Follow
Yong Ki Lee
Yong Ki Lee
Samsung Electronics
Verified email at snu.ac.kr
Title
Cited by
Cited by
Year
Elliptic-curve-based security processor for RFID
YK Lee, K Sakiyama, L Batina, I Verbauwhede
IEEE Transactions on Computers 57 (11), 1514-1527, 2008
2842008
EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol
YK Lee, L Batina, I Verbauwhede
2008 IEEE international conference on RFID, 97-104, 2008
1642008
Low-cost untraceable authentication protocols for RFID
YK Lee, L Batina, D Singelée, I Verbauwhede
Proceedings of the third ACM conference on Wireless network security, 55-64, 2010
1182010
8.7 physically unclonable function for secure key generation with a key error rate of 2E-38 in 45nm smart-card chips
B Karpinskyy, Y Lee, Y Choi, Y Kim, M Noh, S Lee
2016 IEEE International Solid-State Circuits Conference (ISSCC), 158-160, 2016
1012016
Untraceable RFID authentication protocols: Revision of EC-RAC
YK Lee, L Batina, I Verbauwhede
2009 IEEE international conference on RFID, 178-185, 2009
942009
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
L Batina, YK Lee, S Seys, D Singelée, I Verbauwhede
Personal and Ubiquitous Computing 16 (3), 323-335, 2012
482012
Throughput optimized SHA-1 architecture using unfolding transformation
YK Lee, H Chan, I Verbauwhede
IEEE 17th international conference on application-specific systems …, 2006
402006
Iteration bound analysis and throughput optimum architecture of SHA-256 (384,512) for hardware implementations
YK Lee, H Chan, I Verbauwhede
International Workshop on Information Security Applications, 102-114, 2007
322007
A compact architecture for montgomery elliptic curve scalar multiplication processor
YK Lee, I Verbauwhede
International Workshop on Information Security Applications, 115-127, 2007
292007
Privacy-preserving ECC-based grouping proofs for RFID
L Batina, YK Lee, S Seys, D Singelée, I Verbauwhede
International conference on information security, 159-165, 2010
282010
Physically unclonable function in 28nm fdsoi technology achieving high reliability for aec-q 100 grade 1 and iso 26262 asil-b
Y Choi, B Karpinskyy, KM Ahn, Y Kim, S Kwon, J Park, Y Lee, M Noh
2020 IEEE International Solid-State Circuits Conference-(ISSCC), 426-428, 2020
262020
Anti-counterfeiting, untraceability and other security challenges for RFID systems: Public-key-based protocols and hardware
YK Lee, L Batina, D Singelee, B Preneel, I Verbauwhede
Towards Hardware-Intrinsic Security, 237-257, 2010
212010
Privacy challenges in RFID systems
YK Lee, L Batina, I Verbauwhede
The Internet of Things, 397-407, 2010
202010
Wide–weak privacy–preserving RFID authentication protocols
YK Lee, L Batina, D Singelée, I Verbauwhede
International Conference on Mobile Lightweight Wireless Systems, 254-267, 2010
192010
On the high-throughput implementation of ripemd-160 hash algorithm
M Knezzevic, K Sakiyama, YK Lee, I Verbauwhede
2008 International Conference on Application-Specific Systems, Architectures …, 2008
192008
Semiconductor device generating security key, method of generating security key, and method of enrolling security key
YS Kim, M Noh, B Karpinskyy, AHN KyoungMoon, YK Lee, Y Choi
US Patent 10,476,681, 2019
162019
One-time templates for face authentication
Y Lee, Y Lee, Y Chung, K Moon
2007 International Conference on Convergence Information Technology (ICCIT …, 2007
162007
Design methodology for throughput optimum architectures of hash algorithms of the MD4-class
YK Lee, H Chan, I Verbauwhede
Journal of Signal Processing Systems 53 (1), 89-102, 2008
112008
Integrated circuit for physically unclonable function and device including the same
B Karpinskyy, DH Kim, MJ Noh, SW Park, YK Lee, Y Choi
US Patent 10,439,613, 2019
82019
Signal processing for cryptography and security applications
M Knežević, L Batina, ED Mulder, J Fan, B Gierlichs, YK Lee, R Maes, ...
Handbook of Signal Processing Systems, 223-241, 2013
72013
The system can't perform the operation now. Try again later.
Articles 1–20