Privacy-aware role based access control model: Revisited for multi-policy conflict detection Y Kim, E Song
2010 International Conference on Information Science and Applications, 1-7, 2010
16 2010 Preventing Bitcoin Selfish Mining Using Transaction Creation Time YK Jihye Lee
2018 International Conference on Software Security and Assurance (ICSSA), 2018
11 2018 Robust lightweight fingerprint encryption using random block feedback Y Kim, J Yoon, JH Joo, K Yi
Electronics letters 50 (4), 267-268, 2014
8 2014 Efficient parallel exponentiation in GF (qn) using normal basis representations MK Lee, Y Kim, K Park, Y Cho
Journal of Algorithms 54 (2), 205-221, 2005
8 2005 Modified hierarchical privacy-aware role based access control modelS Arora, E Song, Y Kim
Proceedings of the 2012 ACM Research in Applied Computation Symposium, 344-347, 2012
6 2012 Safety comparison analysis against known/chosen plaintext attack of RBF (random block feedback) mode to other block cipher modes of operation Y Kim, K Yi
The Journal of Korean Institute of Communications and Information Sciences …, 2014
3 2014 Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm Y Kim, SY Ohm, K Yi
IEICE transactions on information and systems 92 (3), 545-547, 2009
3 2009 The random-block feedback mode for block ciphers Y Kim, Y Cho
IEICE transactions on fundamentals of electronics, communications and …, 2000
3 2000 Efficient parallel exponentiation in GF(2n ) using normal basis representations MK Lee, Y Kim, K Park, Y Cho
Proceedings of the thirteenth annual ACM symposium on Parallel algorithms …, 2001
2 2001 Storage efficient algorithm for hermite normal form using lll GH Cho, HS Lee, S Lim, Y Kim
Linear Algebra and its Applications 613, 183-200, 2021
1 2021 HNF Implementation Strategy Analysis for Lattice Cryptography (Lightning Talk) Y Kim, H Yun, S Lim
2018 International Conference on Software Security and Assurance (ICSSA), 38-38, 2018
2018 블록 암호 연산 모드 RBF (Random Block Feedback) 의알려진/선택 평문 공격에 대한 안전성 비교 분석 김윤정, 이강
한국통신학회논문지 39 (5), 317-322, 2014
2014 웹서버를 위한, 서비스 거부 공격에 강한 침입탐지시스템 구성 김윤정
정보보증논문지 추가정보 표시 8 (3), 1-8, 2008
2008 Aspnes, James, 127 R Beigel, DJ Bernstein, JM Boyer, Y Cho, D Eppstein, F Fich, B Gum, ...
Journal of Algorithms 54, 223, 2005
2005 Kenneth Weber, Vilmar Trevisan, Luiz Felipe Martins. A modular integer GCD al R Beigel, D Eppstein, MK Lee, Y Kim, K Park, Y Cho, P Šparl, J Žerovnik, ...
Journal of Algorithms 54, 126, 2005
2005 ISO/IEC 의 IDS 기술 표준 동향 김윤정, 이기한
정보보호학회지 14 (2), 6-11, 2004
2004 병렬 지수승에서 라운드 수 축소를 위한 알고리즘 김윤정
정보보호학회논문지 14 (1), 113-119, 2004
2004 All-or-nothing encryption^ f\h p/p ^ fx/j, UW Y Kim, Y Cho
ICSSA 2018 YB Choi, I Echizen, A Holzinger, P Kieseberg, DK Kim, DS Kim, JM Kim, ...
Hangul Encryption Algorithm Based on DES YKKPY Cho