default search action
Jun-Cheol Jeon
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j19]Jun-Cheol Jeon:
Design of Fixed Cell-Based Programmable Logic Gate Using Quantum-Dot CA for Efficiency and Reliability of Digital Systems. IEEE Access 12: 187868-187876 (2024) - 2023
- [j18]Jun-Cheol Jeon, Amjad Almatrood, Hyun-Il Kim:
Multi-Layered QCA Content-Addressable Memory Cell Using Low-Power Electronic Interaction for AI-Based Data Learning and Retrieval in Quantum Computing Environment. Sensors 23(1): 19 (2023) - 2022
- [j17]Hyun-Il Kim, Jun-Cheol Jeon:
Quantum LFSR Structure for Random Number Generation Using QCA Multilayered Shift Register for Cryptographic Purposes. Sensors 22(9): 3541 (2022) - 2021
- [j16]Jun-Cheol Jeon:
Designing nanotechnology QCA-multiplexer using majority function-based NAND for quantum computing. J. Supercomput. 77(2): 1562-1578 (2021) - 2020
- [j15]Nuriddin Safoev, Jun-Cheol Jeon:
Design of high-performance QCA incrementer/decrementer circuit based on adder/subtractor methodology. Microprocess. Microsystems 72 (2020) - [j14]Jun-Cheol Jeon:
Low-complexity QCA universal shift register design using multiplexer and D flip-flop based on electronic correlations. J. Supercomput. 76(8): 6438-6452 (2020) - 2015
- [j13]Kee-Won Kim, Jun-Cheol Jeon:
A semi-systolic Montgomery multiplier over GF(2m). IEICE Electron. Express 12(21): 20150769 (2015) - 2013
- [j12]Heung Soo Kim, Jung-Woo Sohn, Jun-Cheol Jeon, Seung-Bok Choi:
Reduction of the Radiating Sound of a Submerged Finite Cylindrical Shell Structure by Active Vibration Control. Sensors 13(2): 2131-2147 (2013) - 2010
- [j11]Jun-Cheol Jeon:
Non-linear and non-group cellular automata chaining technique for cryptographic applications. Math. Comput. Model. 51(7-8): 995-999 (2010) - 2008
- [j10]Jun-Cheol Jeon, Kee-Young Yoo:
Montgomery exponent architecture based on programmable cellular automata. Math. Comput. Simul. 79(4): 1189-1196 (2008) - [j9]Jun-Cheol Jeon, Kee-Young Yoo:
Elliptic curve based hardware architecture using cellular automata. Math. Comput. Simul. 79(4): 1197-1203 (2008) - 2007
- [j8]Jun-Cheol Jeon, Kee-Young Yoo:
Programmable cellular automata based Montgomery hardware architecture. Appl. Math. Comput. 186(1): 915-922 (2007) - [j7]Jun-Cheol Jeon, Kee-Young Yoo:
Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns. Appl. Math. Comput. 186(2): 1423-1428 (2007) - [j6]Kee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo:
Efficient and secure password authentication schemes for low-power devices. Int. J. Sens. Networks 2(1/2): 77-81 (2007) - 2006
- [j5]Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo:
A novel approach for bit-serial AB2 multiplication in finite fields GF(2m). Comput. Math. Appl. 51(6-7): 1103-1112 (2006) - 2005
- [j4]Kee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo:
An improvement on Yang et al.'s password authentication schemes. Appl. Math. Comput. 170(1): 207-215 (2005) - 2004
- [j3]Jun-Cheol Jeon, Kee-Young Yoo:
Design of Montgomery Multiplication Architecture Based on Programmable Cellular Automata. Comput. Intell. 20(3): 495-502 (2004) - [j2]Jung-Seuk Lee, Jun-Cheol Jeon, Kee-Young Yoo:
A security scheme for protecting security policies in firewall. ACM SIGOPS Oper. Syst. Rev. 38(2): 69-72 (2004) - 2002
- [j1]Jun-Cheol Jeon, Hyun-Sung Kim, Hyoung-Mok Lee, Kee-Young Yoo:
Bit-serial AB2 Multiplier Using Modified Inner Product. J. Inf. Sci. Eng. 18(4): 507-518 (2002)
Conference and Workshop Papers
- 2014
- [c30]Sang-Ho Shin, Jun-Cheol Jeon, Gil-Je Lee, Kee-Young Yoo:
Design of a cellular automata cell with rule 30 on quantum-dot cellular automata. SAC 2014: 1749-1750 - 2013
- [c29]Kee-Won Kim, Jun-Cheol Jeon:
Design of Parallel Pipelined Algorithm for Field Arithmetic Architecture Based on Cellular Array. GPC 2013: 920-925 - [c28]Kondwani Makanda, Jun-Cheol Jeon:
Key Distribution Protocol on Quantum Cryptography. ICITCS 2013: 1-2 - 2012
- [c27]Kee-Won Kim, Jun-Cheol Jeon:
Cellular semi-systolic Montgomery Multiplier on finite fields. CyberSec 2012: 1-5 - [c26]Jun-Cheol Jeon:
One-Way Hash Function Based on Cellular Automata. ICITCS 2012: 21-28 - [c25]Jun-Cheol Jeon, Kang-Joong Seo, Kee-Won Kim:
Hardware complexity of SHA-1 and SHA-256 based on area and time analysis. ICOIN 2012: 557-561 - 2009
- [c24]Kang-Joong Seo, Jun-Cheol Jeon, Kee-Young Yoo:
A Reinforced Authentication Protocol for Anti-Counterfeiting and Privacy Protection. ITNG 2009: 1610-1611 - 2007
- [c23]Se-Min Kim, Jun-Cheol Jeon, Byung-Heon Kang, Sang-Ho Shin, Kee-Young Yoo:
Non-linear and Non-group Cellular Automata for Cryptographic Applications. Security and Management 2007: 432-438 - 2006
- [c22]Byung-Heon Kang, Jun-Cheol Jeon, Kee-Young Yoo:
Decision Algorithms for Cellular Automata States Based on Periodic Boundary Condition. ACRI 2006: 104-111 - [c21]Jun-Cheol Jeon, Kee-Young Yoo:
Cellular Automata Based Role-Delegation in RBAC. ACRI 2006: 588-594 - [c20]Jun-Cheol Jeon, Kee-Young Yoo:
Authentication Based on Singular Cellular Automata. ACRI 2006: 605-610 - [c19]Jun-Cheol Jeon, Kee-Won Kim, Byung-Heon Kang, Kee-Young Yoo:
Cellular Automata Architecture for Elliptic Curve Cryptographic Hardware. International Conference on Computational Science (3) 2006: 329-336 - [c18]Jun-Cheol Jeon, Kee-Won Kim, Jai-Boo Oh, Kee-Young Yoo:
Modular Divider for Elliptic Curve Cryptographic Hardware Based on Programmable CA. International Conference on Computational Science (4) 2006: 661-668 - [c17]Jun-Cheol Jeon, Kee-Young Yoo:
Conflict Detection in Role-Based Access Control Using Multiple-Attractor Cellular Automata. ICIC (1) 2006: 533-541 - [c16]Byung-Heon Kang, Jun-Cheol Jeon, Kee-Young Yoo:
Evolutionary Algorithms for Group/Non-group Decision in Periodic Boundary CA. ICNC (1) 2006: 629-632 - [c15]Jai-Boo Oh, Jun-Cheol Jeon, Kee-Young Yoo:
Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. ISPA Workshops 2006: 57-64 - [c14]Jun-Cheol Jeon, Byung-Heon Kang, Se-Min Kim, Wan-Soo Lee, Kee-Young Yoo:
An Improvement of Remote User Authentication Scheme Using Smart Cards. MSN 2006: 416-423 - [c13]Jun-Cheol Jeon, Eun-Yeung Choi, Kee-Young Yoo:
Agent-Based Real Time Intrusion Detection System Against Malformed Packet Attacks. PRIMA 2006: 807-812 - 2005
- [c12]Hee-Jung Yoon, Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo:
A Secure One-Time Password Authentication Using Cellular Automata. CAINE 2005: 376-381 - [c11]Hye-Jin Yang, Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo:
New Authentication Scheme with No Verification Table. CAINE 2005: 387-389 - [c10]Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo:
Evolutionary Hardware Architecture for Division in Elliptic Curve Cryptosystems over GF(2n). ICNC (3) 2005: 348-355 - [c9]Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo:
Non-group Cellular Automata Based One Time Password Authentication Scheme in Wireless Networks. MADNES 2005: 110-116 - [c8]Kee-Won Kim, Jun-Cheol Jeon, Kee-Young Yoo:
Efficient and Secure Password Authentication Schemes for Low-Power Devices. MSN 2005: 73-82 - [c7]Jun-Cheol Jeon, Kee-Won Kim, Kee-Young Yoo:
Low-Complexity Authentication Scheme Based on Cellular Automata in Wireless Network. MSN 2005: 413-421 - 2004
- [c6]Yong-Seok Kim, Jun-Cheol Jeon, Jin-woo Jeon, Kee-Young Yoo:
An Efficient Access Control Model Based on User-Classification and Role-Division. Security and Management 2004: 300-304 - [c5]Jun-Cheol Jeon, Kee-Young Yoo:
An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields. PRICAI 2004: 241-250 - 2003
- [c4]Jun-Cheol Jeon, Kee-Young Yoo:
Design of Bit-parallel Multiplier Based on Programmable Cellular Automata. PDCS 2003: 94-98 - [c3]Hye-Young Park, Jun-Cheol Jeon, Jai-Boo Oh, Kee-Yon Yoo:
An Efficient Multiplication Architecture using Montgomery Algorithm based on Programmable Cellular Automata. CAINE 2003: 87-90 - [c2]Jun-Cheol Jeon, Hye-Young Park, Kee-Young Yoo:
Design of Montgomery multiplication architecture based on programmable cellular automata. IEEE Congress on Evolutionary Computation 2003: 1676-1679 - [c1]Jun-Cheol Jeon, Kee-Young Yoo:
Computational Algorithm and Architecture for AB2 Multiplication in Finite Fields. ICCSA (1) 2003: 947-956
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint