Jun-Cheol Jeon
Orcid: 0000-0002-0243-9063
According to our database1,
Jun-Cheol Jeon
authored at least 47 papers
between 2002 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Multi-Layered QCA Content-Addressable Memory Cell Using Low-Power Electronic Interaction for AI-Based Data Learning and Retrieval in Quantum Computing Environment.
Sensors, 2023
2022
Quantum LFSR Structure for Random Number Generation Using QCA Multilayered Shift Register for Cryptographic Purposes.
Sensors, 2022
2021
Designing nanotechnology QCA-multiplexer using majority function-based NAND for quantum computing.
J. Supercomput., 2021
2020
Low-complexity QCA universal shift register design using multiplexer and D flip-flop based on electronic correlations.
J. Supercomput., 2020
Design of high-performance QCA incrementer/decrementer circuit based on adder/subtractor methodology.
Microprocess. Microsystems, 2020
2015
IEICE Electron. Express, 2015
2014
Proceedings of the Symposium on Applied Computing, 2014
2013
Reduction of the Radiating Sound of a Submerged Finite Cylindrical Shell Structure by Active Vibration Control.
Sensors, 2013
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013
Design of Parallel Pipelined Algorithm for Field Arithmetic Architecture Based on Cellular Array.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013
2012
Proceedings of the 2012 International Conference on Information Networking, 2012
Proceedings of the International Conference on IT Convergence and Security, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
2010
Non-linear and non-group cellular automata chaining technique for cryptographic applications.
Math. Comput. Model., 2010
2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
2008
Math. Comput. Simul., 2008
Math. Comput. Simul., 2008
2007
Int. J. Sens. Networks, 2007
Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns.
Appl. Math. Comput., 2007
Appl. Math. Comput., 2007
Non-linear and Non-group Cellular Automata for Cryptographic Applications.
Proceedings of the 2007 International Conference on Security & Management, 2007
2006
A novel approach for bit-serial AB<sup>2</sup> multiplication in finite fields GF(2<sup>m</sup>).
Comput. Math. Appl., 2006
Proceedings of the Agent Computing and Multi-Agent Systems, 2006
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006
Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards.
Proceedings of the Frontiers of High Performance Computing and Networking, 2006
Proceedings of the Advances in Natural Computation, Second International Conference, 2006
Conflict Detection in Role-Based Access Control Using Multiple-Attractor Cellular Automata.
Proceedings of the Intelligent Computing, 2006
Proceedings of the Computational Science, 2006
Proceedings of the Computational Science, 2006
Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition.
Proceedings of the Cellular Automata, 2006
Proceedings of the Cellular Automata, 2006
Proceedings of the Cellular Automata, 2006
2005
Appl. Math. Comput., 2005
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005
Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005
Evolutionary Hardware Architecture for Division in Elliptic Curve Cryptosystems over GF(2<sup>n</sup>).
Proceedings of the Advances in Natural Computation, First International Conference, 2005
A Secure One-Time Password Authentication Using Cellular Automata.
Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering, 2005
New Authentication Scheme with No Verification Table.
Proceedings of the ISCA 18th International Conference on Computer Applications in Industry and Engineering, 2005
2004
ACM SIGOPS Oper. Syst. Rev., 2004
Design of Montgomery Multiplication Architecture Based on Programmable Cellular Automata.
Comput. Intell., 2004
An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields.
Proceedings of the PRICAI 2004: Trends in Artificial Intelligence, 2004
An Efficient Access Control Model Based on User-Classification and Role-Division.
Proceedings of the International Conference on Security and Management, 2004
2003
Proceedings of the Computational Science and Its Applications, 2003
Design of Montgomery multiplication architecture based on programmable cellular automata.
Proceedings of the IEEE Congress on Evolutionary Computation, 2003
An Efficient Multiplication Architecture using Montgomery Algorithm based on Programmable Cellular Automata.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003
Design of Bit-parallel Multiplier Based on Programmable Cellular Automata.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003
2002