default search action
Taehwan Park
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j10]Zhe Liu, Hwajeong Seo, Chien-Ning Chen, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim:
Secure GCM implementation on AVR. Discret. Appl. Math. 241: 58-66 (2018) - [j9]Yuta Hashimoto, Md. Al-Amin Khandaker, Yuta Kodera, Taehwan Park, Takuya Kusaka, Howon Kim, Yasuyuki Nogami:
An Implementation of ECC with Twisted Montgomery Curve over 32nd Degree Tower Field on Arduino Uno. Int. J. Netw. Comput. 8(2): 341-350 (2018) - [j8]Taehwan Park, Hwajeong Seo, Sokjoon Lee, Howon Kim:
Secure Data Encryption for Cloud-Based Human Care Services. J. Sensors 2018: 6492592:1-6492592:10 (2018) - [j7]Taehwan Park, Hwajeong Seo, Junsub Kim, Haeryong Park, Howon Kim:
Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor. Secur. Commun. Networks 2018: 7012056:1-7012056:10 (2018) - [c22]Thi-Thu-Huong Le, Taehwan Park, Dongkeun Cho, Howon Kim:
An Effective Classification for DoS Attacks in Wireless Sensor Networks. ICUFN 2018: 689-692 - [c21]Taehwan Park, Hwajeong Seo, Chanhui Park, Howon Kim:
Parallel Implementation of Simeck Family Block Cipher by Using ARM NEON. ICUFN 2018: 703-707 - [c20]Chanhui Park, Taehwan Park, Hwajeong Seo, Howon Kim:
Optimization of CHAM Encryption Algorithm Based on Javascript. ICUFN 2018: 774-778 - [c19]Hwajeong Seo, Kyuhwang An, Hyeokdong Kwon, Taehwan Park, Zhi Hu, Howon Kim:
Parallel Implementations of CHAM. WISA 2018: 93-104 - 2017
- [j6]Md. Al-Amin Khandaker, Taehwan Park, Yasuyuki Nogami, Howon Kim:
A Comparative Study of Twist Property in KSS Curves of Embedding Degree 16 and 18 from the Implementation Perspective. J. Inform. and Commun. Convergence Engineering 15(2) (2017) - [c18]Yuta Hashimoto, Md. Al-Amin Khandaker, Yuta Kodera, Taehwan Park, Takuya Kusaka, Howon Kim, Yasuyuki Nogami:
An ECC Implementation with a Twisted Montgomery Curve over Fq32 on an 8-Bit Microcontroller. CANDAR 2017: 445-450 - [c17]Hwajeong Seo, Zhe Liu, Taehwan Park, Hyeokchan Kwon, Sokjoon Lee, Howon Kim:
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors. ICISC 2017: 175-188 - [c16]Hwajeong Seo, Garam Lee, Taehwan Park, Howon Kim:
Compact GCM implementations on 32-bit ARMv7-A processors. ICTC 2017: 704-707 - [c15]Garam Lee, Hwajeong Seo, Taehwan Park, Howon Kim:
Optimized implementation of chaskey MAC on 16-bit MSP430. ICUFN 2017: 904-909 - [c14]Taehwan Park, Hwajeong Seo, Garam Lee, Howon Kim:
Efficient implementation of simeck family block cipher on 16-bit MSP430. ICUFN 2017: 983-988 - [c13]Hwajeong Seo, Taehwan Park, Janghyun Ji, Howon Kim:
Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, Revisited. WISA 2017: 3-15 - [c12]Hwajeong Seo, Taehwan Park, Janghyun Ji, Zhi Hu, Howon Kim:
ARM/NEON Co-design of Multiplication/Squaring. WISA 2017: 72-84 - [c11]Taehwan Park, Hwajeong Seo, Garam Lee, Md. Al-Amin Khandaker, Yasuyuki Nogami, Howon Kim:
Parallel Implementations of SIMON and SPECK, Revisited. WISA 2017: 283-294 - 2016
- [j5]Taehwan Park, Hwajeong Seo, Bongjin Bae, Howon Kim:
Efficient Implementation of Simeck Family Block Cipher on 8-Bit Processor. J. Inform. and Commun. Convergence Engineering 14(3) (2016) - [j4]Taehwan Park, Hwajeong Seo, Bongjin Bae, Howon Kim:
Secure Message Transmission against Remote Control System. J. Inform. and Commun. Convergence Engineering 14(4) (2016) - [c10]Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Zhi Hu, Lu Zhou, Yasuyuki Nogami, Youwen Zhu, Howon Kim:
Parallel Implementations of LEA, Revisited. WISA 2016: 318-330 - [c9]Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Lu Zhou, Howon Kim:
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward. WISA 2016: 331-340 - 2015
- [c8]Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou, Howon Kim:
Faster ECC over F2521-1 (feat. NEON). ICISC 2015: 169-181 - [c7]Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim:
Compact Implementations of LEA Block Cipher for Low-End Microprocessors. WISA 2015: 28-40 - [c6]Taehwan Park, Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim:
Compact Implementations of LSH. WISA 2015: 41-53 - [c5]Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim:
Secure Binary Field Multiplication. WISA 2015: 161-173 - [c4]Hwajeong Seo, Zhe Liu, Gyuwon Seo, Taehwan Park, Jongseok Choi, Howon Kim:
Open Sesame! Hacking the Password. WISA 2015: 215-226 - [i2]Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim:
Compact Implementations of LEA Block Cipher for Low-End Microprocessors. IACR Cryptol. ePrint Arch. 2015: 732 (2015) - [i1]Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim:
Secure Binary Field Multiplication. IACR Cryptol. ePrint Arch. 2015: 799 (2015) - 2014
- [j3]Hwajeong Seo, Yeoncheol Lee, Hyunjin Kim, Taehwan Park, Howon Kim:
Binary and prime field multiplication for public key cryptography on embedded microprocessors. Secur. Commun. Networks 7(4): 774-787 (2014) - [j2]Hwajeong Seo, Jihyun Kim, Jongseok Choi, Taehwan Park, Zhe Liu, Howon Kim:
Small Private Key MQPKS on an Embedded Microprocessor. Sensors 14(3): 5441-5458 (2014) - [c3]Hwajeong Seo, Jongseok Choi, Hyunjin Kim, Taehwan Park, Howon Kim:
Pseudo random number generator and Hash function for embedded microprocessors. WF-IoT 2014: 37-40 - [c2]Hwajeong Seo, Jongseok Choi, Hyunjin Kim, Taehwan Park, Howon Kim:
Short paper: Surveillance system with light sensor. WF-IoT 2014: 165-166 - 2013
- [j1]Hwajeong Seo, Hyunjin Kim, Taehwan Park, Yeoncheol Lee, Zhe Liu, Howon Kim:
Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication. Sensors 13(7): 9483-9512 (2013) - [c1]Hwajeong Seo, Zhe Liu, Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Jongseok Choi, Howon Kim:
Parallel Implementations of LEA. ICISC 2013: 256-274
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-25 20:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint