Cheol-Min Park

Orcid: 0000-0001-5257-7723

According to our database1, Cheol-Min Park authored at least 27 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Exploring the effects of high curvature section distribution and density in termite tunnels on food transport efficiency: A simulation study.
Biosyst., September, 2023

2022
Characteristics of Peak and Cliff in Branch Length Similarity Entropy Profiles for Binary Time-Series and Their Application.
IEEE Access, 2022

2021
Novel Features for Binary Time Series Based on Branch Length Similarity Entropy.
Entropy, 2021

A New Measure to Characterize the Self-Similarity of Binary Time Series and its Application.
IEEE Access, 2021

2020
A High-Speed Public-Key Signature Scheme for 8-b IoT-Constrained Devices.
IEEE Internet Things J., 2020

A New Measure to Characterize the Degree of Self-Similarity of a Shape and Its Applicability.
Entropy, 2020

An Efficient MQ-Signature Scheme Based on Sparse Polynomials.
IEEE Access, 2020

2018
Cryptanalysis of Matrix-based UOV.
Finite Fields Their Appl., 2018

Desmoid-type fibromatosis mimicking cystic retroperitoneal mass: case report and literature review.
BMC Medical Imaging, 2018

2017
Cryptanalysis of RGB, a mixed multivariate signature scheme.
Finite Fields Their Appl., 2017

Security Analysis of Improved Cubic UOV Signature Schemes.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

An Existential Unforgeable Signature Scheme Based on Multivariate Quadratic Equations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2015
A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015

Lite-Rainbow: Lightweight Signature Schemes Based on Multivariate Quadratic Equations and Their Secure Implementations.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

2014
Equivalent public keys and a key substitution attack on the schemes from vector decomposition.
Secur. Commun. Networks, 2014

Polynomial generating pairing and its criterion for optimal pairing.
Appl. Algebra Eng. Commun. Comput., 2014

2013
Simple and exact formula for minimum loop length in Ate i pairing based on Brezing-Weng curves.
Des. Codes Cryptogr., 2013

EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks.
Ad Hoc Networks, 2013

2012
A short redactable signature scheme using pairing.
Secur. Commun. Networks, 2012

2011
Simple and Exact Formula for Minimum Loop Length in Ate<sub>i</sub> Pairing based on Brezing-Weng Curves.
IACR Cryptol. ePrint Arch., 2011

Optimal pairing computation over families of pairing-friendly elliptic curves.
Appl. Algebra Eng. Commun. Comput., 2011

Implementation of Bilinear Pairings over Elliptic Curves with Embedding Degree 24.
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011

2009
Efficient and Generalized Pairing Computation on Abelian Varieties.
IEEE Trans. Inf. Theory, 2009

Generating Pairing-Friendly Curves with the CM Equation of Degree 1.
Proceedings of the Pairing-Based Cryptography, 2009

2005
Energy-Efficiency Method for Cluster-Based Sensor Networks.
Proceedings of the Computational Science and Its Applications, 2005

Energy-Aware Broadcasting Method for Wireless Sensor Network.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

A Remark on Implementing the Weil Pairing.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005


  Loading...