|
Journal
|
2013 |
Compact and Unified Hardware Architecture for SHA-1 and SHA-256 of Trusted Mobile Computing
Kim Moo Seop Personal and Ubiquitous Computing, v.17, no.5, pp.921-932 |
11 |
원문
|
|
Conference
|
2008 |
Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module
Kim Moo Seop World Conference on Information Security Applications (WISA) 2008 (LNCS 5379), v.5379, pp.292-304 |
1 |
원문
|
|
Conference
|
2007 |
Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing
Kim Moo Seop International Conference on Information and Communications Security (ICICS) 2007 (LNCS 4861), v.4861, pp.375-385 |
4 |
원문
|
|
Conference
|
2007 |
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing
Kim Moo Seop International Conference on Autonomic and Trusted Computing (ATC) 2007 (LNCS 4610), v.4610, pp.410-419 |
4 |
원문
|
|
Conference
|
2006 |
Low Power Implementation of SHA-1 Algorithm for RFID System
Choi Yong-Je International Symposium on Consumer Electronics (ISCE) 2006, pp.682-686 |
5 |
|
|
Conference
|
2006 |
Analysis of Implementation of SHA-1 Hash Function for Low Power Sensor Network
Choi Yong-Je 대한전자공학회 종합 학술 대회 (하계) 2006, pp.475-476 |
|
|