An effective classification for DoS attacks in wireless sensor networks T Park, D Cho, H Kim 2018 Tenth international conference on ubiquitous and future networks (ICUFN …, 2018 | 57 | 2018 |
Compact implementations of LEA block cipher for low-end microprocessors H Seo, Z Liu, J Choi, T Park, H Kim International Workshop on Information Security Applications, 28-40, 2015 | 30 | 2015 |
Binary and prime field multiplication for public key cryptography on embedded microprocessors H Seo, Y Lee, H Kim, T Park, H Kim Security and Communication Networks 7 (4), 774-787, 2014 | 29 | 2014 |
Parallel implementations of LEA, revisited H Seo, T Park, S Heo, G Seo, B Bae, Z Hu, L Zhou, Y Nogami, Y Zhu, ... Information Security Applications: 17th International Workshop, WISA 2016 …, 2017 | 26 | 2017 |
Parallel implementations of LEA H Seo, Z Liu, T Park, H Kim, Y Lee, J Choi, H Kim International Conference on Information Security and Cryptology, 256-274, 2013 | 24 | 2013 |
Parallel implementations of SIMON and SPECK T Park, H Seo, H Kim 2016 international conference on platform technology and service (PlatCon), 1-6, 2016 | 18 | 2016 |
Faster ECC over (feat. NEON) H Seo, Z Liu, Y Nogami, T Park, J Choi, L Zhou, H Kim Information Security and Cryptology-ICISC 2015: 18th International …, 2016 | 16 | 2016 |
Pseudo random number generator and hash function for embedded microprocessors H Seo, J Choi, H Kim, T Park, H Kim 2014 IEEE World Forum on Internet of Things (WF-IoT), 37-40, 2014 | 14 | 2014 |
Secure data encryption for cloud-based human care services T Park, H Seo, S Lee, H Kim Journal of Sensors 2018, 2018 | 12 | 2018 |
Efficient parallel implementation of matrix multiplication for Lattice-Based cryptography on modern ARM processor T Park, H Seo, J Kim, H Park, H Kim Security and Communication Networks 2018, 2018 | 11 | 2018 |
Efficient implementation of simeck family block cipher on 16-bit MSP430 T Park, H Seo, G Lee, H Kim 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN …, 2017 | 11 | 2017 |
Lightweight fault attack resistance in software using intra-instruction redundancy, revisited H Seo, T Park, J Ji, H Kim International Workshop on Information Security Applications, 3-15, 2017 | 10 | 2017 |
Efficient implementation of simeck family block cipher on 8-bit processor T Park, H Seo, B Bae, H Kim Journal of information and communication convergence engineering 14 (3), 177-183, 2016 | 10 | 2016 |
Secure GCM implementation on AVR Z Liu, H Seo, CN Chen, Y Nogami, T Park, J Choi, H Kim Discrete Applied Mathematics 241, 58-66, 2018 | 8 | 2018 |
Survey and prospective on privacy protection methods on cloud platform environment T Park, G Lee, H Kim Journal of the Korea Institute of Information Security & Cryptology 27 (5 …, 2017 | 8 | 2017 |
Secure Message Transmission against Remote Control System T Park, H Seo, B Bae, H Kim Journal of information and communication convergence engineering 14 (4), 233-239, 2016 | 8 | 2016 |
Parallel implementations of Simon and speck, revisited T Park, H Seo, G Lee, MAA Khandaker, Y Nogami, H Kim International Workshop on Information Security Applications, 283-294, 2017 | 7 | 2017 |
An implementation of ecc with twisted montgomery curve over 32nd degree tower field on arduino uno Y Hashimoto, MAA Khandaker, Y Kodera, T Park, T Kusaka, H Kim, ... International Journal of Networking and Computing 8 (2), 341-350, 2018 | 6 | 2018 |
Optimized implementation of chaskey MAC on 16-bit MSP430 G Lee, H Seo, T Park, H Kim 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN …, 2017 | 6 | 2017 |
Secure binary field multiplication H Seo, CN Chen, Z Liu, Y Nogami, T Park, J Choi, H Kim International Workshop on Information Security Applications, 161-173, 2015 | 6 | 2015 |