Improvement of Das's two-factor authentication protocol in wireless sensor networks DH Nyang, MK Lee Cryptology EPrint Archive, 2009 | 124 | 2009 |
Security notions and advanced method for human shoulder-surfing resistant PIN-entry MK Lee IEEE transactions on information forensics and security 9 (4), 695-708, 2014 | 103 | 2014 |
Dictionary attack on functional transform‐based cancelable fingerprint templates SW Shin, MK Lee, D Moon, K Moon ETRI journal 31 (5), 628-630, 2009 | 77 | 2009 |
Privacy-preserving peer-to-peer energy trading in blockchain-enabled smart grids using functional encryption YB Son, JH Im, HY Kwon, SY Jeon, MK Lee Energies 13 (6), 1321, 2020 | 68 | 2020 |
Countermeasures against power analysis attacks for the NTRU public key cryptosystem MK Lee, JE Song, D Choi, DG Han IEICE transactions on fundamentals of electronics, communications and …, 2010 | 53 | 2010 |
Security analysis and improvement of fingerprint authentication for smartphones YH Jo, SY Jeon, JH Im, MK Lee Mobile Information Systems 2016, 2016 | 42 | 2016 |
Secure bimodal PIN-entry method using audio signals MK Lee, H Nam, DK Kim Computers & Security 56, 140-150, 2016 | 38 | 2016 |
Low-complexity elliptic curve cryptography processor based on configurable partial modular reduction over NIST prime fields P Choi, MK Lee, JH Kim, DK Kim IEEE Transactions on Circuits and Systems II: Express Briefs 65 (11), 1703-1707, 2017 | 37 | 2017 |
Practical privacy-preserving face authentication for smartphones secure against malicious clients JH Im, SY Jeon, MK Lee IEEE Transactions on Information Forensics and Security 15, 2386-2401, 2020 | 33 | 2020 |
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks DH Nyang, H Kim, W Lee, S Kang, G Cho, MK Lee, A Mohaisen computers & security 78, 1-15, 2018 | 31 | 2018 |
Authentication of a smart phone user using audio frequency analysis JB Kim, JE Song, MK Lee Journal of the Korea Institute of Information Security & Cryptology 22 (2 …, 2012 | 27 | 2012 |
Secure and user friendly PIN entry method CS Kim, MK Lee 2010 Digest of Technical Papers International Conference on Consumer …, 2010 | 24 | 2010 |
Efficient and privacy-preserving energy trading on blockchain using dual binary encoding for inner product encryption T Gaybullaev, HY Kwon, T Kim, MK Lee Sensors 21 (6), 2024, 2021 | 23 | 2021 |
Sliding window method for NTRU MK Lee, JW Kim, JE Song, K Park International Conference on Applied Cryptography and Network Security, 432-442, 2007 | 23 | 2007 |
Toward quantum secured distributed energy resources: Adoption of post-quantum cryptography (pqc) and quantum key distribution (qkd) J Ahn, HY Kwon, B Ahn, K Park, T Kim, MK Lee, J Kim, J Chung Energies 15 (3), 714, 2022 | 20 | 2022 |
An authenticated encryption scheme with public verifiability MK Lee, DK Kim, K Park Japan-Korea Joint Workshop on Algorithms and Computation (WAAC2000), 49-56, 2000 | 19 | 2000 |
Privacy-preserving palm print authentication using homomorphic encryption JH Im, JC Choi, DH Nyang, MK Lee 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016 | 16 | 2016 |
Improved cancelable fingerprint templates using minutiae‐based functional transform D Moon, JH Yoo, MK Lee Security and Communication Networks 7 (10), 1543-1551, 2014 | 16 | 2014 |
Design and performance analysis of electronic seal protection systems based on AES DK Kim, MK Lee, YS Kang, SH Chung, WJ Yoon, JK Min, H Kim ETRI journal 29 (6), 755-768, 2007 | 15 | 2007 |
Privacy-preserving electricity billing system using functional encryption JH Im, HY Kwon, SY Jeon, MK Lee Energies 12 (7), 1237, 2019 | 13 | 2019 |