Browse by Subject ENCRYPTION

Showing results 5 to 12 of 12

5
Efficient and Secure File Deduplication in Cloud Storage

Shin, Youngjoo; Kim, Kwangjo, IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E97D, no.2, pp.184 - 197, 2014-02

6
Efficient Integrity-Tree Structure for Convolutional Neural Networks through Frequent Counter Overflow Prevention in Secure Memories

Kim, Jesung; Lee, Wonyoung; Hong, Jeongkyu; Kim, Soontae, SENSORS, v.22, no.22, 2022-11

7
Generic transformation from weakly to strongly unforgeable signatures

Huang Q.; Wong D.S.; Li J.; Zhao Y.-M., JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, v.23, no.2, pp.240 - 252, 2008

8
Key alternating ciphers based on involutions

Lee, Jooyoung, DESIGNS CODES AND CRYPTOGRAPHY, v.86, no.5, pp.955 - 988, 2018-05

9
Minimizing the Two-Round Even-Mansour Cipher

Chen, Shan; Lampe, Rodolphe; Lee, Jooyoung; Seurin, Yannick; Steinberger, John, JOURNAL OF CRYPTOLOGY, v.31, no.4, pp.1064 - 1119, 2018-10

10
Reducing the Memory Bandwidth Overheads of Hardware Security Support for Multi-Core Processors

Lee, Jung Hoon; Kim, Taehoon; Huh, Jaehyuk, IEEE TRANSACTIONS ON COMPUTERS, v.65, no.11, pp.3384 - 3397, 2016-11

11
Secure Many-to-Many Multicast in Heterogeneous Networks

Hur, Jun-Beom; Koo, Dong-Young; Yoon, Hyun-Soo, JOURNAL OF INTERNET TECHNOLOGY, v.11, no.6 , pp.859 - 866, 2010-11

12
Security of the Misty Structure beyond the Birthday Bound

Lee, Jooyoung, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E97A, no.7, pp.1516 - 1522, 2014-07

rss_1.0 rss_2.0 atom_1.0