Showing results 8 to 12 of 12
Key alternating ciphers based on involutions Lee, Jooyoung, DESIGNS CODES AND CRYPTOGRAPHY, v.86, no.5, pp.955 - 988, 2018-05 |
Minimizing the Two-Round Even-Mansour Cipher Chen, Shan; Lampe, Rodolphe; Lee, Jooyoung; Seurin, Yannick; Steinberger, John, JOURNAL OF CRYPTOLOGY, v.31, no.4, pp.1064 - 1119, 2018-10 |
Reducing the Memory Bandwidth Overheads of Hardware Security Support for Multi-Core Processors Lee, Jung Hoon; Kim, Taehoon; Huh, Jaehyuk, IEEE TRANSACTIONS ON COMPUTERS, v.65, no.11, pp.3384 - 3397, 2016-11 |
Secure Many-to-Many Multicast in Heterogeneous Networks Hur, Jun-Beom; Koo, Dong-Young; Yoon, Hyun-Soo, JOURNAL OF INTERNET TECHNOLOGY, v.11, no.6 , pp.859 - 866, 2010-11 |
Security of the Misty Structure beyond the Birthday Bound Lee, Jooyoung, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E97A, no.7, pp.1516 - 1522, 2014-07 |
Discover