Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Modular Multiplication Algorithms for Fast Modular Exponentiation., , and . EUROCRYPT, volume 1070 of Lecture Notes in Computer Science, page 166-177. Springer, (1996)Optimal Control of Roll-Pitch Seeker with Singularity Avoidance., , , , , and . MED, page 915-920. IEEE, (2018)Three-dimensional velocity maximizing agile turn of air-to-air missile with collision triangle constraint., , , , , , and . MED, page 123-128. IEEE, (2017)Expansion of Sliding Window Method for Finding Shorter Addition/Subtraction-Chains., , , and . Int. J. Netw. Secur., 2 (1): 34-40 (2006)Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption., , , , , , , , and . IEEE Access, (2018)Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment., , , , and . IEICE Trans. Inf. Syst., 89-D (8): 2452-2455 (2006)Trust Management for Resilient Wireless Sensor Networks., , , and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 56-68. Springer, (2005)Improved batch exponentiation., , , , and . Inf. Process. Lett., 109 (15): 832-837 (2009)A new appraoch to server-aided secret computation., , , and . ICISC, page 33-45. Korea Institute of Information Security and Cryptology (KIISC), (1998)Secure Group Communication with Multiplicative One-way Functions., , , and . ITCC (1), page 685-690. IEEE Computer Society, (2005)