang-Xiao's multisignature scheme for specified group of verifiers.
Applied Mathematics and Computation 170(1): 226-229 (2005) |
75 | EE | Eun-Kyung Ryu,
Kee-Young Yoo:
On the security of efficient user identification scheme.
Applied Mathematics and Computation 171(2): 1201-1205 (2005) |
74 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
An improvement of Hwang-Lee-Tang's simple remote user authentication scheme.
Computers & Security 24(1): 50-56 (2005) |
73 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards.
IEICE Transactions 88-A(1): 319-321 (2005) |
72 | EE | Eun-Jun Yoon,
Kee-Young Yoo:
Cryptanalysis of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.
IEICE Transactions 88-B(6): 2627-2628 (2005) |
71 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Attacks and Solutions of Yang et al.'s Protected Password Changing Scheme.
Informatica, Lith. Acad. Sci. 16(2): 285-294 (2005) |
2004 |
70 | EE | Jeung-Seop Kim,
Hyo-Chul Kim,
Kyeoung Ju Ha,
Kee-Young Yoo:
One Round Identity-Based Authenticated Conference Key Agreement Protocol.
ECUMN 2004: 407-416 |
69 | EE | Won-Ho Lee,
Keon-Jik Lee,
Kee-Young Yoo:
New Digit-Serial Systolic Arrays for Power-Sum and Division Operation in GF(2m).
ICCSA (3) 2004: 638-647 |
68 | EE | Kyo-Min Ku,
Kyeoung Ju Ha,
Wi Hyun Yoo,
Kee-Young Yoo:
Parallel Montgomery Multiplication and Squaring over GF(2m) Based on Cellular Automata.
ICCSA (4) 2004: 196-205 |
67 | EE | Eun-Kyung Ryu,
Kee-Won Kim,
Kee-Young Yoo:
An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack.
ICCSA (4) 2004: 603-610 |
66 | EE | Sung-Woon Lee,
Woo-Hun Kim,
Hyun-Sung Kim,
Kee-Young Yoo:
Efficient Password-Based Authenticated Key Agreement Protocol.
ICCSA (4) 2004: 617-626 |
65 | EE | Kee-Young Yoo,
Eun-Kyung Ryu,
Jae-Yuel Im:
Multiparty Key Agreement Protocol with Cheater Identification Based on Shamir Secret Sharing.
ICCSA (4) 2004: 655-664 |
64 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Security of Shen et al.'s Timestamp-Based Password Authentication Scheme.
ICCSA (4) 2004: 665-671 |
63 | EE | Kee-Won Kim,
Eun-Kyung Ryu,
Kee-Young Yoo:
ID-Based Authenticated Multiple-Key Agreement Protocol from Pairings.
ICCSA (4) 2004: 672-680 |
62 | EE | Nam-Yeun Kim,
Kee-Young Yoo:
Digit-Serial AB2 Systolic Array for Division in GF(2m).
ICCSA (4) 2004: 87-96 |
61 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
Robust Remote User Authentication Scheme.
ICOIN 2004: 935-942 |
60 | EE | Eun-Kyung Ryu,
Eun-Jun Yoon,
Kee-Young Yoo:
An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings.
NETWORKING 2004: 1458-1463 |
59 | EE | Jun-Cheol Jeon,
Kee-Young Yoo:
An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields.
PRICAI 2004: 241-250 |
58 | | Yong-Seok Kim,
Jun-Cheol Jeon,
Jin-woo Jeon,
Kee-Young Yoo:
An Efficient Access Control Model Based on User-Classification and Role-Division.
Security and Management 2004: 300-304 |
57 | EE | Hyun-Sung Kim,
Kee-Young Yoo:
AOP arithmetic architectures over GF(2m).
Applied Mathematics and Computation 158(1): 7-18 (2004) |
56 | EE | Sung-Woon Lee,
Hyun-Sung Kim,
Kee-Young Yoo:
Cryptanalysis of a user authentication scheme using hash functions.
Operating Systems Review 38(1): 24-28 (2004) |
55 | EE | Eun-Jun Yoon,
Eun-Kyung Ryu,
Kee-Young Yoo:
A secure user authentication scheme using hash functions.
Operating Systems Review 38(2): 62-68 (2004) |
54 | EE | Jung-Seuk Lee,
Jun-Cheol Jeon,
Kee-Young Yoo:
A security scheme for protecting security policies in firewall.
Operating Systems Review 38(2): 69-72 (2004) |
2003 |
53 | | Kee-Won Kim,
Eun-Kyung Ryu,
Hyung-Mok Lee,
Kee-Young Yoo:
A New Authenticated Key Agreement Protocol.
CAINE 2003: 91-94 |
52 | | Kyo-Min Ku,
Kyeoung Ju Ha,
Hyun-Sung Kim,
Kee-Young Yoo:
New AB2 Multiplier over GF(2m) using Cellular Automata.
Computers and Their Applications 2003: 283-286 |
51 | | Woo-Hun Kim,
Hyun-Sung Kim,
Sung-Woon Lee,
Kee-Young Yoo:
Secure Authenticated Key Exchange Protocol.
Computers and Their Applications 2003: 5-8 |
50 | | Hyoung-Mok Lee,
Eun-Kyung Ryu,
Kee-Won Kim,
Jae-Min Lee,
Kee-Young Yoo:
A Robust Authenticated Key Agreement Protocol.
Computers and Their Applications 2003: 76-79 |
49 | | Nam-Yeun Kim,
Kee-Young Yoo:
Look-Up Table-based Montgomery Algorithm in GF(2k) for Public-Key Cryptosystem.
Computers and Their Applications 2003: 9-12 |
48 | EE | Nam-Yeun Kim,
Kee-Young Yoo:
Montgomery Multiplication and Squaring Algorithms in GF(2k).
ICCSA (1) 2003: 865-874 |
47 | EE | Kyo-Min Ku,
Kyeoung Ju Ha,
Kee-Young Yoo:
Time-Space Efficient Exponentiation over GF(2m).
ICCSA (1) 2003: 875-882 |
46 | EE | Won-Ho Lee,
Young-Jun Heo,
Kee-Young Yoo:
Efficient Architecture for Exponentiation and Division in GF(2m) Using Irreducible AOP.
ICCSA (1) 2003: 883-892 |
45 | EE | Jun-Cheol Jeon,
Kee-Young Yoo:
Computational Algorithm and Architecture for AB2 Multiplication in Finite Fields.
ICCSA (1) 2003: 947-956 |
44 | EE | Eun-Kyung Ryu,
Kee-Won Kim,
Kee-Young Yoo:
A Promising Key Agreement Protocol.
ISAAC 2003: 655-662 |
43 | | Hun-Joong Bae,
Hyun-Sung Kim,
Kee-Young Yoo:
ID-based Key Exchange Protocol using Smart Cards with Fingerprint.
ISCA PDCS 2003: 448-452 |
42 | | Jun-Cheol Jeon,
Kee-Young Yoo:
Design of Bit-parallel Multiplier Based on Programmable Cellular Automata.
ISCA PDCS 2003: 94-98 |
41 | EE | Kyo-Min Ku,
Kyeoung Ju Ha,
Kee-Young Yoo:
Fast Exponentiaion over GF(2) Based on Cellular Automata.
International Conference on Computational Science 2003: 841-850 |
40 | EE | Sung-Woon Lee,
Kee-Young Yoo:
Parallelizable Password-Authenticated Key Exchange Protocol.
PPAM 2003: 1014-1019 |
39 | EE | Hyun-Sung Kim,
Kee-Young Yoo:
Cellular Automata Based Multiplier for Public-Key Cryptosystem.
SPC 2003: 227-236 |
38 | | Keon-Jik Lee,
Kee-Won Kim,
Won-Ho Lee,
Young-Jun Heo,
Kee-Young Yoo:
Design of a Linear Systolic Modular Multiplier/Squarer for the Fast Modular Exponentiation.
I. J. Comput. Appl. 10(1): 34-42 (2003) |
37 | EE | Nam-Yeun Kim,
Kee-Young Yoo:
Systolic architectures for inversion/division using AB2 circuits in GF(2m).
Integration 35(1): 11-24 (2003) |
36 | EE | Sung-Woon Lee,
Woo-Hun Kim,
Hyun-Sung Kim,
Kee-Young Yoo:
Parallizable simple authenticated key agreement protocol .
Operating Systems Review 37(2): 13-18 (2003) |
35 | EE | Sung-Woon Lee,
Woo-Hun Kim,
Hyun-Sung Kim,
Kee-Young Yoo:
Parallizable simple authenticated key agreement protocol.
Operating Systems Review 37(3): 17-22 (2003) |
34 | EE | Hyun-Sung Kim,
Sung-Woon Lee,
Kee-Young Yoo:
ID-based password authentication scheme using smart cards and fingerprints.
Operating Systems Review 37(4): 32-41 (2003) |
2002 |
33 | EE | Nam-Yeun Kim,
Won-Ho Lee,
Kee-Young Yoo:
Efficient Power-Sum Systolic Architectures for Public-Key Cryptosystems in GF(2m).
COCOON 2002: 153-161 |
32 | | Nam-Yeun Kim,
Hyun-Sung Kim,
Won-Ho Lee,
Kee-Won Kim,
Kee-Young Yoo:
New AB2 Systolic Architectures in GF(2m).
Computers and Their Applications 2002: 394-397 |
31 | | Hyun-Sung Kim,
Kee-Young Yoo:
Basic Architecture for Modular Exponentiation over GF(2m).
Computers and Their Applications 2002: 438-441 |
30 | | Kyo-Min Ku,
Kyeoung Ju Ha,
Hyun-Sung Kim,
Kee-Young Yoo:
Design of New Multiplier/Squarer using Montgomery Algorithm over GF(2m) Based on Cellular Automata.
Computers and Their Applications 2002: 442-445 |
29 | | Won-Ho Lee,
Kee-Won Kim,
Nam-Yeun Kim,
Kee-Young Yoo,
Chang Hoon Kim,
Chun Pyo Hong:
Architecture for AB2 Operation over GF(2m) using Irreducible AOP and Its Applications.
Computers and Their Applications 2002: 446-449 |
28 | | Keum-Sook Ha,
Eun-Kyung Ryu,
Kee-Young Yoo:
A Promising Labeling Scheme for On-the-fly Data Race Detection.
Computers and Their Applications 2002: 475-478 |
27 | EE | Hyun-Sung Kim,
Kee-Young Yoo:
Parallel Algorithm and Architecture for Public-Key Cryptosystem.
EurAsia-ICT 2002: 145-153 |
26 | EE | Nam-Yeun Kim,
Hyun-Sung Kim,
Won-Ho Lee,
Kee-Young Yoo:
A Power-Sum Systolic Architecture in GF(2m).
ICOIN (2) 2002: 409-417 |
25 | EE | Nam-Yeun Kim,
Dae-Ghon Kho,
Kee-Young Yoo:
Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2m).
ISC 2002: 289-299 |
24 | EE | Hyun-Sung Kim,
Kee-Young Yoo:
Bit-Serial AOP Arithmetic Architectures over GF (2m).
InfraSec 2002: 303-313 |
23 | EE | Keum-Sook Ha,
Eun-Kyung Ryu,
Kee-Young Yoo:
Space-Efficient First Race Detection in Shared Memory Programs with Nested Parallelism.
PARA 2002: 253-263 |
22 | EE | Eun-Kyung Ryu,
Keum-Sook Ha,
Kee-Young Yoo:
A Practical Method for On-the-Fly Data Race Detection.
PARA 2002: 264-273 |
21 | EE | Kyo-Min Ku,
Kyeoung Ju Ha,
Hyun-Sung Kim,
Kee-Young Yoo:
New Parallel Architecture for Modular Multiplication and Squaring Based on Cellular Automata.
PARA 2002: 359-369 |
20 | EE | Keon-Jik Lee,
Kee-Won Kim,
Kee-Young Yoo:
Digit-serial-in-serial-out systolic multiplier for Montgomery algorithm.
Inf. Process. Lett. 82(2): 65-71 (2002) |
19 | EE | Keon-Jik Lee,
Kee-Young Yoo:
Systolic multiplier for Montgomery's algorithm.
Integration 32(1-2): 99-109 (2002) |
18 | EE | Jun-Cheol Jeon,
Hyun-Sung Kim,
Hyoung-Mok Lee,
Kee-Young Yoo:
Bit-serial AB2 Multiplier Using Modified Inner Product.
J. Inf. Sci. Eng. 18(4): 507-518 (2002) |
2001 |
17 | | Kee-Won Kim,
Keon-Jik Lee,
Kee-Young Yoo:
Efficient Digital-Serial Systolic Multiplier for Finite Fields GF(2m).
CAINE 2001: 205-208 |
16 | | Hyo-Cheol Kim,
Hyun-Chul Kim,
Kee-Young Yoo:
A Study on the Precise Extraction of Watermark.
CAINE 2001: 37-40 |
15 | | Jong-Kook Lee,
Shi-Ryong Ryu,
Hyun-Chul Kim,
Kee-Young Yoo:
A Smart Card-based Authentication System for Undeniable Digital Signature.
CAINE 2001: 62-65 |
14 | | Keon-Jik Lee,
Kee-Won Kim,
Kee-Young Yoo:
Bit-Serial Systolic Multiplier/Squarer for Montgomery's Algorithm.
CAINE 2001: 70-73 |
13 | EE | Hyun-Sung Kim,
Kee-Young Yoo:
Area Efficient Exponentiation Using Modular Multiplier/Squarer in GF(2m.
COCOON 2001: 262-267 |
12 | | Hyun-Chul Kim,
Hyo-Cheol Kim,
Kee-Young Yoo:
Exploitation of functional parallelism in hierarchical task graph using thread.
Computers and Their Applications 2001: 179-182 |
11 | | Hyo-Cheol Kim,
Jeung-Seop Kim,
Hyun-Chul Kim,
Kee-Young Yoo:
Cross-correlation property for the public watermarking.
Computers and Their Applications 2001: 196-199 |
10 | | Won-Ho Lee,
Hyun-Sung Kim,
Kee-Young Yoo:
Area Efficient Architecture for Multiplication and Squaring in GF(2^m) using Irreducible AOP.
ISCA PDCS 2001: 496-499 |
9 | | Keon-Jik Lee,
Kee-Won Kim,
Kee-Young Yoo:
Digit Serial-In-Serial-Out Systolic Multiplier for Montogomery's Algorithm.
ISCA PDCS 2001: 500-504 |
2000 |
8 | EE | Sung-Woo Lee,
Kee-Young Yoo:
Using the Resizable Working-set Notion for Software Distributed Shared Memory.
CLUSTER 2000: 373-374 |
7 | EE | Sung-Woo Lee,
Kee-Young Yoo:
The Working-Set Based Adaptive Protocol for Software Distributed Shared Memory.
HiPC 2000: 73-82 |
6 | EE | Byoung-Ho Cho,
Jeung-Seop Kim,
Jae-Hyung Bae,
In-Gu Bae,
Kee-Young Yoo:
Core-Based Fingerprint Image Classification.
ICPR 2000: 2859-2862 |
5 | EE | Keon-Jik Lee,
Kee-Young Yoo:
Linear systolic multiplier/squarer for fast exponentiation.
Inf. Process. Lett. 76(3): 105-111 (2000) |
4 | EE | Hyun-Sung Kim,
Sung-Woo Lee,
Kee-Young Yoo:
Partitioned systolic architecture for modular multiplication in GF(2m).
Inf. Process. Lett. 76(3): 135-139 (2000) |
1999 |
3 | EE | Sung-Woo Lee,
Hyun-Sung Kim,
Jung-Joon Kim,
Tae-Geun Kim,
Kee-Young Yoo:
Efficient Fixed-Size Systolic Arrays for the Modular Multiplication.
COCOON 1999: 442-451 |
2 | EE | Hyun-Sung Kim,
Keon-Jik Lee,
Jung-Joon Kim,
Kee-Young Yoo:
Partitioned Systolic Multiplier for GF(2m).
ICPP Workshops 1999: 192-197 |
1 | | Hyun-Sung Kim,
Kee-Young Yoo,
Jung-Joon Kim,
Tae-Geun Kim:
Pipelined Systolic Multiplier for Finite Fields GF (2m).
PDPTA 1999: 1224-1229 |