| Secure IoT framework and 2D architecture for End-To-End security J Choi, Y In, C Park, S Seok, H Seo, H Kim The Journal of Supercomputing 74 (8), 3521-3535, 2018 | 54 | 2018 |
| Montgomery modular multiplication on ARM-NEON revisited H Seo, Z Liu, J Großschädl, J Choi, H Kim International Conference on Information Security and Cryptology, 328-342, 2014 | 40 | 2014 |
| Multi-precision squaring for public-key cryptography on embedded microprocessors H Seo, Z Liu, J Choi, H Kim International Conference on Cryptology in India, 227-243, 2013 | 40 | 2013 |
| Compact implementations of LEA block cipher for low-end microprocessors H Seo, Z Liu, J Choi, T Park, H Kim International Workshop on Information Security Applications, 28-40, 2015 | 34 | 2015 |
| A fast ARX model-based image encryption scheme J Choi, S Seok, H Seo, H Kim Multimedia Tools and Applications 75 (22), 14685-14706, 2016 | 26 | 2016 |
| Parallel implementations of LEA H Seo, Z Liu, T Park, H Kim, Y Lee, J Choi, H Kim International Conference on Information Security and Cryptology, 256-274, 2013 | 25 | 2013 |
| Karatsuba–Block‐Comb technique for elliptic curve cryptography over binary fields H Seo, Z Liu, J Choi, H Kim Security and Communication Networks 8 (17), 3121-3130, 2015 | 16 | 2015 |
| Faster ECC over (feat. NEON) H Seo, Z Liu, Y Nogami, T Park, J Choi, L Zhou, H Kim International Conference on Information Security and Cryptology, 169-181, 2015 | 15 | 2015 |
| Pseudo random number generator and hash function for embedded microprocessors H Seo, J Choi, H Kim, T Park, H Kim 2014 IEEE World Forum on Internet of Things (WF-IoT), 37-40, 2014 | 15 | 2014 |
| Binary field multiplication on ARMv8 H Seo, Z Liu, Y Nogami, J Choi, H Kim Security and Communication Networks 9 (13), 2051-2058, 2016 | 12 | 2016 |
| Secure GCM implementation on AVR Z Liu, H Seo, CN Chen, Y Nogami, T Park, J Choi, H Kim Discrete Applied Mathematics 241, 58-66, 2018 | 8 | 2018 |
| 블록체인 기반 탈중앙화 사물인터넷 플랫폼 연구 최종석, 박종규, 김명길, 김호원 정보보호학회지 27 (6), 5-14, 2017 | 8 | 2017 |
| Secure binary field multiplication H Seo, CN Chen, Z Liu, Y Nogami, T Park, J Choi, H Kim International Workshop on Information Security Applications, 161-173, 2015 | 8 | 2015 |
| Slowloris dos countermeasure over websocket J Choi, J Park, S Heo, N Park, H Kim International Workshop on Information Security Applications, 42-53, 2016 | 7 | 2016 |
| Hybrid montgomery reduction H Seo, Z Liu, Y Nogami, J Choi, H Kim ACM Transactions on Embedded Computing Systems (TECS) 15 (3), 1-13, 2016 | 7 | 2016 |
| Optimized Karatsuba squaring on 8‐bit AVR processors H Seo, Z Liu, J Choi, H Kim Security and Communication Networks 8 (18), 3546-3554, 2015 | 7 | 2015 |
| Three-party key exchange protocol providing user anonymity based on smartcards JS Choi, SS Shin, KH Han Journal of the Korea Academia-Industrial cooperation Society 10 (2), 388-395, 2009 | 7 | 2009 |
| Small private key MQPKS on an embedded microprocessor H Seo, J Kim, J Choi, T Park, Z Liu, H Kim Sensors 14 (3), 5441-5458, 2014 | 6 | 2014 |
| Open sesame! Hacking the password H Seo, Z Liu, G Seo, T Park, J Choi, H Kim International Workshop on Information Security Applications, 215-226, 2015 | 5 | 2015 |
| Compact implementations of LSH T Park, H Seo, Z Liu, J Choi, H Kim International Workshop on Information Security Applications, 41-53, 2015 | 5 | 2015 |