Digital Library
Search: "[ author: 박영호 ]" (40)
On the Use of Odd-Degree Isogenies for Implementing SIDH-Based Cryptography
김수리,
윤기순,
박영호,
Vol. 31, No. 1, pp. 19-30,
Feb.
2021
10.13089/JKIISC.2021.31.1.19
Keywords: Post-Quantum Cryptography, isogeny-based cryptography, SIDH, Post-Quantum Cryptography, isogeny-based cryptography, SIDH
10.13089/JKIISC.2021.31.1.19
Keywords: Post-Quantum Cryptography, isogeny-based cryptography, SIDH, Post-Quantum Cryptography, isogeny-based cryptography, SIDH
Authentication Template Protection Using Function Encryption
박동희,
박영호,
Vol. 29, No. 6, pp. 1319-1326,
Dec.
2019
10.13089/JKIISC.2019.29.6.1319
Keywords: Function encryption, Biometric Authentication, Authentication template protection, Function encryption, Biometric Authentication, Authentication template protection
10.13089/JKIISC.2019.29.6.1319
Keywords: Function encryption, Biometric Authentication, Authentication template protection, Function encryption, Biometric Authentication, Authentication template protection
An Implementation of Supersingular Isogeny Diffie-Hellman and Its Application to Mobile Security Product
Kisoon Yoon,
Jun Yeong Lee,
Suhri Kim,
Jihoon Kwon,
Young-Ho Park,
Vol. 28, No. 1, pp. 73-83,
Feb.
2018
10.13089/JKIISC.2018.28.1.73
Keywords: supersingular isogeny Diffie-Hellman, isogeny-based cryptography, Post-Quantum Cryptography, supersingular isogeny Diffie-Hellman, isogeny-based cryptography, Post-Quantum Cryptography
10.13089/JKIISC.2018.28.1.73
Keywords: supersingular isogeny Diffie-Hellman, isogeny-based cryptography, Post-Quantum Cryptography, supersingular isogeny Diffie-Hellman, isogeny-based cryptography, Post-Quantum Cryptography
An Improved Anonymous Authentication Scheme for Remote Health Monitoring System
Youngho Park,
Si-Wan Noh,
Kyung-Hyune Rhee,
Vol. 26, No. 6, pp. 1551-1560,
Dec.
2016
10.13089/JKIISC.2016.26.6.1551
Keywords: Remote Healthcare, authentication, Anonymity, Key-insulation
10.13089/JKIISC.2016.26.6.1551
Keywords: Remote Healthcare, authentication, Anonymity, Key-insulation
Enhanced Polynomial Selection Method for GNFS
Suhri Kim,
Jihoon Kwon,
Sungmin Cho,
Nam Su Chang,
Kisoon Yoon,
Chang Han,
Young-Ho Park,
Seokhie Hong,
Vol. 26, No. 5, pp. 1121-1130,
Oct.
2016
10.13089/JKIISC.2016.26.5.1121
Keywords: GNFS, CADO-NFS, Polynomial Selection
10.13089/JKIISC.2016.26.5.1121
Keywords: GNFS, CADO-NFS, Polynomial Selection
Efficient Optimization Method for Polynomial Selection
Suhri Kim,
Heetaek Kwon,
Yongseong Lee,
Nam Su Chang,
Kisoon Yoon,
Chang Han Kim,
Young-Ho Park,
Seokhie Hong,
Vol. 26, No. 3, pp. 631-644,
Jun.
2016
10.13089/JKIISC.2016.26.3.631
Keywords: GNFS, Polynomial Selection, Root optimization
10.13089/JKIISC.2016.26.3.631
Keywords: GNFS, Polynomial Selection, Root optimization
A generating method of CM parameters of pairing-friendly abelian surfaces using Brezing-Weng family
Kisoon Yoon,
Young-Ho Park,
Nam Su Chang,
Vol. 25, No. 3, pp. 567-572,
Jun.
2015
10.13089/JKIISC.2015.25.3.567
Keywords: abelian variety, Brezing-Weng method, pairing-based cryptography, complex multiplication
10.13089/JKIISC.2015.25.3.567
Keywords: abelian variety, Brezing-Weng method, pairing-based cryptography, complex multiplication
Fault Detection Architecture of the Field Multiplication Using Gaussian Normal Bases in GF(2n
Chang Han Kim,
Nam Su Chang,
Young Ho Park,
Vol. 24, No. 1, pp. 41-50,
Feb.
2014
10.13089/JKIISC.2014.24.1.41
Keywords: Finite fields, Normal basis, Multiplication, Error Detection
10.13089/JKIISC.2014.24.1.41
Keywords: Finite fields, Normal basis, Multiplication, Error Detection
An efficient exponentiation method against side channel attacks in Torus-Based-Cryptosystem
Young-Ho Park,
Nam Su Chang,
Vol. 23, No. 3, pp. 561-570,
Jun.
2013
10.13089/JKIISC.2013.23.3.561
Keywords: Torus-Based-Cryptosystem, Quotient Group, Side Channel Attack, SPA, DPA, Finite Field, public key cryptosystem
10.13089/JKIISC.2013.23.3.561
Keywords: Torus-Based-Cryptosystem, Quotient Group, Side Channel Attack, SPA, DPA, Finite Field, public key cryptosystem