Subjects :
Command authentication
논문 검색결과
| Type |
Year |
Title |
Cited |
Download |
|
Journal
|
2013 |
Compact and Unified Hardware Architecture for SHA-1 and SHA-256 of Trusted Mobile Computing
Kim Moo Seop Personal and Ubiquitous Computing, v.17, no.5, pp.921-932 |
11 |
원문
|
|
Conference
|
2008 |
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing
Kim Moo Seop International Conference on Information Security and Cryptology (Inscrypt) 2008 (LNCS 5487), v.5487, pp.240-252 |
23 |
원문
|
|
Conference
|
2008 |
Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module
Kim Moo Seop World Conference on Information Security Applications (WISA) 2008 (LNCS 5379), v.5379, pp.292-304 |
1 |
원문
|
|
Conference
|
2007 |
Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing
Kim Moo Seop International Conference on Information and Communications Security (ICICS) 2007 (LNCS 4861), v.4861, pp.375-385 |
4 |
원문
|
|
Conference
|
2007 |
Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing
Kim Moo Seop International Conference on Autonomic and Trusted Computing (ATC) 2007 (LNCS 4610), v.4610, pp.410-419 |
4 |
원문
|
특허 검색결과
| Status |
Year |
Patent Name |
Country |
Family Pat. |
KIPRIS |
|
No search results. |
연구보고서 검색결과
| Type |
Year |
Research Project |
Primary Investigator |
Download |
|
No search results. |