The SCEAS System
Navigation Menu

Search the dblp DataBase


Ku-Young Chang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dowon Hong, Ku-Young Chang, Heuisu Ryu
    Efficient Oblivious Transfer in the Bounded-Storage Model. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:143-159 [Conf]
  2. Ku-Young Chang, Ju-Sung Kang, Mun-Kyu Lee, Hangrok Lee, Dowon Hong
    New Variant of the Self-Shrinking Generator and Its Cryptographic Properties. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:41-50 [Conf]
  3. Ku-Young Chang, Howon Kim, Ju-Sung Kang, Hyun-Sook Cho
    An extension of TYT algorithm for GF((2n)m) using precomputation. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2004, v:92, n:5, pp:231-234 [Journal]
  4. Ku-Young Chang, Soun-Hi Kwon
    The class number one problem for some non-abelian normal CM-fields of degree 48. [Citation Graph (0, 0)][DBLP]
    Math. Comput., 2003, v:72, n:242, pp:1003-1017 [Journal]
  5. Ku-Young Chang, Dowon Hong, Hyun-Sook Cho
    Low Complexity Bit-Parallel Multiplier for GF(2^m) Defined by All-One Polynomials Using Redundant Representation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2005, v:54, n:12, pp:1628-1630 [Journal]
  6. Sun-Mi Park, Ku-Young Chang, Dowon Hong
    Efficient Bit-Parallel Multiplier for Irreducible Pentanomials Using a Shifted Polynomial Basis. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2006, v:55, n:9, pp:1211-1215 [Journal]

  7. A New Anti-Forensic Tool Based on a Simple Data Encryption Scheme. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.002secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002