Παρακολούθηση
Yong Ki Lee
Yong Ki Lee
Samsung Electronics
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα snu.ac.kr
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Elliptic-curve-based security processor for RFID
YK Lee, K Sakiyama, L Batina, I Verbauwhede
IEEE Transactions on Computers 57 (11), 1514-1527, 2008
2962008
EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol
YK Lee, L Batina, I Verbauwhede
2008 IEEE international conference on RFID, 97-104, 2008
1772008
8.7 Physically unclonable function for secure key generation with a key error rate of 2E-38 in 45nm smart-card chips
B Karpinskyy, Y Lee, Y Choi, Y Kim, M Noh, S Lee
2016 IEEE International Solid-State Circuits Conference (ISSCC), 158-160, 2016
1212016
Low-cost untraceable authentication protocols for RFID
YK Lee, L Batina, D Singelée, I Verbauwhede
Proceedings of the third ACM conference on Wireless network security, 55-64, 2010
1202010
Untraceable RFID authentication protocols: Revision of EC-RAC
YK Lee, L Batina, I Verbauwhede
2009 IEEE international conference on RFID, 178-185, 2009
1002009
Secure and low-cost RFID authentication protocols
Y Lee, I Verbauwhede
2nd IEEE International Workshop on Adaptive Wireless Networks (AWiN 2005), 1-5, 2005
642005
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
L Batina, YK Lee, S Seys, D Singelée, I Verbauwhede
Personal and Ubiquitous Computing 16, 323-335, 2012
492012
Throughput optimized SHA-1 architecture using unfolding transformation
YK Lee, H Chan, I Verbauwhede
IEEE 17th international conference on application-specific systems …, 2006
402006
Physically unclonable function in 28nm fdsoi technology achieving high reliability for aec-q 100 grade 1 and iso 26262 asil-b
Y Choi, B Karpinskyy, KM Ahn, Y Kim, S Kwon, J Park, Y Lee, M Noh
2020 IEEE International Solid-State Circuits Conference-(ISSCC), 426-428, 2020
362020
Iteration bound analysis and throughput optimum architecture of SHA-256 (384,512) for hardware implementations
YK Lee, H Chan, I Verbauwhede
Information Security Applications: 8th International Workshop, WISA 2007 …, 2007
322007
Privacy-preserving ECC-based grouping proofs for RFID
L Batina, YK Lee, S Seys, D Singelée, I Verbauwhede
Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011
302011
A compact architecture for montgomery elliptic curve scalar multiplication processor
YK Lee, I Verbauwhede
Information Security Applications: 8th International Workshop, WISA 2007 …, 2007
292007
Semiconductor device generating security key, method of generating security key, and method of enrolling security key
YS Kim, M Noh, B Karpinskyy, AHN KyoungMoon, YK Lee, Y Choi
US Patent 10,476,681, 2019
242019
Anti-counterfeiting, untraceability and other security challenges for RFID systems: Public-key-based protocols and hardware
YK Lee, L Batina, D Singelee, B Preneel, I Verbauwhede
Towards Hardware-Intrinsic Security: Foundations and Practice, 237-257, 2010
232010
Wide–weak privacy–preserving RFID authentication protocols
YK Lee, L Batina, D Singelée, I Verbauwhede
Mobile Lightweight Wireless Systems: Second International ICST Conference …, 2010
222010
Privacy challenges in RFID systems
YK Lee, L Batina, I Verbauwhede
The Internet of Things: 20 th Tyrrhenian Workshop on Digital Communications …, 2010
212010
On the high-throughput implementation of ripemd-160 hash algorithm
M Knezzevic, K Sakiyama, YK Lee, I Verbauwhede
2008 International Conference on Application-Specific Systems, Architectures …, 2008
202008
One-time templates for face authentication
Y Lee, Y Lee, Y Chung, K Moon
2007 International Conference on Convergence Information Technology (ICCIT …, 2007
182007
Integrated circuit for physically unclonable function and device including the same
B Karpinskyy, DH Kim, MJ Noh, SW Park, YK Lee, Y Choi
US Patent 10,439,613, 2019
162019
Design methodology for throughput optimum architectures of hash algorithms of the MD4-class
YK Lee, H Chan, I Verbauwhede
Journal of Signal Processing Systems 53, 89-102, 2008
112008
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20