Follow
Jongseok Choi
Jongseok Choi
Verified email at pusan.ac.kr
Title
Cited by
Cited by
Year
Secure IoT framework and 2D architecture for End-To-End security
J Choi, Y In, C Park, S Seok, H Seo, H Kim
The Journal of Supercomputing 74, 3521-3535, 2018
462018
Montgomery modular multiplication on ARM-NEON revisited
H Seo, Z Liu, J Großschädl, J Choi, H Kim
Information Security and Cryptology-ICISC 2014: 17th International …, 2015
382015
Multi-precision squaring for public-key cryptography on embedded microprocessors
H Seo, Z Liu, J Choi, H Kim
International Conference on Cryptology in India, 227-243, 2013
382013
Compact implementations of LEA block cipher for low-end microprocessors
H Seo, Z Liu, J Choi, T Park, H Kim
International Workshop on Information Security Applications, 28-40, 2015
302015
A fast ARX model-based image encryption scheme
J Choi, S Seok, H Seo, H Kim
Multimedia Tools and Applications 75, 14685-14706, 2016
242016
Parallel implementations of LEA
H Seo, Z Liu, T Park, H Kim, Y Lee, J Choi, H Kim
International Conference on Information Security and Cryptology, 256-274, 2013
242013
Faster ECC over (feat. NEON)
H Seo, Z Liu, Y Nogami, T Park, J Choi, L Zhou, H Kim
Information Security and Cryptology-ICISC 2015: 18th International …, 2016
152016
Karatsuba–Block‐Comb technique for elliptic curve cryptography over binary fields
H Seo, Z Liu, J Choi, H Kim
Security and Communication Networks 8 (17), 3121-3130, 2015
142015
Pseudo random number generator and hash function for embedded microprocessors
H Seo, J Choi, H Kim, T Park, H Kim
2014 IEEE World Forum on Internet of Things (WF-IoT), 37-40, 2014
142014
Binary field multiplication on ARMv8
H Seo, Z Liu, Y Nogami, J Choi, H Kim
Security and Communication Networks 9 (13), 2051-2058, 2016
102016
A Novel Approach for SMS security
J Choi, H Kim
International Journal of Security and Its Applications 6 (2), 373-378, 2012
102012
Secure GCM implementation on AVR
Z Liu, H Seo, CN Chen, Y Nogami, T Park, J Choi, H Kim
Discrete Applied Mathematics 241, 58-66, 2018
82018
Slowloris dos countermeasure over websocket
J Choi, J Park, S Heo, N Park, H Kim
Information Security Applications: 17th International Workshop, WISA 2016 …, 2017
72017
Optimized Karatsuba squaring on 8‐bit AVR processors
H Seo, Z Liu, J Choi, H Kim
Security and Communication Networks 8 (18), 3546-3554, 2015
72015
Three-party key exchange protocol providing user anonymity based on smartcards
JS Choi, SS Shin, KH Han
Journal of the Korea Academia-Industrial cooperation Society 10 (2), 388-395, 2009
72009
Hybrid montgomery reduction
H Seo, Z Liu, Y Nogami, J Choi, H Kim
ACM Transactions on Embedded Computing Systems (TECS) 15 (3), 1-13, 2016
62016
Secure binary field multiplication
H Seo, CN Chen, Z Liu, Y Nogami, T Park, J Choi, H Kim
International Workshop on Information Security Applications, 161-173, 2015
62015
Small private key MQPKS on an embedded microprocessor
H Seo, J Kim, J Choi, T Park, Z Liu, H Kim
Sensors 14 (3), 5441-5458, 2014
62014
Compact implementations of LSH
T Park, H Seo, Z Liu, J Choi, H Kim
International Workshop on Information Security Applications, 41-53, 2015
52015
Parallel implementation of number theoretic transform
H Seo, Z Liu, Y Nogami, J Choi, T Park, H Kim
Cryptology ePrint Archive, 2015
52015
The system can't perform the operation now. Try again later.
Articles 1–20