Kee-Young Yoo

From MaRDI portal
Person:214658

Available identifiers

zbMath Open yoo.keeyoungMaRDI QIDQ214658

List of research outcomes





PublicationDate of PublicationType
Linear systolic multiplier/squarer for fast exponentiation2016-06-16Paper
Partitioned systolic architecture for modular multiplication in \(\mathrm{GF}(2^{m})\)2016-06-16Paper
https://portal.mardi4nfdi.de/entity/Q34480582015-10-28Paper
https://portal.mardi4nfdi.de/entity/Q49174592013-04-30Paper
KCI-resilient anonymous wireless link-layer authentication protocols2013-01-27Paper
https://portal.mardi4nfdi.de/entity/Q30985352011-11-17Paper
Robust biometric-based three-party authenticated key establishment protocols2011-04-21Paper
Algorithms and Computation2009-08-07Paper
Montgomery exponent architecture based on programmable cellular automata2009-04-03Paper
Elliptic curve based hardware architecture using cellular automata2009-04-03Paper
https://portal.mardi4nfdi.de/entity/Q36020972009-02-12Paper
https://portal.mardi4nfdi.de/entity/Q36018802009-02-12Paper
An Improved Popescu’s Authenticated Key Agreement Protocol2009-02-12Paper
One-Time Password Authentication Scheme Using Smart Cards Providing User Anonymity2009-02-12Paper
Various Types of Attacks and Solutions Regarding Secure Remote User Access over Insecure Networks2009-01-27Paper
Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA2009-01-20Paper
Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware2009-01-13Paper
Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition2008-11-20Paper
Authentication Based on Singular Cellular Automata2008-11-20Paper
Fast Exponentiaion over GF(2m) Based on Cellular Automata2008-09-30Paper
A novel approach for bit-serial \(AB^{2}\) multiplication in finite fields \(\mathrm{GF}(2^m)\)2008-03-11Paper
Parallel Processing and Applied Mathematics2007-09-25Paper
Computational Science and Its Applications – ICCSA 20042007-07-19Paper
Computational Science and Its Applications – ICCSA 20042007-07-19Paper
Computational Science and Its Applications – ICCSA 20042007-07-19Paper
Computational Science and Its Applications – ICCSA 20042007-07-19Paper
Computational Science and Its Applications – ICCSA 20042007-07-19Paper
Computational Science and Its Applications – ICCSA 20042007-07-19Paper
Computational Science and Its Applications – ICCSA 20042007-07-19Paper
Computational Science and Its Applications – ICCSA 20042007-07-19Paper
Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns2007-06-06Paper
Programmable cellular automata based Montgomery hardware architecture2007-04-26Paper
Cryptology and Network Security2006-11-14Paper
SOFSEM 2006: Theory and Practice of Computer Science2006-11-14Paper
Information and Communications Security2006-10-24Paper
Distributed Computing – IWDC 20052006-10-10Paper
On the security of efficient user identification scheme2006-05-18Paper
Computing and Combinatorics2006-01-11Paper
Weakness and solution of Yang et al.'s protected password changing scheme2005-11-16Paper
On the security of Wu-Lin's robust key authentication scheme2005-11-16Paper
An improvement on Yang et al.'s password authentication schemes2005-11-14Paper
Cryptanalysis of Zhang-Xiao's multisignature scheme for specified group of verifiers2005-11-14Paper
Cryptanalysis and further improvement of Peinado's improved LHL-key authentication scheme2005-11-04Paper
Efficient verifier-based key agreement protocol for three parties without server's public key2005-10-28Paper
Improvement of Fan et al.'s deniable authentication protocol based on Diffie-Hellman algorithm2005-10-28Paper
Improvement of Chien--Jan's authenticated multiple-key agreement protocol without using conventional one-way function2005-10-28Paper
Security of Tseng--Jan's conference key distribution system2005-10-28Paper
Efficient nonce-based remote user authentication scheme using smart cards2005-10-28Paper
https://portal.mardi4nfdi.de/entity/Q53143932005-09-05Paper
Fixing problems in Lin et al.'s OSPA protocol2005-08-05Paper
Cryptanalysis of Lee-Lee authenticated key agreement scheme2005-05-04Paper
Improvement of Lee and Lee's authenticated key agreement scheme2005-02-23Paper
Improvement of HWWM-authenticated key agreement protocol2005-02-23Paper
AOP arithmetic architectures over GF(2\(^m\))2004-11-23Paper
https://portal.mardi4nfdi.de/entity/Q30464042004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q30447682004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q30464032004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q30464212004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q48086332004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q44271212003-09-18Paper
https://portal.mardi4nfdi.de/entity/Q44084472003-06-29Paper
Systolic multiplier for Montgomery’s algorithm2003-01-22Paper
A New Undeniable Signature Scheme Using Smart Cards2002-12-02Paper
https://portal.mardi4nfdi.de/entity/Q45513652002-09-05Paper
Digit-serial-in-serial-out systolic multiplier for Montgomery algorithm2002-07-14Paper
Design of a linear systolic array for computing modular multiplication and squaring in \(\text{GF}(2^m)\)2001-11-12Paper

Research outcomes over time

This page was built for person: Kee-Young Yoo