Search results for: Chang Han Kim
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2005 > Implementations > 375-388
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2003 > Fast Implementations > 127-138
Lecture Notes in Computer Science > Selected Areas in Cryptography > RSA and XTR Enhancements > 369-384
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptography and Coding > 1-8
Lecture Notes in Computer Science > Computational Intelligence and Security > Cryptography > 460-469
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2008 > Workshop on Computer Aided Information (CAI) Technology (CAIT 2008) > 601-614
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Information Security and Hiding (ISH 2005) Workshop > 647-656
Lecture Notes in Computer Science > Selected Areas in Cryptography > Public Key Cryptography > 144-158
Lecture Notes in Computer Science > On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops > 382-391
Multimedia Tools and Applications > 2016 > 75 > 22 > 14819- 14831
Experimental Dermatology > 24 > 9 > 680 - 685
IEEE Transactions on Very Large Scale Integration (VLSI) Systems > 2012 > 20 > 10 > 1903 - 1908
Computers and Mathematics with Applications > 2010 > 60 > 2 > 355-361
Journal of Systems Architecture > 2009 > 55 > 7-9 > 355-362