Digital Library


Search: "[ author: 박영호 ]" (40)
    , , Vol. 32, No. 3, pp. 477-486, Jun. 2022
    10.13089/JKIISC.2022.32.3.477

    On the Use of Odd-Degree Isogenies for Implementing SIDH-Based Cryptography
    김수리, 윤기순, 박영호, Vol. 31, No. 1, pp. 19-30, Feb. 2021
    10.13089/JKIISC.2021.31.1.19
    Keywords: Post-Quantum Cryptography, isogeny-based cryptography, SIDH, Post-Quantum Cryptography, isogeny-based cryptography, SIDH

    Authentication Template Protection Using Function Encryption
    박동희, 박영호, Vol. 29, No. 6, pp. 1319-1326, Dec. 2019
    10.13089/JKIISC.2019.29.6.1319
    Keywords: Function encryption, Biometric Authentication, Authentication template protection, Function encryption, Biometric Authentication, Authentication template protection

    An Implementation of Supersingular Isogeny Diffie-Hellman and Its Application to Mobile Security Product
    Kisoon Yoon, Jun Yeong Lee, Suhri Kim, Jihoon Kwon, Young-Ho Park, Vol. 28, No. 1, pp. 73-83, Feb. 2018
    10.13089/JKIISC.2018.28.1.73
    Keywords: supersingular isogeny Diffie-Hellman, isogeny-based cryptography, Post-Quantum Cryptography, supersingular isogeny Diffie-Hellman, isogeny-based cryptography, Post-Quantum Cryptography

    An Improved Anonymous Authentication Scheme for Remote Health Monitoring System
    Youngho Park, Si-Wan Noh, Kyung-Hyune Rhee, Vol. 26, No. 6, pp. 1551-1560, Dec. 2016
    10.13089/JKIISC.2016.26.6.1551
    Keywords: Remote Healthcare, authentication, Anonymity, Key-insulation

    Enhanced Polynomial Selection Method for GNFS
    Suhri Kim, Jihoon Kwon, Sungmin Cho, Nam Su Chang, Kisoon Yoon, Chang Han, Young-Ho Park, Seokhie Hong, Vol. 26, No. 5, pp. 1121-1130, Oct. 2016
    10.13089/JKIISC.2016.26.5.1121
    Keywords: GNFS, CADO-NFS, Polynomial Selection

    Efficient Optimization Method for Polynomial Selection
    Suhri Kim, Heetaek Kwon, Yongseong Lee, Nam Su Chang, Kisoon Yoon, Chang Han Kim, Young-Ho Park, Seokhie Hong, Vol. 26, No. 3, pp. 631-644, Jun. 2016
    10.13089/JKIISC.2016.26.3.631
    Keywords: GNFS, Polynomial Selection, Root optimization

    A generating method of CM parameters of pairing-friendly abelian surfaces using Brezing-Weng family
    Kisoon Yoon, Young-Ho Park, Nam Su Chang, Vol. 25, No. 3, pp. 567-572, Jun. 2015
    10.13089/JKIISC.2015.25.3.567
    Keywords: abelian variety, Brezing-Weng method, pairing-based cryptography, complex multiplication

    Fault Detection Architecture of the Field Multiplication Using Gaussian Normal Bases in GF(2n
    Chang Han Kim, Nam Su Chang, Young Ho Park, Vol. 24, No. 1, pp. 41-50, Feb. 2014
    10.13089/JKIISC.2014.24.1.41
    Keywords: Finite fields, Normal basis, Multiplication, Error Detection

    An efficient exponentiation method against side channel attacks in Torus-Based-Cryptosystem
    Young-Ho Park, Nam Su Chang, Vol. 23, No. 3, pp. 561-570, Jun. 2013
    10.13089/JKIISC.2013.23.3.561
    Keywords: Torus-Based-Cryptosystem, Quotient Group, Side Channel Attack, SPA, DPA, Finite Field, public key cryptosystem