Search results for: Je Hong Park
Journal of Mechanical Science and Technology > 2017 > 31 > 3 > 1477-1487
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2003 > Cryptanalysis III > 477-490
Lecture Notes in Computer Science > Emerging Directions in Embedded and Ubiquitous Computing > Security in Ubiquitous Computing > 686-691
Lecture Notes in Computer Science > Information Security Applications > Security Analysis and Attacks > 10-24
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2004 > Digital Signatures > 99-111
International Journal of Precision Engineering and Manufacturing > 2014 > 15 > 3 > 545-551
IEEE Transactions on Smart Grid > 2013 > 4 > 3 > 1613 - 1614
Journal of Cryptology > 2012 > 25 > 2 > 271-309
Designs, Codes and Cryptography > 2011 > 58 > 1 > 45-72
Information Processing Letters > 2010 > 110 > 14-15 > 602-608
Journal of Luminescence > 2007 > 126 > 2 > 566-570
Information Processing Letters > 2006 > 97 > 6 > 219-224
Applied Mathematics and Computation > 2005 > 169 > 2 > 1010-1015
Applied Mathematics and Computation > 2005 > 169 > 1 > 192-197
Applied Mathematics and Computation > 2005 > 169 > 1 > 472-475
Discrete Applied Mathematics > 2003 > 130 > 1 > 33-36