default search action
Kee-Won Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j15]Kee-Won Kim:
Bit-Parallel Systolic Architecture for AB and AB2 Multiplications over GF(2m). IEICE Trans. Electron. 105-C(5): 203-206 (2022)
2010 – 2019
- 2019
- [j14]Kee-Won Kim:
Low-latency semi-systolic architecture for multiplication over finite fields. IEICE Electron. Express 16(10): 20190080 (2019) - 2018
- [j13]Kee-Won Kim, Seung-Hoon Kim:
Efficient bit-parallel systolic architecture for multiplication and squaring over GF(2m). IEICE Electron. Express 15(2): 20171195 (2018) - [c26]Chan Cheong, Kee-Won Kim, Seung-Hoon Kim:
Design of the Platform Architecture Providing Information for Barrier-Free Tourism. AIKE 2018: 204-207 - 2017
- [j12]Kee-Won Kim, Jae-Dong Lee:
Efficient unified semi-systolic arrays for multiplication and squaring over GF(2m). IEICE Electron. Express 14(12): 20170458 (2017) - [c25]Kee-Won Kim, Hyun-Ho Lee, Seung-Hoon Kim:
Low-Latency Radix-4 Multiplication Algorithm over Finite Fields. FDSE 2017: 64-72 - [c24]Hyun-Ho Lee, Min-Ha Hong, Kee-Won Kim, Seung-Hoon Kim:
Comparative study on book similarity measurement method based on characters in the body of a book written in Korean. ICSCA 2017: 83-86 - [c23]Hyun-Ho Lee, Tai-Wan Kim, Kee-Won Kim:
Efficient montgomery AB2 multiplier for finite fields defined by irreducible all-one polynomials. ICSCA 2017: 218-222 - 2016
- [j11]Jihun Kim, Kee-Won Kim, Ju Han Kim:
Semantic Signature: Comparative Interpretation of Gene Expression on a Semantic Space. Comput. Math. Methods Medicine 2016: 5174503:1-5174503:10 (2016) - [c22]Kee-Won Kim, Seung-Hoon Kim:
Design of a Low-Latency Multiplication Algorithm for Finite Fields. ICSI (2) 2016: 271-278 - 2015
- [j10]Kee-Won Kim, Jun-Cheol Jeon:
A semi-systolic Montgomery multiplier over GF(2m). IEICE Electron. Express 12(21): 20150769 (2015) - 2014
- [j9]Kee-Won Kim, Jae-Dong Lee:
On the Security of Two Remote User Authentication Schemes for Telecare Medical Information Systems. J. Medical Syst. 38(5): 17 (2014) - 2013
- [j8]Kee-Won Kim, Seung-Hoon Kim:
A low latency semi-systolic multiplier over GF(2m). IEICE Electron. Express 10(13): 20130354 (2013) - [j7]Kee-Won Kim, Won-Jin Lee:
An efficient parallel systolic array for AB2 over GF(2m). IEICE Electron. Express 10(20): 20130585 (2013) - [c21]Kee-Won Kim, Jun-Cheol Jeon:
Design of Parallel Pipelined Algorithm for Field Arithmetic Architecture Based on Cellular Array. GPC 2013: 920-925 - 2012
- [c20]Kee-Won Kim, Jun-Cheol Jeon:
Cellular semi-systolic Montgomery Multiplier on finite fields. CyberSec 2012: 1-5 - [c19]Jun-Cheol Jeon, Kang-Joong Seo, Kee-Won Kim:
Hardware complexity of SHA-1 and SHA-256 based on area and time analysis. ICOIN 2012: 557-561
2000 – 2009
- 2007
- [j6]Kee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo:
Efficient and secure password authentication schemes for low-power devices. Int. J. Sens. Networks 2(1/2): 77-81 (2007) - 2006
- [j5]Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo:
A novel approach for bit-serial AB2 multiplication in finite fields GF(2m). Comput. Math. Appl. 51(6-7): 1103-1112 (2006) - [c18]Jun-Cheol Jeon, Kee-Won Kim, Byung-Heon Kang, Kee-Young Yoo:
Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware. International Conference on Computational Science (3) 2006: 329-336 - [c17]Jun-Cheol Jeon, Kee-Won Kim, Jai-Boo Oh, Kee-Young Yoo:
Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA. International Conference on Computational Science (4) 2006: 661-668 - 2005
- [j4]Kee-Won Kim, Eun-Kyung Ryu, Kee-Young Yoo:
Cryptanalysis of Lee-Lee authenticated key agreement scheme. Appl. Math. Comput. 163(1): 193-198 (2005) - [j3]Kee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo:
An improvement on Yang et al.'s password authentication schemes. Appl. Math. Comput. 170(1): 207-215 (2005) - [c16]Hee-Jung Yoon, Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo:
A Secure One-Time Password Authentication Using Cellular Automata. CAINE 2005: 376-381 - [c15]Hye-Jin Yang, Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo:
New Authentication Scheme with No Verification Table. CAINE 2005: 387-389 - [c14]Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo:
Evolutionary Hardware Architecture for Division in Elliptic Curve Cryptosystems over GF(2n). ICNC (3) 2005: 348-355 - [c13]Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo:
Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks. MADNES 2005: 110-116 - [c12]Kee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo:
Efficient and Secure Password Authentication Schemes for Low-Power Devices. MSN 2005: 73-82 - [c11]Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo:
Low-Complexity Authentication Scheme Based on Cellular Automata in Wireless Network. MSN 2005: 413-421 - 2004
- [c10]Eun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo:
An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack. ICCSA (4) 2004: 603-610 - [c9]Kee-Won Kim, Eun-Kyung Ryu, Kee-Young Yoo:
ID-Based Authenticated Multiple-Key Agreement Protocol from Pairings. ICCSA (4) 2004: 672-680 - 2003
- [j2]Keon-Jik Lee, Kee-Won Kim, Won-Ho Lee, Young-Jun Heo, Kee-Young Yoo:
Design of a Linear Systolic Modular Multiplier/Squarer for the Fast Modular Exponentiation. Int. J. Comput. Their Appl. 10(1): 34-42 (2003) - [c8]Kee-Won Kim, Eun-Kyung Ryu, Hyung-Mok Lee, Kee-Young Yoo:
A New Authenticated Key Agreement Protocol. CAINE 2003: 91-94 - [c7]Hyoung-Mok Lee, Eun-Kyung Ryu, Kee-Won Kim, Jae-Min Lee, Kee-Young Yoo:
A Robust Authenticated Key Agreement Protocol. CATA 2003: 76-79 - [c6]Eun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo:
A Promising Key Agreement Protocol. ISAAC 2003: 655-662 - 2002
- [j1]Keon-Jik Lee, Kee-Won Kim, Kee-Young Yoo:
Digit-serial-in-serial-out systolic multiplier for Montgomery algorithm. Inf. Process. Lett. 82(2): 65-71 (2002) - [c5]Nam-Yeun Kim, Hyun-Sung Kim, Won-Ho Lee, Kee-Won Kim, Kee-Young Yoo:
New AB2 Systolic Architectures in GF(2m). CATA 2002: 394-397 - [c4]Won-Ho Lee, Kee-Won Kim, Nam-Yeun Kim, Kee-Young Yoo, Chang Hoon Kim, Chun Pyo Hong:
Architecture for AB2 Operation over GF(2m) using Irreducible AOP and Its Applications. CATA 2002: 446-449 - 2001
- [c3]Keon-Jik Lee, Kee-Won Kim, Kee-Young Yoo:
Digit Serial-In-Serial-Out Systolic Multiplier for Montogomery's Algorithm. PDCS 2001: 500-504 - [c2]Keon-Jik Lee, Kee-Won Kim, Kee-Young Yoo:
Bit-Serial Systolic Multiplier/Squarer for Montgomery's Algorithm. CAINE 2001: 70-73 - [c1]Kee-Won Kim, Keon-Jik Lee, Kee-Young Yoo:
Efficient Digital-Serial Systolic Multiplier for Finite Fields GF(2m). CAINE 2001: 205-208
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint