Yong Ki Lee
Yong Ki Lee
Samsung Electronics
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα snu.ac.kr
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Elliptic-curve-based security processor for RFID
YK Lee, K Sakiyama, L Batina, I Verbauwhede
IEEE Transactions on Computers 57 (11), 1514-1527, 2008
2682008
EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol
YK Lee, L Batina, I Verbauwhede
2008 IEEE international conference on RFID, 97-104, 2008
1502008
Low-cost untraceable authentication protocols for RFID
YK Lee, L Batina, D Singelée, I Verbauwhede
Proceedings of the third ACM conference on Wireless network security, 55-64, 2010
1152010
Tongue cleaning device
RK Wagstaff
US Patent 6,792,642, 2004
115*2004
Untraceable RFID authentication protocols: Revision of EC-RAC
YK Lee, L Batina, I Verbauwhede
2009 IEEE international conference on RFID, 178-185, 2009
892009
8.7 Physically unclonable function for secure key generation with a key error rate of 2E-38 in 45nm smart-card chips
B Karpinskyy, Y Lee, Y Choi, Y Kim, M Noh, S Lee
2016 IEEE International Solid-State Circuits Conference (ISSCC), 158-160, 2016
732016
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
L Batina, YK Lee, S Seys, D Singelée, I Verbauwhede
Personal and Ubiquitous Computing 16 (3), 323-335, 2012
452012
Throughput optimized SHA-1 architecture using unfolding transformation
YK Lee, H Chan, I Verbauwhede
IEEE 17th international conference on application-specific systems …, 2006
372006
Integrated overvoltage and reverse voltage protection circuit
JM Laraia
US Patent 6,882,513, 2005
36*2005
A compact architecture for montgomery elliptic curve scalar multiplication processor
YK Lee, I Verbauwhede
International Workshop on Information Security Applications, 115-127, 2007
292007
Privacy-preserving ECC-based grouping proofs for RFID
L Batina, YK Lee, S Seys, D Singelée, I Verbauwhede
International conference on information security, 159-165, 2010
272010
Iteration bound analysis and throughput optimum architecture of SHA-256 (384,512) for hardware implementations
YK Lee, H Chan, I Verbauwhede
International Workshop on Information Security Applications, 102-114, 2007
262007
Wide–weak privacy–preserving RFID authentication protocols
YK Lee, L Batina, D Singelée, I Verbauwhede
International Conference on Mobile Lightweight Wireless Systems, 254-267, 2010
192010
Anti-counterfeiting, untraceability and other security challenges for RFID systems: Public-key-based protocols and hardware
YK Lee, L Batina, D Singelee, B Preneel, I Verbauwhede
Towards Hardware-Intrinsic Security, 237-257, 2010
182010
Privacy challenges in RFID systems
YK Lee, L Batina, I Verbauwhede
The Internet of Things, 397-407, 2010
182010
On the high-throughput implementation of ripemd-160 hash algorithm
M Knezzevic, K Sakiyama, YK Lee, I Verbauwhede
2008 International Conference on Application-Specific Systems, Architectures …, 2008
182008
One-time templates for face authentication
Y Lee, Y Lee, Y Chung, K Moon
2007 International Conference on Convergence Information Technology (ICCIT …, 2007
172007
Design methodology for throughput optimum architectures of hash algorithms of the MD4-class
YK Lee, H Chan, I Verbauwhede
Journal of Signal Processing Systems 53 (1), 89-102, 2008
102008
Retro-fit roll forming mill with jack screw
ER Bodnar
US Patent 6,644,086, 2003
82003
Signal processing for cryptography and security applications
M Knežević, L Batina, E De Mulder, J Fan, B Gierlichs, YK Lee, R Maes, ...
Handbook of Signal Processing Systems, 223-241, 2013
72013
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20