|
Journal
|
2023 |
T‐depth reduction method for efficient SHA‐256 quantum circuit construction
Jong-Heon Lee IET Information Security, v.17, no.1, pp.46-65 |
6 |
원문
|
|
Conference
|
2021 |
T-depth Reduction Method for Efficient SHA-256 Quantum Circuit Construction
Jong-Heon Lee International Conference on Information Security and Cryptology (ICISC) 2021 (LNCS 13218), pp.368-391 |
0 |
원문
|
|
Conference
|
2021 |
A HashChain-based Partial Matching Embedded Manifest for NDN
Park Sae Hyong International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1213-1215 |
0 |
원문
|
|
Journal
|
2018 |
TLDA: An Efficient Two-Layered Data Authentication Mechanism for Content-Centric Networking
서석충 Security and Communication Networks, v.2018, pp.1-17 |
2 |
원문
|
|
Journal
|
2013 |
Compact and Unified Hardware Architecture for SHA-1 and SHA-256 of Trusted Mobile Computing
Kim Moo Seop Personal and Ubiquitous Computing, v.17, no.5, pp.921-932 |
11 |
원문
|
|
Conference
|
2008 |
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing
Kim Moo Seop International Conference on Information Security and Cryptology (Inscrypt) 2008 (LNCS 5487), v.5487, pp.240-252 |
23 |
원문
|