Cheol-Min Park
Orcid: 0000-0001-5257-7723
According to our database1,
Cheol-Min Park
authored at least 29 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
The effect of avian eggshell membrane structure on microbial penetration: A simulation study.
Biosyst., 2024
A New Perspective on Shape and Distribution: Branch Length Similarity Entropy Approach.
IEEE Access, 2024
2023
Exploring the effects of high curvature section distribution and density in termite tunnels on food transport efficiency: A simulation study.
Biosyst., September, 2023
2022
Characteristics of Peak and Cliff in Branch Length Similarity Entropy Profiles for Binary Time-Series and Their Application.
IEEE Access, 2022
2021
Entropy, 2021
A New Measure to Characterize the Self-Similarity of Binary Time Series and its Application.
IEEE Access, 2021
2020
IEEE Internet Things J., 2020
A New Measure to Characterize the Degree of Self-Similarity of a Shape and Its Applicability.
Entropy, 2020
2018
Desmoid-type fibromatosis mimicking cystic retroperitoneal mass: case report and literature review.
BMC Medical Imaging, 2018
2017
Finite Fields Their Appl., 2017
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
An Existential Unforgeable Signature Scheme Based on Multivariate Quadratic Equations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2015
A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015
Lite-Rainbow: Lightweight Signature Schemes Based on Multivariate Quadratic Equations and Their Secure Implementations.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015
2014
Equivalent public keys and a key substitution attack on the schemes from vector decomposition.
Secur. Commun. Networks, 2014
Appl. Algebra Eng. Commun. Comput., 2014
2013
Simple and exact formula for minimum loop length in Ate i pairing based on Brezing-Weng curves.
Des. Codes Cryptogr., 2013
EIBAS: An efficient identity-based broadcast authentication scheme in wireless sensor networks.
Ad Hoc Networks, 2013
2012
2011
Simple and Exact Formula for Minimum Loop Length in Ate<sub>i</sub> Pairing based on Brezing-Weng Curves.
IACR Cryptol. ePrint Arch., 2011
Appl. Algebra Eng. Commun. Comput., 2011
Proceedings of the Multimedia, Computer Graphics and Broadcasting, 2011
2009
IEEE Trans. Inf. Theory, 2009
Proceedings of the Pairing-Based Cryptography, 2009
2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005