Showing results 1 to 4 of 4
Accelerating key establishment protocols for mobile communication Lee, S; Hong, SM; Yoon, Hyunsoo; Cho, Y, INFORMATION SECURITY AND PRIVACY BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.1587, pp.51 - 63, 1999-04 |
Provably secure length-saving public-key encryption scheme under the computational Diffie-Hellman assumption Baek, Joonsang; Lee, Byoungcheon; Kim, Kwangjo, ETRI JOURNAL, v.22, no.4, pp.25 - 31, 2000-12 |
Sorting Method for Fully Homomorphic Encrypted Data Using the Cryptographic Single-Instruction Multiple-Data Operation Kim, Pyung; Lee, Younho; Yoon, Hyunsoo, IEICE TRANSACTIONS ON COMMUNICATIONS, v.E99B, no.5, pp.1070 - 1086, 2016-05 |
Towards generating secure keys for braid cryptography Ko, Ki-Hyoung; Lee, JW; Thomas, T, DESIGNS CODES AND CRYPTOGRAPHY, v.45, no.3, pp.317 - 333, 2007-12 |
Discover