Author of the publication

Development of the web security system using a cryptographic token.

, , , and . ICISC, page 161-177. Korea Institute of Information Security and Cryptology (KIISC), (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Parallel Architecture for Modular Multiplication and Squaring Based on Cellular Automata., , , and . PARA, volume 2367 of Lecture Notes in Computer Science, page 359-369. Springer, (2002)New AB2 Multiplier over GF(2m) using Cellular Automata., , , and . CATA, page 283-286. ISCA, (2003)Development of the web security system using a cryptographic token., , , and . ICISC, page 161-177. Korea Institute of Information Security and Cryptology (KIISC), (1998)One Round Identity-Based Authenticated Conference Key Agreement Protocol., , , and . ECUMN, volume 3262 of Lecture Notes in Computer Science, page 407-416. Springer, (2004)Design of New Multiplier/Squarer using Montgomery Algorithm over GF(2m) Based on Cellular Automata., , , and . CATA, page 442-445. ISCA, (2002)Parallel Montgomery Multiplication and Squaring over GF(2m) Based on Cellular Automata., , , and . ICCSA (4), volume 3046 of Lecture Notes in Computer Science, page 196-205. Springer, (2004)Fast Exponentiaion over GF(2) Based on Cellular Automata., , and . International Conference on Computational Science, volume 2658 of Lecture Notes in Computer Science, page 841-850. Springer, (2003)Time-Space Efficient Exponentiation over GF(2m)., , and . ICCSA (1), volume 2667 of Lecture Notes in Computer Science, page 875-882. Springer, (2003)