Young-Ho PARK


A Tightly-Secure Multisignature Scheme with Improved Verification
Jong Hwan PARK Young-Ho PARK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/02/01
Vol. E99-A  No. 2  pp. 579-589
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
multisignatureproof-of-possessionbilinear mapscoCDH problemtight reductionPOP-sKR model
 Summary | Full Text:PDF

Fast Density-Based Clustering Using Graphics Processing Units
Woong-Kee LOH Yang-Sae MOON Young-Ho PARK 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/05/01
Vol. E97-D  No. 5  pp. 1349-1352
Type of Manuscript:  LETTER
Category: Artificial Intelligence, Data Mining
Keyword: 
density-based clusteringgraphics processing unitsgrid structure
 Summary | Full Text:PDF | (Errata[Uploaded on July 1,2014])

Revisiting Source-Level XQuery Normalization
Ki-Hoon LEE Young-Ho PARK 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/03/01
Vol. E94-D  No. 3  pp. 622-631
Type of Manuscript:  PAPER
Category: Data Engineering, Web Information Systems
Keyword: 
source-level XQuery normalizationquery optimization
 Summary | Full Text:PDF

Efficient Trapdoor Commitment as Secure as Factoring with Useful Properties
Taek-Young YOUN Young-Ho PARK Jongin LIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/12/01
Vol. E92-D  No. 12  pp. 2520-2523
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
securitytrapdoor commitmentkey exposure freenessstrong trapdoor openinginteger factoring problem
 Summary | Full Text:PDF

An Efficient Signature Scheme with Fast Online Signing
Taek-Young YOUN Young-Ho PARK Jongin LIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/10/01
Vol. E92-A  No. 10  pp. 2431-2437
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
online/offline signaturetrapdoor hash functionstrong RSA assumptiondivision intractabilitydiscrete logarithm with short exponent problem
 Summary | Full Text:PDF

Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications
Taek-Young YOUN Young-Ho PARK Taekyoung KWON Soonhak KWON Jongin LIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1481-1484
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: Secure Communication
Keyword: 
signaturebatch signingimbalanced communication
 Summary | Full Text:PDF

New Hardware Architecture for Multiplication over GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography
Soonhak KWON Taekyoung KWON Young-Ho PARK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 236-243
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
Massey-Omura multiplierBerlekamp bit serial multiplierGaussian normal basisdual basiselliptic curve cryptographyNIST
 Summary | Full Text:PDF

Enhanced Exhaustive Search Attack on Randomized BSD Type Countermeasure
Dong-Guk HAN Katsuyuki OKEYA Tae Hyun KIM Yoon Sung HWANG Beomin KIM Young-Ho PARK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5  pp. 1316-1327
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
elliptic curve cryptosystemside channel attacksSPADPABSD representationHa-Moon countermeasureEbeid-Hasan countermeasureAgagliate et al.'s countermeasure
 Summary | Full Text:PDF

Partial Key Exposure Attacks on Unbalanced RSA with the CRT
Hee Jung LEE Young-Ho PARK Taekyoung KWON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/02/01
Vol. E89-A  No. 2  pp. 626-629
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
CRTunbalanced primesCoppersmith's theorempartial key exposure attacks
 Summary | Full Text:PDF