Folgen
Yong Ki Lee
Yong Ki Lee
Samsung Electronics
Bestätigte E-Mail-Adresse bei snu.ac.kr
Titel
Zitiert von
Zitiert von
Jahr
Elliptic-curve-based security processor for RFID
YK Lee, K Sakiyama, L Batina, I Verbauwhede
IEEE Transactions on Computers 57 (11), 1514-1527, 2008
2972008
EC-RAC (ECDLP based randomized access control): Provably secure RFID authentication protocol
YK Lee, L Batina, I Verbauwhede
2008 IEEE international conference on RFID, 97-104, 2008
1722008
Low-cost untraceable authentication protocols for RFID
YK Lee, L Batina, D Singelée, I Verbauwhede
Proceedings of the third ACM conference on Wireless network security, 55-64, 2010
1192010
8.7 Physically unclonable function for secure key generation with a key error rate of 2E-38 in 45nm smart-card chips
B Karpinskyy, Y Lee, Y Choi, Y Kim, M Noh, S Lee
2016 IEEE International Solid-State Circuits Conference (ISSCC), 158-160, 2016
1182016
Untraceable RFID authentication protocols: Revision of EC-RAC
YK Lee, L Batina, I Verbauwhede
2009 IEEE international conference on RFID, 178-185, 2009
992009
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
L Batina, YK Lee, S Seys, D Singelée, I Verbauwhede
Personal and Ubiquitous Computing 16, 323-335, 2012
492012
Throughput optimized SHA-1 architecture using unfolding transformation
YK Lee, H Chan, I Verbauwhede
IEEE 17th international conference on application-specific systems …, 2006
382006
Iteration bound analysis and throughput optimum architecture of SHA-256 (384,512) for hardware implementations
YK Lee, H Chan, I Verbauwhede
Information Security Applications: 8th International Workshop, WISA 2007 …, 2007
342007
Physically unclonable function in 28nm fdsoi technology achieving high reliability for aec-q 100 grade 1 and iso 26262 asil-b
Y Choi, B Karpinskyy, KM Ahn, Y Kim, S Kwon, J Park, Y Lee, M Noh
2020 IEEE International Solid-State Circuits Conference-(ISSCC), 426-428, 2020
332020
A compact architecture for montgomery elliptic curve scalar multiplication processor
YK Lee, I Verbauwhede
Information Security Applications: 8th International Workshop, WISA 2007 …, 2007
312007
Privacy-preserving ECC-based grouping proofs for RFID
L Batina, YK Lee, S Seys, D Singelée, I Verbauwhede
Information Security: 13th International Conference, ISC 2010, Boca Raton …, 2011
302011
Anti-counterfeiting, untraceability and other security challenges for RFID systems: Public-key-based protocols and hardware
YK Lee, L Batina, D Singelee, B Preneel, I Verbauwhede
Towards Hardware-Intrinsic Security: Foundations and Practice, 237-257, 2010
232010
Wide–weak privacy–preserving RFID authentication protocols
YK Lee, L Batina, D Singelée, I Verbauwhede
Mobile Lightweight Wireless Systems: Second International ICST Conference …, 2010
222010
Semiconductor device generating security key, method of generating security key, and method of enrolling security key
YS Kim, M Noh, B Karpinskyy, AHN KyoungMoon, YK Lee, Y Choi
US Patent 10,476,681, 2019
212019
Privacy challenges in RFID systems
YK Lee, L Batina, I Verbauwhede
The Internet of Things: 20 th Tyrrhenian Workshop on Digital Communications …, 2010
212010
On the high-throughput implementation of ripemd-160 hash algorithm
M Knezzevic, K Sakiyama, YK Lee, I Verbauwhede
2008 International Conference on Application-Specific Systems, Architectures …, 2008
202008
One-time templates for face authentication
Y Lee, Y Lee, Y Chung, K Moon
2007 International Conference on Convergence Information Technology (ICCIT …, 2007
172007
Integrated circuit for physically unclonable function and device including the same
B Karpinskyy, DH Kim, MJ Noh, SW Park, YK Lee, Y Choi
US Patent 10,439,613, 2019
142019
Design methodology for throughput optimum architectures of hash algorithms of the MD4-class
YK Lee, H Chan, I Verbauwhede
Journal of Signal Processing Systems 53, 89-102, 2008
112008
Apparatus for generating random number
K Bohdan, YK Lee, YS Kim, Y Choi
US Patent App. 15/218,530, 2017
102017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20