The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mun-Kyu Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Howon Kim, Mun-Kyu Lee, Dong Kyue Kim, Sang-Kyoon Chung, Kyoil Chung
    Design and Implementation of Crypto Co-processor and Its Application to Security Systems. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1104-1109 [Conf]
  2. Mun-Kyu Lee, Dowon Hong
    An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity Module. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:408-413 [Conf]
  3. Mun-Kyu Lee
    SPA-Resistant Simultaneous Scalar Multiplication. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:314-321 [Conf]
  4. Mun-Kyu Lee, Howon Kim, Dowon Hong, Kyoil Chung
    Efficient Exponentiation in GF(pm) Using the Frobenius Map. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:584-593 [Conf]
  5. Ku-Young Chang, Ju-Sung Kang, Mun-Kyu Lee, Hangrok Lee, Dowon Hong
    New Variant of the Self-Shrinking Generator and Its Cryptographic Properties. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:41-50 [Conf]
  6. Tae-Jun Park, Mun-Kyu Lee, E-yong Kim, Kunsoo Park
    A General Expansion Method Using Efficient Endomorphisms. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:112-126 [Conf]
  7. Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park
    New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:264-282 [Conf]
  8. Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park
    Efficient Scalar Multiplication in Hyperelliptic Curves Using A New Frobenius Expansion. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:152-165 [Conf]
  9. Chi Seong Park, Mun-Kyu Lee, Dong Kyue Kim
    New Computation Paradigm for Modular Exponentiation Using a Graph Model. [Citation Graph (0, 0)][DBLP]
    SAGA, 2005, pp:170-179 [Conf]
  10. Mun-Kyu Lee, Yoonjeong Kim, Kunsoo Park, Yookun Cho
    Efficient parallel exponentiation in GF(2n) using normal basis representations. [Citation Graph (0, 0)][DBLP]
    SPAA, 2001, pp:179-188 [Conf]
  11. Tae-Jun Park, Mun-Kyu Lee, Dowon Hong, Kyoil Chung
    A DPA Countermeasure by Randomized Frobenius Decomposition. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:271-282 [Conf]
  12. Mun-Kyu Lee, Keon Tae Kim, Howon Kim, Dong Kyue Kim
    Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(pm). [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:207-217 [Conf]
  13. Mun-Kyu Lee, Yoonjeong Kim, Kunsoo Park, Yookun Cho
    Efficient parallel exponentiation in GF(qn) using normal basis representations. [Citation Graph (0, 0)][DBLP]
    J. Algorithms, 2005, v:54, n:2, pp:205-221 [Journal]
  14. Mun-Kyu Lee, Jung Woo Kim, Jeong Eun Song, Kunsoo Park
    Sliding Window Method for NTRU. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:432-442 [Conf]
  15. Mun-Kyu Lee, Dowon Hong, Dong Kyue Kim
    Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:427-434 [Conf]
  16. Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim, Dong Kyue Kim
    Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. [Citation Graph (0, 0)][DBLP]
    WISA, 2006, pp:173-186 [Conf]

  17. User Authentication Based on Distance Estimation Using Ultrasonic Sensors. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002