default search action
Mun-Kyu Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Hee-Yong Kwon, Indra Bajuna, Mun-Kyu Lee:
Compact Hybrid Signature for Secure Transition to Post-Quantum Era. IEEE Access 12: 39417-39429 (2024) - [j31]Lynin Sokhonn, Yun-Soo Park, Mun-Kyu Lee:
Hierarchical Clustering via Single and Complete Linkage Using Fully Homomorphic Encryption. Sensors 24(15): 4826 (2024) - [i2]Seewoo Lee, Garam Lee, Jung Woo Kim, Junbum Shin, Mun-Kyu Lee:
HETAL: Efficient Privacy-preserving Transfer Learning with Homomorphic Encryption. CoRR abs/2403.14111 (2024) - 2023
- [j30]Dong-Hyeon Ryu, Seong-Yun Jeon, Junho Hong, Mun-Kyu Lee:
Efficient Lp Distance Computation Using Function-Hiding Inner Product Encryption for Privacy-Preserving Anomaly Detection. Sensors 23(8): 4169 (2023) - [c24]Seewoo Lee, Garam Lee, Jung Woo Kim, Junbum Shin, Mun-Kyu Lee:
HETAL: Efficient Privacy-preserving Transfer Learning with Homomorphic Encryption. ICML 2023: 19010-19035 - 2022
- [j29]Jeong-Won Pyo, Sang-Hyeon Bae, Sung-Hyeon Joo, Mun-Kyu Lee, Arpan Ghosh, Tae-Yong Kuc:
Development of an Autonomous Driving Vehicle for Garbage Collection in Residential Areas. Sensors 22(23): 9094 (2022) - [j28]Piljoo Choi, Won Bae Kong, Ji-Hoon Kim, Mun-Kyu Lee, Dong Kyue Kim:
Architectural Supports for Block Ciphers in a RISC CPU Core by Instruction Overloading. IEEE Trans. Computers 71(11): 2844-2857 (2022) - [j27]Hee-Yong Kwon, Mun-Kyu Lee:
Comments on "PassBio: Privacy-Preserving User-Centric Biometric Authentication". IEEE Trans. Inf. Forensics Secur. 17: 2816-2817 (2022) - 2021
- [j26]Turabek Gaybullaev, Hee-Yong Kwon, Taesic Kim, Mun-Kyu Lee:
Efficient and Privacy-Preserving Energy Trading on Blockchain Using Dual Binary Encoding for Inner Product Encryption. Sensors 21(6): 2024 (2021) - [j25]Seong-Yun Jeon, Mun-Kyu Lee:
Acceleration of Inner-Pairing Product Operation for Secure Biometric Verification. Sensors 21(8): 2859 (2021) - [j24]Piljoo Choi, Mun-Kyu Lee, Dong Kyue Kim:
ECC Coprocessor Over a NIST Prime Field Using Fast Partial Montgomery Reduction. IEEE Trans. Circuits Syst. I Regul. Pap. 68(3): 1206-1216 (2021) - 2020
- [j23]Taehyun Kim, Mun-Kyu Lee:
Efficient and Secure Implementation of NTRUEncrypt Using Signed Sliding Window Method. IEEE Access 8: 126591-126605 (2020) - [j22]Jong-Hyuk Im, Seong-Yun Jeon, Mun-Kyu Lee:
Practical Privacy-Preserving Face Authentication for Smartphones Secure Against Malicious Clients. IEEE Trans. Inf. Forensics Secur. 15: 2386-2401 (2020)
2010 – 2019
- 2019
- [j21]Hee-Yong Kwon, Mun-Kyu Lee:
Fast Verification of Signatures With Shared ECQV Implicit Certificates. IEEE Trans. Veh. Technol. 68(5): 4680-4694 (2019) - 2018
- [j20]DaeHun Nyang, Hyoungshick Kim, Woojoo Lee, Sung-bae Kang, Geumhwan Cho, Mun-Kyu Lee, Aziz Mohaisen:
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks. Comput. Secur. 78: 1-15 (2018) - [j19]Piljoo Choi, Mun-Kyu Lee, Ji-Hoon Kim, Dong Kyue Kim:
Low-Complexity Elliptic Curve Cryptography Processor Based on Configurable Partial Modular Reduction Over NIST Prime Fields. IEEE Trans. Circuits Syst. II Express Briefs 65-II(11): 1703-1707 (2018) - 2017
- [j18]Mun-Kyu Lee, Jin Yoo, Hyeonjin Nam:
Analysis and Improvement on a Unimodal Haptic PIN-Entry Method. Mob. Inf. Syst. 2017: 6047312:1-6047312:17 (2017) - [j17]Jung Yeon Hwang, Boyeon Song, Daeseon Choi, Seung-Hun Jin, Hyun Sook Cho, Mun-Kyu Lee:
Simplified small exponent test for batch verification. Theor. Comput. Sci. 662: 48-58 (2017) - 2016
- [j16]Mun-Kyu Lee, Hyeonjin Nam, Dong Kyue Kim:
Secure bimodal PIN-entry method using audio signals. Comput. Secur. 56: 140-150 (2016) - [j15]Mun-Kyu Lee, Pierre Michaud, Jeong Seop Sim, DaeHun Nyang:
A simple proof of optimality for the MIN cache replacement policy. Inf. Process. Lett. 116(2): 168-170 (2016) - [j14]Mun-Kyu Lee, Jin Bok Kim, Matthew K. Franklin:
Enhancing the Security of Personal Identification Numbers with Three-Dimensional Displays. Mob. Inf. Syst. 2016: 8019830:1-8019830:9 (2016) - [j13]Young-Hoo Jo, Seong-Yun Jeon, Jong-Hyuk Im, Mun-Kyu Lee:
Security Analysis and Improvement of Fingerprint Authentication for Smartphones. Mob. Inf. Syst. 2016: 8973828:1-8973828:11 (2016) - [c23]Jong-Hyuk Im, Mun-Kyu Lee:
Password Authentication Using One-Time Key-Based Signature and Homomorphic Encryption. BWCCA 2016: 467-474 - [c22]Mun-Kyu Lee, Jong-Hyuk Im:
On-line Voting System with Illegal Ballot Filtering Using Homomorphic Encryption. BWCCA 2016: 475-482 - [c21]Hee-Yong Kwon, Mun-Kyu Lee:
Fast Signature Verification with Shared Implicit Certificates for Vehicular Communication. BWCCA 2016: 525-533 - [c20]Jong-Hyuk Im, Jinchun Choi, DaeHun Nyang, Mun-Kyu Lee:
Privacy-Preserving Palm Print Authentication Using Homomorphic Encryption. DASC/PiCom/DataCom/CyberSciTech 2016: 878-881 - 2015
- [j12]YoungJae Maeng, Aziz Mohaisen, Mun-Kyu Lee, DaeHun Nyang:
Transaction authentication using complementary colors. Comput. Secur. 48: 167-181 (2015) - [j11]Jung Hee Cheon, Mun-Kyu Lee:
Improved batch verification of signatures using generalized sparse exponents. Comput. Stand. Interfaces 40: 42-52 (2015) - [j10]Jeong Eun Song, Tae Youn Han, Mun-Kyu Lee:
Analysis and Improvement of MaTRU Public Key Cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(4): 982-991 (2015) - 2014
- [j9]Daesung Moon, Jang-Hee Yoo, Mun-Kyu Lee:
Improved cancelable fingerprint templates using minutiae-based functional transform. Secur. Commun. Networks 7(10): 1543-1551 (2014) - [j8]Mun-Kyu Lee:
Security Notions and Advanced Method for Human Shoulder-Surfing Resistant PIN-Entry. IEEE Trans. Inf. Forensics Secur. 9(4): 695-708 (2014) - [c19]Mun-Kyu Lee, Jin Bok Kim, Matthew K. Franklin:
3DPIN: Enhancing security with 3D display. GCCE 2014: 129-130 - 2013
- [j7]Mun-Kyu Lee, Jung Woo Kim, Jeong Eun Song, Kunsoo Park:
Efficient Implementation of NTRU Cryptosystem Using Sliding Window Methods. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 206-214 (2013) - [j6]Tae Youn Han, Mun-Kyu Lee:
Reordering computation sequences for memory-efficient binary field multiplication. J. Supercomput. 66(2): 936-949 (2013) - [c18]Mun-Kyu Lee, Hyeonjin Nam:
Secure and Usable PIN-Entry Method with Shoulder-Surfing Resistance. HCI (29) 2013: 745-748 - [e1]Taekyoung Kwon, Mun-Kyu Lee, Daesung Kwon:
Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7839, Springer 2013, ISBN 978-3-642-37681-8 [contents] - 2012
- [j5]Mun-Kyu Lee:
Comments on "Provably Sublinear Point Multiplication on Koblitz Curves and Its Hardware Implementation". IEEE Trans. Computers 61(4): 591-592 (2012) - [c17]Mun-Kyu Lee, Jin Bok Kim, Jeong Eun Song:
Smart phone user authentication using audio channels. ICCE 2012: 735-736 - 2011
- [j4]Jung Hee Cheon, Stanislaw Jarecki, Taekyoung Kwon, Mun-Kyu Lee:
Fast Exponentiation Using Split Exponents. IEEE Trans. Inf. Theory 57(3): 1816-1826 (2011) - 2010
- [j3]Mun-Kyu Lee, Jeong Eun Song, Dooho Choi, Dong-Guk Han:
Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 153-163 (2010)
2000 – 2009
- 2009
- [i1]DaeHun Nyang, Mun-Kyu Lee:
Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks. IACR Cryptol. ePrint Arch. 2009: 631 (2009) - 2008
- [c16]Mun-Kyu Lee, Jin O. Park, Jeong Eun Song:
User Authentication Based on Distance Estimation Using Ultrasonic Sensors. CIS (2) 2008: 391-394 - 2007
- [c15]Mun-Kyu Lee, Jung Woo Kim, Jeong Eun Song, Kunsoo Park:
Sliding Window Method for NTRU. ACNS 2007: 432-442 - 2006
- [c14]Mun-Kyu Lee, Dowon Hong, Dong Kyue Kim:
Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme. CIS 2006: 427-434 - [c13]Mun-Kyu Lee, Howon Kim, Dowon Hong, Kyoil Chung:
Efficient Exponentiation in GF(pm) Using the Frobenius Map. ICCSA (4) 2006: 584-593 - [c12]Ku-Young Chang, Ju-Sung Kang, Mun-Kyu Lee, Hangrok Lee, Dowon Hong:
New Variant of the Self-Shrinking Generator and Its Cryptographic Properties. ICISC 2006: 41-50 - [c11]Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim, Dong Kyue Kim:
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. WISA 2006: 173-186 - 2005
- [j2]Mun-Kyu Lee, Yoonjeong Kim, Kunsoo Park, Yookun Cho:
Efficient parallel exponentiation in GF(qn) using normal basis representations. J. Algorithms 54(2): 205-221 (2005) - [c10]Howon Kim, Mun-Kyu Lee, Dong Kyue Kim, Sang-Kyoon Chung, Kyoil Chung:
Design and Implementation of Crypto Co-processor and Its Application to Security Systems. CIS (2) 2005: 1104-1109 - [c9]Mun-Kyu Lee:
SPA-Resistant Simultaneous Scalar Multiplication. ICCSA (2) 2005: 314-321 - [c8]Chi Seong Park, Mun-Kyu Lee, Dong Kyue Kim:
New Computation Paradigm for Modular Exponentiation Using a Graph Model. SAGA 2005: 170-179 - [c7]Mun-Kyu Lee, Keon Tae Kim, Howon Kim, Dong Kyue Kim:
Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(pm). WISA 2005: 207-217 - [c6]Tae-Jun Park, Mun-Kyu Lee, Dowon Hong, Kyoil Chung:
A DPA Countermeasure by Randomized Frobenius Decomposition. WISA 2005: 271-282 - 2004
- [c5]Mun-Kyu Lee, Dowon Hong:
An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity Module. Security and Management 2004: 408-413 - 2003
- [j1]Mun-Kyu Lee, Kunsoo Park:
Efficient Arithmetic in Optimal Extension Fields Using Simultaneous Multiplication. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(5): 1316-1321 (2003) - [c4]Tae-Jun Park, Mun-Kyu Lee, E-yong Kim, Kunsoo Park:
A General Expansion Method Using Efficient Endomorphisms. ICISC 2003: 112-126 - [c3]Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park:
Efficient Scalar Multiplication in Hyperelliptic Curves Using A New Frobenius Expansion. ICISC 2003: 152-165 - 2002
- [c2]Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park:
New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms. ICISC 2002: 264-282 - 2001
- [c1]Mun-Kyu Lee, Yoonjeong Kim, Kunsoo Park, Yookun Cho:
Efficient parallel exponentiation in GF(2n) using normal basis representations. SPAA 2001: 179-188
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-18 23:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint