|
Search the dblp DataBase
Ku-Young Chang:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Dowon Hong, Ku-Young Chang, Heuisu Ryu
Efficient Oblivious Transfer in the Bounded-Storage Model. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2002, pp:143-159 [Conf]
- Ku-Young Chang, Ju-Sung Kang, Mun-Kyu Lee, Hangrok Lee, Dowon Hong
New Variant of the Self-Shrinking Generator and Its Cryptographic Properties. [Citation Graph (0, 0)][DBLP] ICISC, 2006, pp:41-50 [Conf]
- Ku-Young Chang, Howon Kim, Ju-Sung Kang, Hyun-Sook Cho
An extension of TYT algorithm for GF((2n)m) using precomputation. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2004, v:92, n:5, pp:231-234 [Journal]
- Ku-Young Chang, Soun-Hi Kwon
The class number one problem for some non-abelian normal CM-fields of degree 48. [Citation Graph (0, 0)][DBLP] Math. Comput., 2003, v:72, n:242, pp:1003-1017 [Journal]
- Ku-Young Chang, Dowon Hong, Hyun-Sook Cho
Low Complexity Bit-Parallel Multiplier for GF(2^m) Defined by All-One Polynomials Using Redundant Representation. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2005, v:54, n:12, pp:1628-1630 [Journal]
- Sun-Mi Park, Ku-Young Chang, Dowon Hong
Efficient Bit-Parallel Multiplier for Irreducible Pentanomials Using a Shifted Polynomial Basis. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2006, v:55, n:9, pp:1211-1215 [Journal]
A New Anti-Forensic Tool Based on a Simple Data Encryption Scheme. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|