-
1مؤتمر
المؤلفون: Young-Ho Cha, Chang-Su Park, Gyeong-Yeon Cho, Hyek-Hwan Choi
المصدر: Proceedings of Second IEEE Asia Pacific Conference on ASICs. AP-ASIC 2000 (Cat. No.00EX434) ASICs ASICs, 2000. AP-ASIC 2000. Proceedings of the Second IEEE Asia Pacific Conference on. :335-338 2000
Relation: Proceedings of Second IEEE Asia Pacific Conference on ASICs AP-ASIC 2000
-
2مؤتمر
المؤلفون: Gil-Ho Kim, Jong-Nam Kim, Gyeong-Yeon Cho
المصدر: 2009 11th International Conference on Advanced Communication Technology Advanced Communication Technology, 2009. ICACT 2009. 11th International Conference on. 03:1777-1780 Feb, 2009
Relation: 2009 11th International Conference on Advanced Communication Technology (ICACT)
-
3
المؤلفون: Gyeong-Yeon Cho
المصدر: Journal of the Korea Institute of Information and Communication Engineering. 19:2341-2349
مصطلحات موضوعية: Floating point, General Computer Science, Value (computer science), Multiplication, Double-precision floating-point format, Division (mathematics), Error detection and correction, Algorithm, Reciprocal, Single-precision floating-point format, Mathematics
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::131bf17e1bdcef716a5aee49c95487c8
https://doi.org/10.6109/jkiice.2015.19.10.2341 -
4
المؤلفون: Gyeong-Yeon Cho
المصدر: Journal of IEMEK. 9:285-292
مصطلحات موضوعية: symbols.namesake, Floating point, symbols, Arithmetic, Latency (engineering), Error detection and correction, Newton's method, Mathematics
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::aeaeefc044bcf21c1bb9d177bfc81b15
https://doi.org/10.14372/iemek.2014.9.5.285 -
5
المؤلفون: Gyeong-Yeon Cho, Gil-Ho Kim, Sung-Gi Kim
المصدر: Journal of the Korea Institute of Information and Communication Engineering. 18:1904-1913
مصطلحات موضوعية: General Computer Science, Computer science, Parallel computing, Salsa20, Stream cipher
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::794af475faa2b81f0da3a2b63843d8eb
https://doi.org/10.6109/jkiice.2014.18.8.1904 -
6
المؤلفون: Gyeong-Yeon Cho
المصدر: Journal of the Korea Academia-Industrial cooperation Society. 15:3093-3099
مصطلحات موضوعية: Computation, Division algorithm, Multiplier (economics), Double-precision floating-point format, 32-bit, Algorithm, Extended precision, Reciprocal, Mathematics
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::f729c5cd49b9bf9522c31f0fc76ecc1a
https://doi.org/10.5762/kais.2014.15.5.3093 -
7
المؤلفون: Gyeong-Yeon Cho
المصدر: Journal of the Korea Industrial Information Systems Research. 18:31-37
مصطلحات موضوعية: symbols.namesake, Division algorithm, symbols, Applied mathematics, Multiplier (economics), Double-precision floating-point format, 32-bit, Newton's method, Algorithm, Extended precision, Reciprocal, Mathematics
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::11a45b59808b4e1c3bb0b847eb37a810
https://doi.org/10.9723/jksiis.2013.18.6.031 -
8
المؤلفون: Gyeong Yeon Cho, Gil-Ho Kim
المصدر: Journal of Korea Multimedia Society. 16:1427-1438
مصطلحات موضوعية: Block cipher mode of operation, Computer science, business.industry, SHACAL, Confidentiality, Computer security, computer.software_genre, business, Stream cipher, computer, Computer network
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::b5daafa7d24e44e4f6cf75ce5ff6c111
https://doi.org/10.9717/kmms.2013.16.12.1427 -
9
المؤلفون: Gyeong-Yeon Cho, Sung-Gi Kim, Gil-Ho Kim
المصدر: The Journal of Korea Information and Communications Society. :972-981
مصطلحات موضوعية: Wireless network, Computer science, business.industry, Reliability (computer networking), Computer security, computer.software_genre, Information and Communications Technology, Key (cryptography), Network-centric warfare, Confidentiality, business, computer, Stream cipher, Situation analysis, Computer network
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::ed516305182f2dafb6ce923757fbda4f
https://doi.org/10.7840/kics.2013.38c.11.972 -
10
المؤلفون: Kyung Hyune Rhee, Sang Uk Shin, Gyeong-Yeon Cho, Gil-Ho Kim
المصدر: The Journal of the Korean Institute of Information and Communication Engineering. 16:2207-2216
مصطلحات موضوعية: Triple DES, Block cipher mode of operation, CBC-MAC, General Computer Science, Computer science, business.industry, Stream cipher attack, Real-time computing, Cryptography, Salsa20, Encryption, Key distribution in wireless sensor networks, Cipher, Embedded system, business, Stream cipher, Computer network
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::2beffd0e2a8d21c78f0f7720f4e38265
https://doi.org/10.6109/jkiice.2012.16.10.2207