Search results for: Mun-Kyu Lee
Theoretical Computer Science > 2017 > 662 > C > 48-58
Lecture Notes in Computer Science > Information Security Applications > Smart Cards/Secure Hardware > 173-186
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2003 > Fast Implementations > 112-126
Lecture Notes in Computer Science > Computational Intelligence and Security > Applications > 1104-1109
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2003 > Fast Implementations > 152-165
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Efficient Implementation > 432-442
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Approaches or Methods of Security Engineering Workshop > 314-321
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Embedded System for Ubiquitous Computing (ESUC 2006) > 584-593
Lecture Notes in Computer Science > Information Security Applications > Efficient HW Implementation > 207-217
Lecture Notes in Computer Science > Information Security and Cryptology — ICISC 2002 > Efficient Implementations > 264-282
Lecture Notes in Computer Science > Information Security Applications > Side-Channel Attacks > 271-282
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptography > 427-434
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2006 > Block and Stream Ciphers > 41-50
Computers & Security > 2016 > 56 > Complete > 140-150
Information Processing Letters > 2016 > 116 > 2 > 168-170
Computer Standards & Interfaces > 2015 > 40 > Complete > 42-52
Computers & Security > 2015 > 48 > C > 167-181