Hwajeong Seo

Orcid: 0000-0003-0069-9061

According to our database1, Hwajeong Seo authored at least 189 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
KpqClean Ver2: Comprehensive Benchmarking and Analysis of KpqC Algorithm Round 2 Submissions.
IACR Cryptol. ePrint Arch., 2024

Quantum Implementation and Analysis of ARIA.
IACR Cryptol. ePrint Arch., 2024

Quantum Implementation of LSH.
IACR Cryptol. ePrint Arch., 2024

Quantum NV Sieve on Grover for Solving Shortest Vector Problem.
IACR Cryptol. ePrint Arch., 2024

LEA Block Cipher in Rust Language: Trade-off between Memory Safety and Performance.
IACR Cryptol. ePrint Arch., 2024

Differential Cryptanalysis on Quantum Computers.
IACR Cryptol. ePrint Arch., 2024

Depth Optimized Quantum Circuits for HIGHT and LEA.
IACR Cryptol. ePrint Arch., 2024

Quantum Implementation and Analysis of SHA-2 and SHA-3.
IACR Cryptol. ePrint Arch., 2024

Quantum Implementation of Linear and Non-Linear Layers.
Proceedings of the 37th IEEE International System-on-Chip Conference, 2024

2023
Look-up the Rainbow: Table-based Implementation of Rainbow Signature on 64-bit ARMv8 Processors.
ACM Trans. Embed. Comput. Syst., September, 2023

K-XMSS and K-SPHINCS+: Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean Cryptography Algorithms.
Sensors, September, 2023

Deep-Learning-Based Cryptanalysis of Lightweight Block Ciphers Revisited.
Entropy, July, 2023

Quantum Binary Field Multiplication with Optimized Toffoli Depth and Extension to Quantum Inversion.
Sensors, March, 2023

Quantum Neural Network Based Distinguisher on SPECK-32/64.
Sensors, 2023

Depth-Optimized Quantum Implementation of ARIA.
IACR Cryptol. ePrint Arch., 2023

Improved Low-depth SHA3 Quantum Circuit for Fault-tolerant Quantum Computers.
IACR Cryptol. ePrint Arch., 2023

Optimized Quantum Circuit for Quantum Security Strength Analysis of Argon2.
IACR Cryptol. ePrint Arch., 2023

Optimized Quantum Implementation of SEED.
IACR Cryptol. ePrint Arch., 2023

Depth-Optimized Implementation of ASCON Quantum Circuit.
IACR Cryptol. ePrint Arch., 2023

High-speed Implementation of AIM symmetric primitives within AIMer digital signature.
IACR Cryptol. ePrint Arch., 2023

Evaluating KpqC Algorithm Submissions: Balanced and Clean Benchmarking Approach.
IACR Cryptol. ePrint Arch., 2023

Novel Approach to Cryptography Implementation using ChatGPT.
IACR Cryptol. ePrint Arch., 2023

Quantum Artificial Intelligence on Cryptanalysis.
IACR Cryptol. ePrint Arch., 2023

Finding Shortest Vector Using Quantum NV Sieve on Grover.
IACR Cryptol. ePrint Arch., 2023

Quantum Implementation of AIM: Aiming for Low-Depth.
IACR Cryptol. ePrint Arch., 2023

Analysis of Parallel Implementation of Pilsung Block Cipher On Graphics Processing Unit.
IACR Cryptol. ePrint Arch., 2023

BAKSHEESH: Similar Yet Different From GIFT.
IACR Cryptol. ePrint Arch., 2023

New Results on Machine Learning-Based Distinguishers.
IEEE Access, 2023

Efficient Implementation of the Classic McEliece on ARMv8 Processors.
Proceedings of the Information Security Applications - 24th International Conference, 2023

PQ-DPoL: An Efficient Post-Quantum Blockchain Consensus Algorithm.
Proceedings of the Information Security Applications - 24th International Conference, 2023

Optimized Quantum Circuit Implementation of Payoff Function.
Proceedings of the 31st IFIP/IEEE International Conference on Very Large Scale Integration, 2023

2022
Optimized Implementation of Simpira on Microcontrollers for Secure Massive Learning.
Symmetry, November, 2022

Efficient Implementation of AES-CTR and AES-ECB on GPUs With Applications for High-Speed FrodoKEM and Exhaustive Key Search.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

DPCrypto: Acceleration of Post-Quantum Cryptography Using Dot-Product Instructions on GPUs.
IEEE Trans. Circuits Syst. I Regul. Pap., 2022

Parallel quantum addition for Korean block ciphers.
Quantum Inf. Process., 2022

K-XMSS and K-SPHINCS<sup>+</sup>: Hash based Signatures with\\Korean Cryptography Algorithms.
IACR Cryptol. ePrint Arch., 2022

Optimized Implementation of Encapsulation and Decapsulation of Classic McEliece on ARMv8.
IACR Cryptol. ePrint Arch., 2022

Deep Learning based Cryptanalysis of Lightweight Block Ciphers, Revisited.
IACR Cryptol. ePrint Arch., 2022

Transformer encoder-based Crypto-Ransomware Detection for Low-Power Embedded Processors.
IACR Cryptol. ePrint Arch., 2022

Quantum Neural Network based Distinguisher for Differential Cryptanalysis on Simplified Block Ciphers.
IACR Cryptol. ePrint Arch., 2022

Quantum Analysis of AES.
IACR Cryptol. ePrint Arch., 2022

Improved Quantum Analysis of SPECK and LowMC (Full Version).
IACR Cryptol. ePrint Arch., 2022

Quantum Implementation and Analysis of DEFAULT.
IACR Cryptol. ePrint Arch., 2022

TensorCrypto: High Throughput Acceleration of Lattice-Based Cryptography Using Tensor Core on GPU.
IEEE Access, 2022

Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications.
IEEE Access, 2022

Optimized Implementation of SM4 on AVR Microcontrollers, RISC-V Processors, and ARM Processors.
IEEE Access, 2022

Parallel Implementation of PIPO and Its Application for Format Preserving Encryption.
IEEE Access, 2022

Grover on SPARKLE.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

ARMing-Sword: Scabbard on ARM.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

Optimized Implementation of Quantum Binary Field Multiplication with Toffoli Depth One.
Proceedings of the Information Security Applications - 23rd International Conference, 2022

Improved Quantum Analysis of SPECK and LowMC.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

Efficient and Side-Channel Resistant Design of High-Security Ed448 on ARM Cortex-M4.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2022

Side-Channel Analysis and Countermeasure Design for Implementation of Curve448 on Cortex-M4.
Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, 2022

2021
SIKE in 32-bit ARM Processors Based on Redundant Number System for NIST Level-II.
ACM Trans. Embed. Comput. Syst., 2021

Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4.
IEEE Trans. Computers, 2021

Quantum implementation and resource estimates for Rectangle and Knot.
Quantum Inf. Process., 2021

Grover on Caesar and Vigenère Ciphers.
IACR Cryptol. ePrint Arch., 2021

Grover on SM3.
IACR Cryptol. ePrint Arch., 2021

Grover on SPEEDY.
IACR Cryptol. ePrint Arch., 2021

Simpira Gets Simpler: Optimized Simpira on Microcontrollers.
IACR Cryptol. ePrint Arch., 2021

No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms.
IACR Cryptol. ePrint Arch., 2021

All the Polynomial Multiplication You Need on RISC-V.
IACR Cryptol. ePrint Arch., 2021

Curve448 on 32-bit ARM Cortex-M4.
IACR Cryptol. ePrint Arch., 2021

Kyber on ARM64: Compact Implementations of Kyber on 64-bit ARM Cortex-A Processors.
IACR Cryptol. ePrint Arch., 2021

TensorCrypto.
IACR Cryptol. ePrint Arch., 2021

DPCrypto: Acceleration of Post-quantum Cryptographic Algorithms using Dot-Product Instruction on GPUs.
IACR Cryptol. ePrint Arch., 2021

Look-up the Rainbow: Efficient Table-based Parallel Implementation of Rainbow Signature on 64-bit ARMv8 Processors.
IACR Cryptol. ePrint Arch., 2021

Optimized Implementation of SM4 on AVR Microcontrollers and ARM Processors.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis of Caesar using Quantum Support Vector Machine.
IACR Cryptol. ePrint Arch., 2021

SPEEDY on Cortex-M3: Efficient Software Implementation of SPEEDY on ARM Cortex-M3.
IACR Cryptol. ePrint Arch., 2021

Binary Field Montgomery Multiplication on Quantum Computers.
IACR Cryptol. ePrint Arch., 2021

Parallel Quantum Addition for Korean Block Cipher.
IACR Cryptol. ePrint Arch., 2021

A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application.
IEEE Access, 2021

ARMed Frodo - FrodoKEM on 64-Bit ARMv8 Processors.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

Masked Implementation of PIPO Block Cipher on 8-bit AVR Microcontrollers.
Proceedings of the Information Security Applications - 22nd International Conference, 2021

External Reviewers ARITH 2021.
Proceedings of the 28th IEEE Symposium on Computer Arithmetic, 2021

2020
Montgomery Multiplication for Public Key Cryptography on MSP430X.
ACM Trans. Embed. Comput. Syst., 2020

Four$\mathbb {Q}$Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks.
IEEE Trans. Dependable Secur. Comput., 2020

Optimized Implementation of SIKE Round 2 on 64-bit ARM Cortex-A Processors.
IEEE Trans. Circuits Syst. I Regul. Pap., 2020

Efficient Software Implementation of Ring-LWE Encryption on IoT Processors.
IEEE Trans. Computers, 2020

ACE: ARIA-CTR Encryption for Low-End Embedded Processors.
Sensors, 2020

Fast Number Theoretic Transform for Ring-LWE on 8-bit AVR Embedded Processor.
Sensors, 2020

A High-Speed Public-Key Signature Scheme for 8-b IoT-Constrained Devices.
IEEE Internet Things J., 2020

Grover on GIFT.
IACR Cryptol. ePrint Arch., 2020

Grover on SPECK: Quantum Resource Estimates.
IACR Cryptol. ePrint Arch., 2020

Compact Implementation of CHAM Block Cipher on Low-End Microcontrollers.
Proceedings of the Information Security Applications - 21st International Conference, 2020

Detecting Block Cipher Encryption for Defense Against Crypto Ransomware on Low-End Internet of Things.
Proceedings of the Information Security Applications - 21st International Conference, 2020

Impact of Optimized Operations A· B, A· C for Binary Field Inversion on Quantum Computers.
Proceedings of the Information Security Applications - 21st International Conference, 2020

Generative Adversarial Networks-Based Pseudo-Random Number Generator for Embedded Processors.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020

PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020

2019
Hybrid approach of parallel implementation on CPU-GPU for high-speed ECDSA verification.
J. Supercomput., 2019

IoT-NUMS: Evaluating NUMS Elliptic Curve Cryptography for IoT Platforms.
IEEE Trans. Inf. Forensics Secur., 2019

Lightweight Implementations of NIST P-256 and SM2 ECC on 8-bit Resource-Constraint Embedded Device.
ACM Trans. Embed. Comput. Syst., 2019

Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things.
IEEE Trans. Dependable Secur. Comput., 2019

Compact Implementations of HIGHT Block Cipher on IoT Platforms.
Secur. Commun. Networks, 2019

Optimized SIKE Round 2 on 64-bit ARM.
IACR Cryptol. ePrint Arch., 2019

SIKE Round 2 Speed Record on ARM Cortex-M4.
IACR Cryptol. ePrint Arch., 2019

Ring-LWE on 8-Bit AVR Embedded Processor.
Proceedings of the Information Security Applications - 20th International Conference, 2019

All the HIGHT You Need on Cortex-M4.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

FACE-LIGHT: Fast AES-CTR Mode Encryption for Low-End Microcontrollers.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

2018
Erratum to: Secure IoT framework and 2D architecture for End-To-End security.
J. Supercomput., 2018

Secure IoT framework and 2D architecture for End-To-End security.
J. Supercomput., 2018

Compact Implementations of ARX-Based Block Ciphers on IoT Processors.
ACM Trans. Embed. Comput. Syst., 2018

Compact Software Implementation of Public-Key Cryptography on MSP430X.
ACM Trans. Embed. Comput. Syst., 2018

SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor.
Secur. Commun. Networks, 2018

Secure Data Encryption for Cloud-Based Human Care Services.
J. Sensors, 2018

Secure GCM implementation on AVR.
Discret. Appl. Math., 2018

Highly Efficient Implementation of NIST-Compliant Koblitz Curve for 8-bit AVR-Based Sensor Nodes.
IEEE Access, 2018

Parallel Implementations of CHAM.
Proceedings of the Information Security Applications - 19th International Conference, 2018

Compact LEA and HIGHT Implementations on 8-Bit AVR and 16-Bit MSP Processors.
Proceedings of the Information Security Applications - 19th International Conference, 2018

OpenCL Based Implementation of ECDSA Signature Verification for V2X Communication.
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018

Parallel Implementation of Simeck Family Block Cipher by Using ARM NEON.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Optimization of CHAM Encryption Algorithm Based on Javascript.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Compact Implementation of Modular Multiplication for Special Modulus on MSP430X.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

2017
High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers.
ACM Trans. Embed. Comput. Syst., 2017

Efficient Elliptic Curve Cryptography for Embedded Devices.
ACM Trans. Embed. Comput. Syst., 2017

On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age.
IEEE Trans. Dependable Secur. Comput., 2017

Implementing RSA for sensor nodes in smart cities.
Pers. Ubiquitous Comput., 2017

MoTE-ECC Based Encryption on MSP430.
J. Inform. and Commun. Convergence Engineering, 2017

Hidden Indicator Based PIN-Entry Method Using Audio Signals.
J. Inform. and Commun. Convergence Engineering, 2017

High Performance Implementation of SGCM on High-End IoT Devices.
J. Inform. and Commun. Convergence Engineering, 2017

FourQ on embedded devices with strong countermeasures against side-channel attacks.
IACR Cryptol. ePrint Arch., 2017

Personal identification number entry for Google glass.
Comput. Electr. Eng., 2017

Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, Revisited.
Proceedings of the Information Security Applications - 18th International Conference, 2017

ARM/NEON Co-design of Multiplication/Squaring.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Parallel Implementations of SIMON and SPECK, Revisited.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Efficient implementation of simeck family block cipher on 16-bit MSP430.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Optimized implementation of chaskey MAC on 16-bit MSP430.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Compact GCM implementations on 32-bit ARMv7-A processors.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017

Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Four \mathbb Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

Multiprecision Multiplication on ARMv8.
Proceedings of the 24th IEEE Symposium on Computer Arithmetic, 2017

2016
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes.
IEEE Trans. Inf. Forensics Secur., 2016

Hybrid Montgomery Reduction.
ACM Trans. Embed. Comput. Syst., 2016

Binary field multiplication on ARMv8.
Secur. Commun. Networks, 2016

Efficient arithmetic on ARM-NEON and its application for high-speed RSA implementation.
Secur. Commun. Networks, 2016

A fast ARX model-based image encryption scheme.
Multim. Tools Appl., 2016

Secure Message Transmission against Remote Control System.
J. Inform. and Commun. Convergence Engineering, 2016

Efficient Implementation of Simeck Family Block Cipher on 8-Bit Processor.
J. Inform. and Commun. Convergence Engineering, 2016

A Synthesis of Multi-Precision Multiplication and Squaring Techniques for 8-Bit Sensor Nodes: State-of-the-Art Research and Future Challenges.
J. Comput. Sci. Technol., 2016

Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Parallel Implementations of LEA, Revisited.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Efficient Scalar Multiplication for Ate Based Pairing over KSS Curve of Embedding Degree 18.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications.
Proceedings of the Security and Privacy in Communication Networks, 2016

Efficient Implementation of Ring-LWE Encryption on High-End IoT Platform.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

Efficient operation over F(2 4)2 for security technologies.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2016

2015
Optimized Karatsuba squaring on 8-bit AVR processors.
Secur. Commun. Networks, 2015

Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields.
Secur. Commun. Networks, 2015

Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes.
Secur. Commun. Networks, 2015

Consecutive Operand-Caching Method for Multiprecision Multiplication, Revisited.
J. Inform. and Commun. Convergence Engineering, 2015

Secure Binary Field Multiplication.
IACR Cryptol. ePrint Arch., 2015

Faster ECC over F<sub>2<sup>571</sup></sub> (feat. PMULL).
IACR Cryptol. ePrint Arch., 2015

Compact Implementations of LEA Block Cipher for Low-End Microprocessors.
IACR Cryptol. ePrint Arch., 2015

NEON PQCryto: Fast and Parallel Ring-LWE Encryption on ARM NEON Architecture.
IACR Cryptol. ePrint Arch., 2015

Efficient Ring-LWE Encryption on 8-bit AVR Processors.
IACR Cryptol. ePrint Arch., 2015

Montgomery multiplication and squaring for Optimal Prime Fields.
Comput. Secur., 2015

Open Sesame! Hacking the Password.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Compact Implementations of LSH.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Faster ECC over F<sub>2<sup>521</sup>-1</sub> (feat. NEON).
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Small Private Key <i>MQ</i>PKS on an Embedded Microprocessor.
Sensors, 2014

Binary and prime field multiplication for public key cryptography on embedded microprocessors.
Secur. Commun. Networks, 2014

Implementation of an RFID Key Management System for DASH7.
J. Inform. and Commun. Convergence Engineering, 2014

Low-Power Encryption Algorithm Block Cipher in JavaScript.
J. Inform. and Commun. Convergence Engineering, 2014

Study of Modular Multiplication Methods for Embedded Processors.
J. Inform. and Commun. Convergence Engineering, 2014

Montgomery Modular Multiplication on ARM-NEON Revisited.
IACR Cryptol. ePrint Arch., 2014

Improved Modular Multiplication for Optimal Prime Fields.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

The Unified Hardware Design for GCM and SGCM.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

Short paper: Surveillance system with light sensor.
Proceedings of the IEEE World Forum on Internet of Things, 2014

Pseudo random number generator and Hash function for embedded microprocessors.
Proceedings of the IEEE World Forum on Internet of Things, 2014

Multi-precision squaring on MSP and ARM processors.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree 1.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA.
Proceedings of the Future Data and Security Engineering - First International Conference, 2014

2013
Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication.
Sensors, 2013

Performance enhancement of TinyECC based on multiplication optimizations.
Secur. Commun. Networks, 2013

Implementation of Multi-Precision Multiplication over Sensor Networks with Efficient Instructions.
J. Inform. and Commun. Convergence Engineering, 2013

Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

Parallel Implementations of LEA.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2012
Four Anchor Sensor Nodes Based Localization Algorithm over Three-Dimensional Space.
J. Inform. and Commun. Convergence Engineering, 2012

ZigBee Security Using Attribute-Based Proxy Re-encryption.
J. Inform. and Commun. Convergence Engineering, 2012

Always Metastable State True Random Number Generator.
J. Inform. and Commun. Convergence Engineering, 2012

Network and Data Link Layer Security for DASH7.
J. Inform. and Commun. Convergence Engineering, 2012

Attribute-based Proxy Re-encryption with a Constant Number of Pairing Operations.
J. Inform. and Commun. Convergence Engineering, 2012

Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

2011
Speed Optimized Implementation of HUMMINGBIRD Cryptography for Sensor Network.
J. Inform. and Commun. Convergence Engineering, 2011

Transmission Power Range based Sybil Attack Detection Method over Wireless Sensor Networks.
J. Inform. and Commun. Convergence Engineering, 2011


  Loading...