Quantum modular multiplication SM Cho, A Kim, D Choi, BS Choi, SH Seo Ieee Access 8, 213244-213252, 2020 | 16 | 2020 |
Authentication protocol using fuzzy eigenface vault based on moc AY Kim, SH Lee The 9th International Conference on Advanced Communication Technology 3 …, 2007 | 14 | 2007 |
PCA-CIA ensemble-based feature extraction for bio-key generation A Kim, C Wang, SH Seo KSII Transactions on Internet and Information Systems (TIIS) 14 (7), 2919-2937, 2020 | 8 | 2020 |
Quantum Modular Adder over GF(2n − 1) without Saving the Final Carry A Kim, SM Cho, CB Seo, S Lee, SH Seo Applied Sciences 11 (7), 2949, 2021 | 7 | 2021 |
A scheme for predicting recognition performance by using confidence intervals A Kim, SH Lee IEICE Electronics Express 9 (3), 133-139, 2012 | 5 | 2012 |
Secure and Usable Bio-Passwords based on Confidence Interval. A Kim, G Han, SH Seo J. Internet Serv. Inf. Secur. 7 (1), 14-27, 2017 | 4 | 2017 |
A Quality Assessment Method of Biometrics for Estimating Authentication Result in User Authentication System AY Kim, SH Lee Journal of KIISE: Computing Practices and Letters 16 (2), 242-246, 2010 | 3 | 2010 |
Design of Fuzzy Eigenface Vault Scheme for Enhanced Security A Kim, S Lee Proc. APIS, 2007 | 3 | 2007 |
Design of Context-Aware-Based Drone Control Mechanism by Using Two-Factor YS Oh, A Kim, SH Seo Journal of The Korea Institute of Information Security & Cryptology 29 (1 …, 2019 | 2 | 2019 |
A Simple Feature Extraction Method for user Authentication based on Signature HY Moon, AY Kim, SH Lee Proceedings of the Korea Information Processing Society Conference, 1129-1132, 2007 | 2 | 2007 |
An efficient confidence interval-based dual-key fuzzy vault scheme for operator authentication of autonomous unmanned aerial vehicles J Choi, J Lee, A Kim Applied Sciences 13 (15), 8894, 2023 | 1 | 2023 |
A Comparison of NIST 2nd Round Candidates’ MQ-based Signature Schemes Y Bai, A Kim, SH Seo 2019 International Conference on Information and Communication Technology …, 2019 | 1 | 2019 |
A non-memorization bio-password scheme with confidence interval sets A Kim, G Park, Y Shin, SH Lee 2013 International Conference on ICT Convergence (ICTC), 1102-1106, 2013 | 1 | 2013 |
Efficient quantum modular multiplier and quantum modular multiplication method SH Seo, SM Cho, AY Kim US Patent App. 18/017,655, 2023 | | 2023 |
Q-rMinRank attack: The first quantum approach for key recovery attacks on Rainbow SM Cho, SH Seo arXiv preprint arXiv:2206.10898, 2022 | | 2022 |
HybridRAM: The first quantum approach for key recovery attacks on Rainbow SM Cho, A Kim, SH Seo https://arxiv.org/abs/2206.10898v1, 2022 | | 2022 |
Multivariate Quadratic Solver in GF (31) with Grover's Algorithm SM Cho, A Kim, SH Seo 2022 International Conference on Electronics, Information, and Communication …, 2022 | | 2022 |
Biometric-Based Seed Extraction Scheme for Multi-quadratic-Based Post-quantum Computing A Kim, SH Seo Advances in Computer Science and Ubiquitous Computing: CSA-CUTE 2019, 183-189, 2021 | | 2021 |
Accident Information Based Reliability Estimation Model for Car Insurance Smart Contract S Lee, A Kim, SH Seo KIPS Transactions on Computer and Communication Systems 9 (4), 89-100, 2020 | | 2020 |
Compact Implementation and Analysis of Rainbow on 8bits-Microcontroller Uunit E Hong, SM Cho, A Kim, SH Seo Journal of the Korea Institute of Information Security & Cryptology 29 (4 …, 2019 | | 2019 |