Search

Your search keyword '"Mun-Kyu Lee"' showing total 75 results

Search Constraints

Start Over You searched for: Author "Mun-Kyu Lee" Remove constraint Author: "Mun-Kyu Lee" Database OpenAIRE Remove constraint Database: OpenAIRE
75 results on '"Mun-Kyu Lee"'

Search Results

1. Architectural Supports for Block Ciphers in a RISC CPU Core by Instruction Overloading

4. Development of an Autonomous Driving Vehicle for Garbage Collection in Residential Areas

5. ECC Coprocessor Over a NIST Prime Field Using Fast Partial Montgomery Reduction

6. Toward Quantum Secured Distributed Energy Resources: Adoption of Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD)

8. Predicting Regional Outbreaks of Hepatitis A Using 3D LSTM and Open Data in Korea

9. Practical Privacy-Preserving Face Authentication for Smartphones Secure Against Malicious Clients

10. Efficient and Secure Implementation of NTRUEncrypt Using Signed Sliding Window Method

11. Fast Verification of Signatures With Shared ECQV Implicit Certificates

13. Acceleration of Inner-Pairing Product Operation for Secure Biometric Verification

14. Efficient and Privacy-Preserving Energy Trading on Blockchain Using Dual Binary Encoding for Inner Product Encryption

15. Low-Complexity Elliptic Curve Cryptography Processor Based on Configurable Partial Modular Reduction Over NIST Prime Fields

16. Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks

17. Privacy-Preserving Peer-to-Peer Energy Trading in Blockchain-Enabled Smart Grids Using Functional Encryption

18. Outbreak Prediction of Hepatitis A in Korea based on Statistical Analysis and LSTM Network

19. Privacy-Preserving Electricity Billing System Using Functional Encryption

20. Simplified small exponent test for batch verification

21. Analysis and Improvement on a Unimodal Haptic PIN-Entry Method

22. Design and Analysis of Efficient Parallel Hardware Prime Generators

23. Framework for Secure Biometric System Design on Smartphones

24. Secure bimodal PIN-entry method using audio signals

25. Security Analysis and Improvement of Fingerprint Authentication for Smartphones

26. Improved batch verification of signatures using generalized sparse exponents

27. Privacy-Preserving Blind Auction Protocol Using Fully Homomorphic Encryption

28. Transaction authentication using complementary colors

29. Analysis and Improvement of MaTRU Public Key Cryptosystem

30. Security Notions and Advanced Method for Human Shoulder-Surfing Resistant PIN-Entry

31. Improved cancelable fingerprint templates using minutiae-based functional transform

32. Reordering computation sequences for memory-efficient binary field multiplication

33. Efficacy and safety of glimepiride/metformin sustained release once daily vs. glimepiride/metformin twice daily in patients with type 2 diabetes

34. Efficient Implementation of NTRU Cryptosystem Using Sliding Window Methods

35. Password Authentication Using One-Time Key-Based Signature and Homomorphic Encryption

36. Fast Signature Verification with Shared Implicit Certificates for Vehicular Communication

37. Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption

38. Low-Power Design of Hardware One-Time Password Generators for Card-Type OTPs

39. Fast Exponentiation Using Split Exponents

40. Integrated circuit design for physical unclonable function using differential amplifiers

41. Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem

42. Efficient RFID Search Protocols Providing Enhanced User Privacy

43. Hyperelliptic Curve Crypto-Coprocessor over Affine and Projective Coordinates

44. Enhancing the Security of Personal Identification Numbers with Three-Dimensional Displays

45. Design and Performance Analysis of Electronic Seal Protection Systems Based on AES

46. A simple proof of optimality for the MIN cache replacement policy

47. Vulnerability Analysis on Smartphone Fingerprint Templates

48. Speeding up Scalar Multiplication in Genus 2 Hyperelliptic Curves with Efficient Endomorphisms

49. Efficient parallel exponentiation in using normal basis representations

50. 3DPIN: Enhancing security with 3D display

Catalog

Books, media, physical & digital resources