Journal
|
2022 |
A Survey of Polynomial Multiplication With RSA-ECC Coprocessors and Implementations of NIST PQC Round3 KEM Algorithms in Exynos2100
박종연 IEEE Access, v.10, pp.2546-2563 |
9 |
원문
|
Journal
|
2021 |
Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes
Yusungjin IEEE Access, v.9, pp.126186-126197 |
55 |
원문
|
Conference
|
2018 |
Public Key-based Lightweight Mutual Authentication and Key Agreement Protocol for Drones
Keonwoo Kim Asian/Austrailian Rotorcraft Forum (ARF) 2018, pp.1-5 |
1 |
|
Conference
|
2017 |
CAESAR: A criticality-aware ECDSA signature verification scheme with Markov model
Chao Chen Vehicular Networking Conference (VNC) 2017, pp.1-4 |
4 |
원문
|
Journal
|
2015 |
Accelerating Elliptic Curve Scalar Multiplication over GF(2m) on Graphic Hardwares
서석충 Journal of Parallel and Distributed Computing, v.75, pp.152-167 |
9 |
원문
|
Conference
|
2009 |
A New Fault Cryptanalysis on Montgomery Ladder Exponentiation Algorithm
박제훈 International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS) 2009, pp.896-899 |
1 |
원문
|
Journal
|
2008 |
TinyECCK:Efficient Implementation of Elliptic Curve Cryptosystem over GF(2m) on 8-bit Micaz Mote
서석충 정보보호학회논문지, v.18, no.3, pp.9-21 |
|
|
Journal
|
2008 |
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote
서석충 IEICE Transactions on Information and Systems, v.E91-D, no.5, pp.1338-1347 |
34 |
원문
|
Journal
|
2008 |
A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks
서석충 Telecommunications Review, v.18, no.1, pp.112-126 |
|
|
Journal
|
2007 |
Differential Power Analysis on Countermeasures Using Binary Signed Digit Representations
Tae Hyun Kim ETRI Journal, v.29, no.5, pp.619-632 |
3 |
원문
|
Conference
|
2006 |
Efficient Exponentiation in GF(p m ) Using the Frobenius Map
이문규 International Conference on Computational Science and Its Applications (ICCSA) 2006 (LNCS 3983), v.3983, pp.584-593 |
0 |
원문
|
Conference
|
2005 |
A DPA Countermeasure by Randomized Frobenius Decomposition
Park Tae Jun International Workshop on Information Security Applications (WISA) 2005 (LNCS 3786), v.3786, pp.271-282 |
0 |
|
Conference
|
2002 |
Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2163) for ECC protocols
Choi Yong-Je International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2002, pp.675-678 |
|
|