|
Search the dblp DataBase
Okyeon Yi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ju-Sung Kang, Okyeon Yi, Dowon Hong, Hyunsook Cho
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI. [Citation Graph (0, 0)][DBLP] ACISP, 2001, pp:60-73 [Conf]
- Heajoung Yoo, Seokhie Hong, Sangjin Lee, Jong In Lim, Okyeon Yi, Maenghee Sung
A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring. [Citation Graph (0, 0)][DBLP] ACISP, 2000, pp:41-48 [Conf]
- Ju-Sung Kang, Sang Uk Shin, Dowon Hong, Okyeon Yi
Provable Security of KASUMI and 3GPP Encryption Mode f8. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2001, pp:255-271 [Conf]
- Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi
Known-IV Attacks on Triple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2001, pp:208-221 [Conf]
- Jaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:103-113 [Conf]
- Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2006, v:19, n:4, pp:441-462 [Journal]
- Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Miae Park, Okyeon Yi
Fingerprint Template Protection Using Fuzzy Vault. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2007, pp:1141-1151 [Conf]
- Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Okyeon Yi, Namil Lee, Kiyoung Moon
Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords. [Citation Graph (0, 0)][DBLP] WISA, 2006, pp:100-109 [Conf]
- Sun-Hee Lim, Ki-Seok Bang, Okyeon Yi, Jongin Lim
A Secure Handover Protocol Design in Wireless Networks with Formal Verification. [Citation Graph (0, 0)][DBLP] WWIC, 2007, pp:67-78 [Conf]
A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro. [Citation Graph (, )][DBLP]
Search in 0.055secs, Finished in 0.055secs
|