Taehwan Park

Orcid: 0000-0002-9982-5859

According to our database1, Taehwan Park authored at least 32 papers between 2013 and 2018.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor.
Secur. Commun. Networks, 2018

Secure Data Encryption for Cloud-Based Human Care Services.
J. Sensors, 2018

An Implementation of ECC with Twisted Montgomery Curve over 32nd Degree Tower Field on Arduino Uno.
Int. J. Netw. Comput., 2018

Secure GCM implementation on AVR.
Discret. Appl. Math., 2018

Parallel Implementations of CHAM.
Proceedings of the Information Security Applications - 19th International Conference, 2018

Parallel Implementation of Simeck Family Block Cipher by Using ARM NEON.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Optimization of CHAM Encryption Algorithm Based on Javascript.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

An Effective Classification for DoS Attacks in Wireless Sensor Networks.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

2017
A Comparative Study of Twist Property in KSS Curves of Embedding Degree 16 and 18 from the Implementation Perspective.
J. Inform. and Commun. Convergence Engineering, 2017

Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, Revisited.
Proceedings of the Information Security Applications - 18th International Conference, 2017

ARM/NEON Co-design of Multiplication/Squaring.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Parallel Implementations of SIMON and SPECK, Revisited.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Efficient implementation of simeck family block cipher on 16-bit MSP430.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Optimized implementation of chaskey MAC on 16-bit MSP430.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Compact GCM implementations on 32-bit ARMv7-A processors.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

An ECC Implementation with a Twisted Montgomery Curve over Fq32 on an 8-Bit Microcontroller.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

2016
Secure Message Transmission against Remote Control System.
J. Inform. and Commun. Convergence Engineering, 2016

Efficient Implementation of Simeck Family Block Cipher on 8-Bit Processor.
J. Inform. and Commun. Convergence Engineering, 2016

Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Parallel Implementations of LEA, Revisited.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

2015
Secure Binary Field Multiplication.
IACR Cryptol. ePrint Arch., 2015

Compact Implementations of LEA Block Cipher for Low-End Microprocessors.
IACR Cryptol. ePrint Arch., 2015

Open Sesame! Hacking the Password.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Compact Implementations of LSH.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Faster ECC over F<sub>2<sup>521</sup>-1</sub> (feat. NEON).
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

2014
Small Private Key <i>MQ</i>PKS on an Embedded Microprocessor.
Sensors, 2014

Binary and prime field multiplication for public key cryptography on embedded microprocessors.
Secur. Commun. Networks, 2014

Short paper: Surveillance system with light sensor.
Proceedings of the IEEE World Forum on Internet of Things, 2014

Pseudo random number generator and Hash function for embedded microprocessors.
Proceedings of the IEEE World Forum on Internet of Things, 2014

2013
Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication.
Sensors, 2013

Parallel Implementations of LEA.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013


  Loading...