BibTeX records: Byungchun Chung

download as .bib file

@inproceedings{DBLP:conf/birthday/ChungMMNS12,
  author    = {Byungchun Chung and
               Sandra Marcello and
               Amir{-}Pasha Mirbaha and
               David Naccache and
               Karim Sabeg},
  editor    = {David Naccache},
  title     = {Operand Folding Hardware Multipliers},
  booktitle = {Cryptography and Security: From Theory to Applications - Essays Dedicated
               to Jean-Jacques Quisquater on the Occasion of His 65th Birthday},
  series    = {Lecture Notes in Computer Science},
  volume    = {6805},
  pages     = {319--328},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28368-0\_21},
  doi       = {10.1007/978-3-642-28368-0\_21},
  timestamp = {Tue, 14 May 2019 10:00:52 +0200},
  biburl    = {https://dblp.org/rec/conf/birthday/ChungMMNS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1104-1533,
  author    = {Byungchun Chung and
               Sandra Marcello and
               Amir{-}Pasha Mirbaha and
               David Naccache and
               Karim Sabeg},
  title     = {Operand Folding Hardware Multipliers},
  journal   = {CoRR},
  volume    = {abs/1104.1533},
  year      = {2011},
  url       = {http://arxiv.org/abs/1104.1533},
  archivePrefix = {arXiv},
  eprint    = {1104.1533},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-1104-1533.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ChungHKHY09,
  author    = {Byungchun Chung and
               Junbeom Hur and
               Heeyoul Kim and
               Seong{-}Min Hong and
               Hyunsoo Yoon},
  title     = {Improved batch exponentiation},
  journal   = {Inf. Process. Lett.},
  volume    = {109},
  number    = {15},
  pages     = {832--837},
  year      = {2009},
  url       = {https://doi.org/10.1016/j.ipl.2009.04.008},
  doi       = {10.1016/j.ipl.2009.04.008},
  timestamp = {Thu, 06 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ipl/ChungHKHY09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/LeeKCY08,
  author    = {Hanjin Lee and
               Dongwook Kim and
               Byungchun Chung and
               Hyunsoo Yoon},
  title     = {Adaptive Hysteresis Using Mobility Correlation for Fast Handover},
  journal   = {{IEEE} Communications Letters},
  volume    = {12},
  number    = {2},
  pages     = {152--154},
  year      = {2008},
  url       = {https://doi.org/10.1109/LCOMM.2008.071316},
  doi       = {10.1109/LCOMM.2008.071316},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/icl/LeeKCY08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/KimCLPY07,
  author    = {Heeyoul Kim and
               Byungchun Chung and
               Younho Lee and
               Yongsu Park and
               Hyunsoo Yoon},
  title     = {Weakness of the Synchro-Difference {LKH} Scheme for Secure Multicast},
  journal   = {{IEEE} Communications Letters},
  volume    = {11},
  number    = {9},
  pages     = {765--767},
  year      = {2007},
  url       = {https://doi.org/10.1109/LCOMM.2007.070325},
  doi       = {10.1109/LCOMM.2007.070325},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/icl/KimCLPY07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ChungKY07,
  author    = {Byungchun Chung and
               Hong Gil Kim and
               Hyunsoo Yoon},
  title     = {Improved base-{\(\varphi\)} expansion method for Koblitz curves over
               optimal extension fields},
  journal   = {{IET} Information Security},
  volume    = {1},
  number    = {1},
  pages     = {19--26},
  year      = {2007},
  url       = {https://doi.org/10.1049/iet-ifs:20060033},
  doi       = {10.1049/iet-ifs:20060033},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iet-ifs/ChungKY07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeCKLPY06,
  author    = {Soojin Lee and
               Byungchun Chung and
               Heeyoul Kim and
               Yunho Lee and
               Chanil Park and
               Hyunsoo Yoon},
  title     = {Real-time analysis of intrusion detection alerts via correlation},
  journal   = {Comput. Secur.},
  volume    = {25},
  number    = {3},
  pages     = {169--183},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.cose.2005.09.004},
  doi       = {10.1016/j.cose.2005.09.004},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/LeeCKLPY06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimLCYLJ06,
  author    = {Heeyoul Kim and
               Younho Lee and
               Byungchun Chung and
               Hyunsoo Yoon and
               Jaewon Lee and
               KyungIm Jung},
  editor    = {Min Surp Rhee and
               Byoungcheon Lee},
  title     = {Digital Rights Management with Right Delegation for Home Networks},
  booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International
               Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4296},
  pages     = {233--245},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11927587\_20},
  doi       = {10.1007/11927587\_20},
  timestamp = {Tue, 14 May 2019 10:00:36 +0200},
  biburl    = {https://dblp.org/rec/conf/icisc/KimLCYLJ06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics