Search results for: Kunsoo Park
Mathematics in Computer Science > 2017 > 11 > 2 > 127-136
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2003 > Fast Implementations > 112-126
Lecture Notes in Computer Science > Automata, Languages and Programming > Contributed Papers > 463-472
Lecture Notes in Computer Science > Combinatorial Pattern Matching > Session 3: Data Compression I > 95-106
Lecture Notes in Computer Science > String Processing and Information Retrieval > Algorithms on Trees > 31-38
Lecture Notes in Computer Science > Computing and Combinatorics > Parallel and Distributed Computing > 262-271
Lecture Notes in Computer Science > Combinatorics, Algorithms, Probabilistic and Experimental Methodologies > 271-281
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2003 > Fast Implementations > 152-165
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Efficient Implementation > 432-442
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 309-326
Lecture Notes in Computer Science > Combinatorial Pattern Matching > Session 10: Suffix Arrays and Trees > 352-364
Lecture Notes in Computer Science > Advances in Information and Computer Security > Signatures (2) > 88-103