Search results for: Seokhie Hong
The Journal of Supercomputing > 2018 > 74 > 5 > 2254-2254
The Journal of Supercomputing > 2018 > 74 > 3 > 1394-1417
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 41-48
Lecture Notes in Computer Science > Information Security and Privacy > Hashing and Message Authentication > 421-431
The Journal of Supercomputing > 2018 > 74 > 9 > 4173-4198
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2001 > Block Ciphers > 208-221
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Symmetric-Key Schemes I > 274-288
Lecture Notes in Computer Science > Security and Cryptography for Networks > Symmetric Key Cryptanalysis and Randomness > 242-256
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Applied Cryptography and Information Security (ACIS 2006) > 446-455
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2005 > Hash Functions > 63-76
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2006 > Low Resources > 46-59