Elliptic-curve-based security processor for RFID YK Lee, K Sakiyama, L Batina, I Verbauwhede IEEE Transactions on Computers 57 (11), 1514-1527, 2008 | 296 | 2008 |
EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol YK Lee, L Batina, I Verbauwhede 2008 IEEE international conference on RFID, 97-104, 2008 | 177 | 2008 |
8.7 Physically unclonable function for secure key generation with a key error rate of 2E-38 in 45nm smart-card chips B Karpinskyy, Y Lee, Y Choi, Y Kim, M Noh, S Lee 2016 IEEE International Solid-State Circuits Conference (ISSCC), 158-160, 2016 | 121 | 2016 |
Low-cost untraceable authentication protocols for RFID YK Lee, L Batina, D Singelée, I Verbauwhede Proceedings of the third ACM conference on Wireless network security, 55-64, 2010 | 120 | 2010 |
Untraceable RFID authentication protocols: Revision of EC-RAC YK Lee, L Batina, I Verbauwhede 2009 IEEE international conference on RFID, 178-185, 2009 | 100 | 2009 |
Secure and low-cost RFID authentication protocols Y Lee, I Verbauwhede 2nd IEEE International Workshop on Adaptive Wireless Networks (AWiN 2005), 1-5, 2005 | 64 | 2005 |
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs L Batina, YK Lee, S Seys, D Singelée, I Verbauwhede Personal and Ubiquitous Computing 16, 323-335, 2012 | 49 | 2012 |
Throughput optimized SHA-1 architecture using unfolding transformation YK Lee, H Chan, I Verbauwhede IEEE 17th international conference on application-specific systems …, 2006 | 40 | 2006 |
Physically unclonable function in 28nm fdsoi technology achieving high reliability for aec-q 100 grade 1 and iso 26262 asil-b Y Choi, B Karpinskyy, KM Ahn, Y Kim, S Kwon, J Park, Y Lee, M Noh 2020 IEEE International Solid-State Circuits Conference-(ISSCC), 426-428, 2020 | 36 | 2020 |
Iteration bound analysis and throughput optimum architecture of SHA-256 (384,512) for hardware implementations YK Lee, H Chan, I Verbauwhede Information Security Applications: 8th International Workshop, WISA 2007 …, 2007 | 32 | 2007 |
Privacy-preserving ECC-based grouping proofs for RFID L Batina, YK Lee, S Seys, D Singelée, I Verbauwhede Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011 | 30 | 2011 |
A compact architecture for montgomery elliptic curve scalar multiplication processor YK Lee, I Verbauwhede Information Security Applications: 8th International Workshop, WISA 2007 …, 2007 | 29 | 2007 |
Semiconductor device generating security key, method of generating security key, and method of enrolling security key YS Kim, M Noh, B Karpinskyy, AHN KyoungMoon, YK Lee, Y Choi US Patent 10,476,681, 2019 | 24 | 2019 |
Anti-counterfeiting, untraceability and other security challenges for RFID systems: Public-key-based protocols and hardware YK Lee, L Batina, D Singelee, B Preneel, I Verbauwhede Towards Hardware-Intrinsic Security: Foundations and Practice, 237-257, 2010 | 23 | 2010 |
Wide–weak privacy–preserving RFID authentication protocols YK Lee, L Batina, D Singelée, I Verbauwhede Mobile Lightweight Wireless Systems: Second International ICST Conference …, 2010 | 22 | 2010 |
Privacy challenges in RFID systems YK Lee, L Batina, I Verbauwhede The Internet of Things: 20 th Tyrrhenian Workshop on Digital Communications …, 2010 | 21 | 2010 |
On the high-throughput implementation of ripemd-160 hash algorithm M Knezzevic, K Sakiyama, YK Lee, I Verbauwhede 2008 International Conference on Application-Specific Systems, Architectures …, 2008 | 20 | 2008 |
One-time templates for face authentication Y Lee, Y Lee, Y Chung, K Moon 2007 International Conference on Convergence Information Technology (ICCIT …, 2007 | 18 | 2007 |
Integrated circuit for physically unclonable function and device including the same B Karpinskyy, DH Kim, MJ Noh, SW Park, YK Lee, Y Choi US Patent 10,439,613, 2019 | 16 | 2019 |
Design methodology for throughput optimum architectures of hash algorithms of the MD4-class YK Lee, H Chan, I Verbauwhede Journal of Signal Processing Systems 53, 89-102, 2008 | 11 | 2008 |