Jun-Cheol Jeon

Orcid: 0000-0002-0243-9063

According to our database1, Jun-Cheol Jeon authored at least 47 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Multi-Layered QCA Content-Addressable Memory Cell Using Low-Power Electronic Interaction for AI-Based Data Learning and Retrieval in Quantum Computing Environment.
Sensors, 2023

2022
Quantum LFSR Structure for Random Number Generation Using QCA Multilayered Shift Register for Cryptographic Purposes.
Sensors, 2022

2021
Designing nanotechnology QCA-multiplexer using majority function-based NAND for quantum computing.
J. Supercomput., 2021

2020
Low-complexity QCA universal shift register design using multiplexer and D flip-flop based on electronic correlations.
J. Supercomput., 2020

Design of high-performance QCA incrementer/decrementer circuit based on adder/subtractor methodology.
Microprocess. Microsystems, 2020

2015
A semi-systolic Montgomery multiplier over <i>GF</i>(2<i><sup>m</sup></i>).
IEICE Electron. Express, 2015

2014
Design of a cellular automata cell with rule 30 on quantum-dot cellular automata.
Proceedings of the Symposium on Applied Computing, 2014

2013
Reduction of the Radiating Sound of a Submerged Finite Cylindrical Shell Structure by Active Vibration Control.
Sensors, 2013

Key Distribution Protocol on Quantum Cryptography.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

Design of Parallel Pipelined Algorithm for Field Arithmetic Architecture Based on Cellular Array.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

2012
Hardware complexity of SHA-1 and SHA-256 based on area and time analysis.
Proceedings of the 2012 International Conference on Information Networking, 2012

One-Way Hash Function Based on Cellular Automata.
Proceedings of the International Conference on IT Convergence and Security, 2012

Cellular semi-systolic Montgomery Multiplier on finite fields.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2010
Non-linear and non-group cellular automata chaining technique for cryptographic applications.
Math. Comput. Model., 2010

2009
A Reinforced Authentication Protocol for Anti-Counterfeiting and Privacy Protection.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

2008
Elliptic curve based hardware architecture using cellular automata.
Math. Comput. Simul., 2008

Montgomery exponent architecture based on programmable cellular automata.
Math. Comput. Simul., 2008

2007
Efficient and secure password authentication schemes for low-power devices.
Int. J. Sens. Networks, 2007

Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns.
Appl. Math. Comput., 2007

Programmable cellular automata based Montgomery hardware architecture.
Appl. Math. Comput., 2007

Non-linear and Non-group Cellular Automata for Cryptographic Applications.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
A novel approach for bit-serial AB<sup>2</sup> multiplication in finite fields GF(2<sup>m</sup>).
Comput. Math. Appl., 2006

Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

An Improvement of Remote User Authentication Scheme Using Smart Cards.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006

Evolutionary Algorithms for Group/Non-group Decision in Periodic Boundary CA.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006

Conflict Detection in Role-Based Access Control Using Multiple-Attractor Cellular Automata.
Proceedings of the Intelligent Computing, 2006

Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA.
Proceedings of the Computational Science, 2006

Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware.
Proceedings of the Computational Science, 2006

Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition.
Proceedings of the Cellular Automata, 2006

Authentication Based on Singular Cellular Automata.
Proceedings of the Cellular Automata, 2006

Cellular Automata Based Role-Delegation in RBAC.
Proceedings of the Cellular Automata, 2006

2005
An improvement on Yang et al.'s password authentication schemes.
Appl. Math. Comput., 2005

Low-Complexity Authentication Scheme Based on Cellular Automata in Wireless Network.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Evolutionary Hardware Architecture for Division in Elliptic Curve Cryptosystems over GF(2<sup>n</sup>).
Proceedings of the Advances in Natural Computation, First International Conference, 2005

A Secure One-Time Password Authentication Using Cellular Automata.
Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering, 2005

New Authentication Scheme with No Verification Table.
Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering, 2005

2004
A security scheme for protecting security policies in firewall.
ACM SIGOPS Oper. Syst. Rev., 2004

Design of Montgomery Multiplication Architecture Based on Programmable Cellular Automata.
Comput. Intell., 2004

An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields.
Proceedings of the PRICAI 2004: Trends in Artificial Intelligence, 2004

An Efficient Access Control Model Based on User-Classification and Role-Division.
Proceedings of the International Conference on Security and Management, 2004

2003
Computational Algorithm and Architecture for AB2 Multiplication in Finite Fields.
Proceedings of the Computational Science and Its Applications, 2003

Design of Montgomery multiplication architecture based on programmable cellular automata.
Proceedings of the IEEE Congress on Evolutionary Computation, 2003

An Efficient Multiplication Architecture using Montgomery Algorithm based on Programmable Cellular Automata.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003

Design of Bit-parallel Multiplier Based on Programmable Cellular Automata.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003

2002
Bit-serial AB2 Multiplier Using Modified Inner Product.
J. Inf. Sci. Eng., 2002


  Loading...