Kee-Young Yoo

From MaRDI portal
Person:214658

Available identifiers

zbMath Open yoo.keeyoungMaRDI QIDQ214658

List of research outcomes

PublicationDate of PublicationType
Linear systolic multiplier/squarer for fast exponentiation2016-06-16Paper
Partitioned systolic architecture for modular multiplication in \(\mathrm{GF}(2^{m})\)2016-06-16Paper
https://portal.mardi4nfdi.de/entity/Q34480582015-10-28Paper
https://portal.mardi4nfdi.de/entity/Q49174592013-04-30Paper
KCI-resilient anonymous wireless link-layer authentication protocols2013-01-27Paper
https://portal.mardi4nfdi.de/entity/Q30985352011-11-17Paper
Robust biometric-based three-party authenticated key establishment protocols2011-04-21Paper
Algorithms and Computation2009-08-07Paper
Montgomery exponent architecture based on programmable cellular automata2009-04-03Paper
Elliptic curve based hardware architecture using cellular automata2009-04-03Paper
https://portal.mardi4nfdi.de/entity/Q36018802009-02-12Paper
https://portal.mardi4nfdi.de/entity/Q36020972009-02-12Paper
An Improved Popescu’s Authenticated Key Agreement Protocol2009-02-12Paper
One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity2009-02-12Paper
Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks2009-01-27Paper
Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA2009-01-20Paper
Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware2009-01-13Paper
Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition2008-11-20Paper
Authentication Based on Singular Cellular Automata2008-11-20Paper
Fast Exponentiaion over GF(2m) Based on Cellular Automata2008-09-30Paper
A novel approach for bit-serial \(AB^{2}\) multiplication in finite fields \(\mathrm{GF}(2^m)\)2008-03-11Paper
Parallel Processing and Applied Mathematics2007-09-25Paper
Computational Science and Its Applications – ICCSA 20042007-07-19Paper
Computational Science and Its Applications – ICCSA 20042007-07-19Paper
Computational Science and Its Applications – ICCSA 20042007-07-19Paper
Computational Science and Its Applications – ICCSA 20042007-07-19Paper
Computational Science and Its Applications – ICCSA 20042007-07-19Paper
Computational Science and Its Applications – ICCSA 20042007-07-19Paper
Computational Science and Its Applications – ICCSA 20042007-07-19Paper
Computational Science and Its Applications – ICCSA 20042007-07-19Paper
Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns2007-06-06Paper
Programmable cellular automata based Montgomery hardware architecture2007-04-26Paper
SOFSEM 2006: Theory and Practice of Computer Science2006-11-14Paper
Cryptology and Network Security2006-11-14Paper
Information and Communications Security2006-10-24Paper
Distributed Computing – IWDC 20052006-10-10Paper
On the security of efficient user identification scheme2006-05-18Paper
Computing and Combinatorics2006-01-11Paper
On the security of Wu-Lin's robust key authentication scheme2005-11-16Paper
Weakness and solution of Yang et al.'s protected password changing scheme2005-11-16Paper
An improvement on Yang et al.'s password authentication schemes2005-11-14Paper
Cryptanalysis of Zhang-Xiao's multisignature scheme for specified group of verifiers2005-11-14Paper
Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme2005-11-04Paper
Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm2005-10-28Paper
Efficient nonce-based remote user authentication scheme using smart cards2005-10-28Paper
Improvement of Chien--Jan's authenticated multiple-key agreement protocol without using conventional one-way function2005-10-28Paper
Security of Tseng--Jan's conference key distribution system2005-10-28Paper
Efficient verifier-based key agreement protocol for three parties without server's public key2005-10-28Paper
https://portal.mardi4nfdi.de/entity/Q53143932005-09-05Paper
Fixing problems in Lin et al.'s OSPA protocol2005-08-05Paper
Cryptanalysis of Lee-Lee authenticated key agreement scheme2005-05-04Paper
Improvement of Lee and Lee's authenticated key agreement scheme2005-02-23Paper
Improvement of HWWM-authenticated key agreement protocol2005-02-23Paper
AOP arithmetic architectures over GF(2\(^m\))2004-11-23Paper
https://portal.mardi4nfdi.de/entity/Q30447682004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q30464032004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q30464042004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q30464212004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q48086332004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q44271212003-09-18Paper
https://portal.mardi4nfdi.de/entity/Q44084472003-06-29Paper
Systolic multiplier for Montgomery’s algorithm2003-01-22Paper
A New Undeniable Signature Scheme Using Smart Cards2002-12-02Paper
https://portal.mardi4nfdi.de/entity/Q45513652002-09-05Paper
Digit-serial-in-serial-out systolic multiplier for Montgomery algorithm2002-07-14Paper
Design of a linear systolic array for computing modular multiplication and squaring in \(\text{GF}(2^m)\)2001-11-12Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Kee-Young Yoo