Search results for: Dowon Hong
Information Processing Letters > 2018 > 131 > C > 33-38
IEEE Transactions on Computers > 2017 > 66 > 8 > 1396 - 1406
Lecture Notes in Computer Science > Fast Software Encryption > MACs > 154-169
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > Provable Security and Primitives > 343-351
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Embedded System for Ubiquitous Computing (ESUC 2006) > 584-593
Lecture Notes in Computer Science > Advances in Information Security and Assurance > Key Management and Recovery > 190-199
Lecture Notes in Computer Science > Information Security Applications > Side-Channel Attacks > 271-282
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptography > 427-434
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2006 > Block and Stream Ciphers > 41-50
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2001 > Provable Security > 255-271
Studies in Computational Intelligence > Computers,Networks, Systems, and Industrial Engineering 2011 > 201-208
Integration, the VLSI Journal > 2016 > 53 > C > 27-38
IEEE Transactions on Computers > 2016 > 65 > 1 > 332 - 333
The Journal of Supercomputing > 2016 > 72 > 11 > 4233-4246
IEEE Transactions on Computers > 2014 > 63 > 12 > 3162 - 3163