Kee-Young Yoo

From MaRDI portal
(Redirected from Person:214658)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Linear systolic multiplier/squarer for fast exponentiation
Information Processing Letters
2016-06-16Paper
Partitioned systolic architecture for modular multiplication in \(\mathrm{GF}(2^{m})\)
Information Processing Letters
2016-06-16Paper
scientific article; zbMATH DE number 6499844 (Why is no real title available?)2015-10-28Paper
scientific article; zbMATH DE number 6159487 (Why is no real title available?)2013-04-30Paper
KCI-resilient anonymous wireless link-layer authentication protocols
Mathematical and Computer Modelling
2013-01-27Paper
An entire chaos-based biometric remote user authentication scheme on tokens without using password2011-11-17Paper
Robust biometric-based three-party authenticated key establishment protocols
International Journal of Computer Mathematics
2011-04-21Paper
Algorithms and Computation
Lecture Notes in Computer Science
2009-08-07Paper
Montgomery exponent architecture based on programmable cellular automata
Mathematics and Computers in Simulation
2009-04-03Paper
Elliptic curve based hardware architecture using cellular automata
Mathematics and Computers in Simulation
2009-04-03Paper
scientific article; zbMATH DE number 5507095 (Why is no real title available?)2009-02-12Paper
scientific article; zbMATH DE number 5506913 (Why is no real title available?)2009-02-12Paper
An Improved Popescu’s Authenticated Key Agreement Protocol
Computational Science and Its Applications - ICCSA 2006
2009-02-12Paper
One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity
Computational Science and Its Applications - ICCSA 2006
2009-02-12Paper
Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks
Computational Science and Its Applications - ICCSA 2006
2009-01-27Paper
Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA
Computational Science – ICCS 2006
2009-01-20Paper
Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware
Computational Science – ICCS 2006
2009-01-13Paper
Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition
Lecture Notes in Computer Science
2008-11-20Paper
Authentication Based on Singular Cellular Automata
Lecture Notes in Computer Science
2008-11-20Paper
Fast Exponentiaion over GF(2m) Based on Cellular Automata
Lecture Notes in Computer Science
2008-09-30Paper
A novel approach for bit-serial \(AB^{2}\) multiplication in finite fields \(\mathrm{GF}(2^m)\)
Computers & Mathematics with Applications
2008-03-11Paper
Parallel Processing and Applied Mathematics
Lecture Notes in Computer Science
2007-09-25Paper
Computational Science and Its Applications – ICCSA 2004
Lecture Notes in Computer Science
2007-07-19Paper
Computational Science and Its Applications – ICCSA 2004
Lecture Notes in Computer Science
2007-07-19Paper
Computational Science and Its Applications – ICCSA 2004
Lecture Notes in Computer Science
2007-07-19Paper
Computational Science and Its Applications – ICCSA 2004
Lecture Notes in Computer Science
2007-07-19Paper
Computational Science and Its Applications – ICCSA 2004
Lecture Notes in Computer Science
2007-07-19Paper
Computational Science and Its Applications – ICCSA 2004
Lecture Notes in Computer Science
2007-07-19Paper
Computational Science and Its Applications – ICCSA 2004
Lecture Notes in Computer Science
2007-07-19Paper
Computational Science and Its Applications – ICCSA 2004
Lecture Notes in Computer Science
2007-07-19Paper
Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns
Applied Mathematics and Computation
2007-06-06Paper
Programmable cellular automata based Montgomery hardware architecture
Applied Mathematics and Computation
2007-04-26Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
SOFSEM 2006: Theory and Practice of Computer Science
Lecture Notes in Computer Science
2006-11-14Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Distributed Computing – IWDC 2005
Lecture Notes in Computer Science
2006-10-10Paper
On the security of efficient user identification scheme
Applied Mathematics and Computation
2006-05-18Paper
Computing and Combinatorics
Lecture Notes in Computer Science
2006-01-11Paper
Weakness and solution of Yang et al.'s protected password changing scheme
Applied Mathematics and Computation
2005-11-16Paper
On the security of Wu-Lin's robust key authentication scheme
Applied Mathematics and Computation
2005-11-16Paper
An improvement on Yang et al.'s password authentication schemes
Applied Mathematics and Computation
2005-11-14Paper
Cryptanalysis of Zhang-Xiao's multisignature scheme for specified group of verifiers
Applied Mathematics and Computation
2005-11-14Paper
Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme
Applied Mathematics and Computation
2005-11-04Paper
Efficient verifier-based key agreement protocol for three parties without server's public key
Applied Mathematics and Computation
2005-10-28Paper
Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm
Applied Mathematics and Computation
2005-10-28Paper
Improvement of Chien--Jan's authenticated multiple-key agreement protocol without using conventional one-way function
Applied Mathematics and Computation
2005-10-28Paper
Security of Tseng--Jan's conference key distribution system
Applied Mathematics and Computation
2005-10-28Paper
Efficient nonce-based remote user authentication scheme using smart cards
Applied Mathematics and Computation
2005-10-28Paper
scientific article; zbMATH DE number 2202170 (Why is no real title available?)2005-09-05Paper
Fixing problems in Lin et al.'s OSPA protocol
Applied Mathematics and Computation
2005-08-05Paper
Cryptanalysis of Lee-Lee authenticated key agreement scheme
Applied Mathematics and Computation
2005-05-04Paper
Improvement of Lee and Lee's authenticated key agreement scheme
Applied Mathematics and Computation
2005-02-23Paper
Improvement of HWWM-authenticated key agreement protocol
Applied Mathematics and Computation
2005-02-23Paper
AOP arithmetic architectures over GF(2\(^m\))
Applied Mathematics and Computation
2004-11-23Paper
scientific article; zbMATH DE number 2089170 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 2088416 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 2089169 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 2089179 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 2089970 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 1983211 (Why is no real title available?)2003-09-18Paper
scientific article; zbMATH DE number 1941246 (Why is no real title available?)2003-06-29Paper
Systolic multiplier for Montgomery’s algorithm
Integration
2003-01-22Paper
A New Undeniable Signature Scheme Using Smart Cards
Cryptography and Coding
2002-12-02Paper
scientific article; zbMATH DE number 1796971 (Why is no real title available?)2002-09-05Paper
Digit-serial-in-serial-out systolic multiplier for Montgomery algorithm
Information Processing Letters
2002-07-14Paper
Design of a linear systolic array for computing modular multiplication and squaring in \(\text{GF}(2^m)\)
Computers & Mathematics with Applications
2001-11-12Paper


Research outcomes over time


This page was built for person: Kee-Young Yoo