default search action
Ku-Young Chang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2020
- [j32]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Space Efficient $GF(2^m)$ Multiplier for Special Pentanomials Based on $n$ -Term Karatsuba Algorithm. IEEE Access 8: 27342-27360 (2020) - [j31]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Efficient Bit-Parallel Multiplier for All Trinomials Based on n-Term Karatsuba Algorithm. IEEE Access 8: 173491-173507 (2020) - 2019
- [j30]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Low Space Complexity $GF(2^m)$ Multiplier for Trinomials Using $n$ -Term Karatsuba Algorithm. IEEE Access 7: 27047-27064 (2019) - 2018
- [j29]Taek-Young Youn, Ku-Young Chang, Kyung-Hyune Rhee, Sang-Uk Shin:
Efficient Client-Side Deduplication of Encrypted Data With Public Auditing in Cloud Storage. IEEE Access 6: 26578-26587 (2018) - [j28]Taek-Young Youn, Ku-Young Chang:
Bi-directional and concurrent proof of ownership for stronger storage services with de-duplication. Sci. China Inf. Sci. 61(3): 032107:1-032107:11 (2018) - [j27]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Efficient Three-Way Split Formulas for Binary Polynomial Multiplication and Toeplitz Matrix Vector Product. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 239-248 (2018) - [j26]Ku-Young Chang, Sun-Mi Park, Dowon Hong, Changho Seo:
Efficient multiplier based on hybrid approach for Toeplitz matrix-vector product. Inf. Process. Lett. 131: 33-38 (2018) - [j25]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Subquadratic Space Complexity Multiplier Using Even Type GNB Based on Efficient Toeplitz Matrix-Vector Product. IEEE Trans. Computers 67(12): 1794-1805 (2018) - [j24]Taek-Young Youn, Nam-Su Jho, Ku-Young Chang:
Design of additive homomorphic encryption with multiple message spaces for secure and practical storage services over encrypted data. J. Supercomput. 74(8): 3620-3638 (2018) - 2017
- [j23]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
New Block Recombination for Subquadratic Space Complexity Polynomial Multiplication Based on Overlap-Free Approach. IEEE Trans. Computers 66(8): 1396-1406 (2017) - 2016
- [j22]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Efficient Multiplication Based on Dickson Bases over Any Finite Fields. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(11): 2060-2074 (2016) - [j21]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Explicit formulae for Mastrovito matrix and its corresponding Toeplitz matrix for all irreducible pentanomials using shifted polynomial basis. Integr. 53: 27-38 (2016) - [j20]Jung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee, DaeHun Nyang:
Anonymity-based authenticated key agreement with full binding property. J. Commun. Networks 18(2): 190-200 (2016) - [j19]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Comments on "Multiway Splitting Method for Toeplitz Matrix Vector Product". IEEE Trans. Computers 65(1): 332-333 (2016) - [j18]Nam-Su Jho, Ku-Young Chang, Dowon Hong, Changho Seo:
Symmetric searchable encryption with efficient range query using multi-layered linked chains. J. Supercomput. 72(11): 4233-4246 (2016) - 2015
- [j17]Jung Yeon Hwang, Ku-Young Chang, Hyun Sook Cho, Boyeon Song, Willy Susilo:
Collusion-resistant convertible ring signature schemes. Sci. China Inf. Sci. 58(1): 1-16 (2015) - [j16]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Generalization to Any Field of Toeplitz Matrix Vector Product Based on Multi-Way Splitting Method and Its Application. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 378-383 (2015) - [j15]Nam-Su Jho, Ku-Young Chang, Dowon Hong:
Efficient Construction of Order-Preserving Encryption Using Pseudo Random Function. IEICE Trans. Commun. 98-B(7): 1276-1283 (2015) - [j14]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Low Complexity Multiplier Based on Dickson Basis Using Efficient Toeplitz Matrix-Vector Product. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(11): 2283-2290 (2015) - 2014
- [j13]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Bit-Parallel Cubing Computation over GF(3m) for Irreducible Trinomials. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 347-353 (2014) - [j12]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
New efficient bit-parallel polynomial basis multiplier for special pentanomials. Integr. 47(1): 130-139 (2014) - [j11]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Comments on "On the Polynomial Multiplication in Chebyshev Form". IEEE Trans. Computers 63(12): 3162-3163 (2014) - 2013
- [j10]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Fast Bit-Parallel Polynomial Basis Multiplier for GF(2m) Defined by Pentanomials Using Weakly Dual Basis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 322-331 (2013) - [j9]Yuseop Lee, Kitae Jeong, Jaechul Sung, Changhoon Lee, Seokhie Hong, Ku-Young Chang:
Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j8]Sun-Mi Park, Ku-Young Chang, Dowon Hong:
Parallel GF(3m) multiplier for trinomials. Inf. Process. Lett. 113(4): 111-115 (2013) - 2011
- [j7]Abedelaziz Mohaisen, Ku-Young Chang, Dowon Hong:
Attacks and Countermeasures for RFID Mutual Authentication Scheme in Pervasive Computing Environmen. KSII Trans. Internet Inf. Syst. 5(9): 1684-1697 (2011) - [j6]Sun-Mi Park, Ku-Young Chang:
Fast Bit-Parallel Shifted Polynomial Basis Multiplier Using Weakly Dual Basis Over GF(2m). IEEE Trans. Very Large Scale Integr. Syst. 19(12): 2317-2321 (2011) - 2006
- [j5]Sun-Mi Park, Ku-Young Chang:
Low Complexity Bit-Parallel Squarer for GF(2n) Defined by Irreducible Trinomials. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(9): 2451-2452 (2006) - [j4]Sun-Mi Park, Ku-Young Chang, Dowon Hong:
Efficient Bit-Parallel Multiplier for Irreducible Pentanomials Using a Shifted Polynomial Basis. IEEE Trans. Computers 55(9): 1211-1215 (2006) - 2005
- [j3]Ku-Young Chang, Dowon Hong, Hyun Sook Cho:
Low Complexity Bit-Parallel Multiplier for GF(2^m) Defined by All-One Polynomials Using Redundant Representation. IEEE Trans. Computers 54(12): 1628-1630 (2005) - 2004
- [j2]Ku-Young Chang, Howon Kim, Ju-Sung Kang, Hyun Sook Cho:
An extension of TYT algorithm for GF((2n)m) using precomputation. Inf. Process. Lett. 92(5): 231-234 (2004) - 2003
- [j1]Ku-Young Chang, Soun-Hi Kwon:
The class number one problem for some non-abelian normal CM-fields of degree 48. Math. Comput. 72(242): 1003-1017 (2003)
Conference and Workshop Papers
- 2017
- [c9]Taek-Young Youn, Ku-Young Chang:
New User Management Technique in Storage Services for Stronger Privacy. CSA/CUTE 2017: 979-984 - 2015
- [c8]Taek-Young Youn, Ku-Young Chang:
Necessity of Incentive System for the First Uploader in Client-Side Deduplication. CSA/CUTE 2015: 397-402 - [c7]Keonwoo Kim, Ku-Young Chang:
Performance Analysis of Format-Preserving Encryption Based on Unbalanced-Feistel Structure. CSA/CUTE 2015: 425-430 - 2014
- [c6]Taek-Young Youn, Nam-Su Jho, Ku-Young Chang, Dowon Hong:
Bucket Index Ordering Problem in Range Queries. FCC 2014: 347-355 - 2012
- [c5]Ju-Sung Kang, Okyeon Yi, Min-Ku Kim, Ku-Young Chang:
Practical Multi-party Versions of Private Set Intersection Protocols with Hardware Tokens. FGIT-FGCN/DCA 2012: 72-79 - [c4]Jung Yeon Hwang, Sungwook Eom, Ku-Young Chang, Pil Joong Lee, DaeHun Nyang:
Anonymity-Based Authenticated Key Agreement with Full Binding Property. WISA 2012: 177-191 - 2007
- [c3]Sang Su Lee, Ku-Young Chang, Deokgyu Lee, Dowon Hong:
A New Anti-Forensic Tool Based on a Simple Data Encryption Scheme. FGCN (2) 2007: 114-118 - 2006
- [c2]Ku-Young Chang, Ju-Sung Kang, Mun-Kyu Lee, Hangrok Lee, Dowon Hong:
New Variant of the Self-Shrinking Generator and Its Cryptographic Properties. ICISC 2006: 41-50 - 2002
- [c1]Dowon Hong, Ku-Young Chang, Heuisu Ryu:
Efficient Oblivious Transfer in the Bounded-Storage Model. ASIACRYPT 2002: 143-159
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint