|
Search the dblp DataBase
Choonsik Park:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yongdae Kim, Sangjin Lee, Choonsik Park
On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications. [Citation Graph (0, 0)][DBLP] CARDIS, 1996, pp:- [Conf]
- Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo Han, Ju-Sung Kang, Choonsik Park
New Public-Key Cryptosystem Using Braid Groups. [Citation Graph (0, 0)][DBLP] CRYPTO, 2000, pp:166-183 [Conf]
- Seong-Hun Paeng, Kil-Chan Ha, Jae Heon Kim, Seongtaek Chee, Choonsik Park
New Public Key Cryptosystem Using Finite Non Abelian Groups. [Citation Graph (0, 0)][DBLP] CRYPTO, 2001, pp:470-485 [Conf]
- Jung Hee Cheon, Seongtaek Chee, Choonsik Park
S-boxes with Controllable Nonlinearity. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1999, pp:286-294 [Conf]
- Choonsik Park, Kazutomo Itoh, Kaoru Kurosawa
Efficient Anonymous Channel and All/Nothing Election Scheme. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1993, pp:248-259 [Conf]
- Choonsik Park, Kaoru Kurosawa, Tatsuaki Okamoto, Shigeo Tsujii
On Key Distribution and Authentication in Mobile Radio Networks. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1993, pp:461-465 [Conf]
- Jungtae Kim, Gunhee Lee, Jung-Taek Seo, Eung Ki Park, Choon Sik Park, Dong-Kyoo Kim
Y-AOI: Y-Means Based Attribute Oriented Induction Identifying Root Cause for IDSs. [Citation Graph (0, 0)][DBLP] FSKD (2), 2005, pp:205-214 [Conf]
- Minsoo Kim, Jae-Hyun Seo, Seungyong Lee, BongNam Noh, Jung-Taek Seo, Eung Ki Park, Choon Sik Park
An Effective Method for Analyzing Intrusion Situation Through IP-Based Classification. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:225-234 [Conf]
- Ju-Sung Kang, Seongtaek Chee, Choonsik Park
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures. [Citation Graph (0, 0)][DBLP] ICISC, 2000, pp:1-13 [Conf]
- Ju-Sung Kang, Choonsik Park, Sangjin Lee, Jong In Lim
On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP] ICISC, 1999, pp:38-52 [Conf]
- Sangwoo Park, Seongtaek Chee, Choonsik Park, Soo Hak Sung
How to construct balanced Boolean functions with good global avalanche characteristics. [Citation Graph (0, 0)][DBLP] ICISC, 1998, pp:121-130 [Conf]
- Jungtae Kim, Gunhee Lee, Jung-Taek Seo, Eung Ki Park, Choonsik Park, Dong-Kyoo Kim
An Alert Reasoning Method for Intrusion Detection System Using Attribute Oriented Induction. [Citation Graph (0, 0)][DBLP] ICOIN, 2005, pp:72-79 [Conf]
- Eung Ki Park, Dae-Sik Choi, Jung-Taek Seo, Choonsik Park, Dongkyu Kim
Adaptation Enhanced Mechanism for Web Survivability. [Citation Graph (0, 0)][DBLP] PDCAT, 2004, pp:650-653 [Conf]
- Soo Hak Sung, Seongtaek Chee, Choonsik Park
Global Avalanche Characteristics and Propagation Criterion of Balanced Boolean Functions. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 1999, v:69, n:1, pp:21-24 [Journal]
The Vulnerabilities Analysis of Fuzzy Vault Using Password. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|