Jongseok Choi

According to our database1, Jongseok Choi authored at least 25 papers between 2012 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Erratum to: Secure IoT framework and 2D architecture for End-To-End security.
J. Supercomput., 2018

Secure IoT framework and 2D architecture for End-To-End security.
J. Supercomput., 2018

Secure GCM implementation on AVR.
Discret. Appl. Math., 2018

2016
Hybrid Montgomery Reduction.
ACM Trans. Embed. Comput. Syst., 2016

Binary field multiplication on ARMv8.
Secur. Commun. Networks, 2016

A fast ARX model-based image encryption scheme.
Multim. Tools Appl., 2016

Slowloris DoS Countermeasure over WebSocket.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

2015
Optimized Karatsuba squaring on 8-bit AVR processors.
Secur. Commun. Networks, 2015

Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields.
Secur. Commun. Networks, 2015

Secure Binary Field Multiplication.
IACR Cryptol. ePrint Arch., 2015

Faster ECC over F<sub>2<sup>571</sup></sub> (feat. PMULL).
IACR Cryptol. ePrint Arch., 2015

Compact Implementations of LEA Block Cipher for Low-End Microprocessors.
IACR Cryptol. ePrint Arch., 2015

Montgomery multiplication and squaring for Optimal Prime Fields.
Comput. Secur., 2015

Open Sesame! Hacking the Password.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Compact Implementations of LSH.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

The patient-centric mobile healthcare system enhancing sensor connectivity and data interoperability.
Proceedings of the International Conference on Recent Advances in Internet of Things, 2015

Faster ECC over F<sub>2<sup>521</sup>-1</sub> (feat. NEON).
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

2014
Small Private Key <i>MQ</i>PKS on an Embedded Microprocessor.
Sensors, 2014

Montgomery Modular Multiplication on ARM-NEON Revisited.
IACR Cryptol. ePrint Arch., 2014

Improved Modular Multiplication for Optimal Prime Fields.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Short paper: Surveillance system with light sensor.
Proceedings of the IEEE World Forum on Internet of Things, 2014

Pseudo random number generator and Hash function for embedded microprocessors.
Proceedings of the IEEE World Forum on Internet of Things, 2014

2013
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

Parallel Implementations of LEA.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

2012
Dynamic Tag Identity-Based Encryption Scheme for Logistic Systems.
Proceedings of the Dynamics in Logistics, Third International Conference, 2012


  Loading...