Efficient algorithms for pairing-based cryptosystems PSLM Barreto, HY Kim, B Lynn, M Scott Advances in Cryptology—CRYPTO 2002: 22nd Annual International Cryptology …, 2002 | 1598 | 2002 |
Toward secure public-key blockwise fragile authentication watermarking PSLM Barreto, HY Kim, V Rijmen IEE Proceedings-Vision, Image and Signal Processing 149 (2), 57-62, 2002 | 247 | 2002 |
Grayscale template-matching invariant to rotation, scale, translation, brightness and contrast HY Kim, SA De Araújo Advances in Image and Video Technology: Second Pacific Rim Symposium, PSIVT …, 2007 | 185 | 2007 |
Beans quality inspection using correlation-based granulometry SA De Araújo, JH Pessota, HY Kim Engineering Applications of Artificial Intelligence 40, 84-94, 2015 | 68 | 2015 |
Rotation-discriminating template matching based on Fourier coefficients of radial projections with robustness to scaling and partial occlusion HY Kim Pattern Recognition 43 (3), 859-872, 2010 | 62 | 2010 |
Alteration-locating authentication watermarking for binary images HY Kim, RL de Queiroz International Workshop on Digital Watermarking, 125-136, 2004 | 61 | 2004 |
Fast hashing onto elliptic curves over fields of characteristic 3 PSLM Barreto, HY Kim Cryptology ePrint Archive, 2001 | 60 | 2001 |
Secure authentication watermarking for binary images HY Kim, A Afif 16th Brazilian Symposium on Computer Graphics and Image Processing (SIBGRAPI …, 2003 | 55 | 2003 |
A secure authentication watermarking for halftone and binary images HY Kim, A Afif International Journal of Imaging Systems and Technology 14 (4), 147-152, 2004 | 51 | 2004 |
Robust anisotropic diffusion to produce enhanced statistical parametric map from noisy fMRI HY Kim, J Giacomantone, ZH Cho Computer Vision and Image Understanding 99 (3), 435-452, 2005 | 45 | 2005 |
A new public-key authentication watermarking for binary document images resistant to parity attacks HY Kim IEEE International Conference on Image Processing 2005 2, II-1074, 2005 | 44 | 2005 |
Breast cancer diagnosis in two-view mammography using end-to-end trained efficientnet-based convolutional network DGP Petrini, C Shimizu, RA Roela, GV Valente, MAAK Folgueira, HY Kim Ieee access 10, 77723-77731, 2022 | 43 | 2022 |
Ciratefi: An RST-invariant template matching with extension to color images SA de Araújo and, HY Kim Integrated Computer-Aided Engineering 18 (1), 75-90, 2011 | 40 | 2011 |
Square attacks on reduced-round PES and IDEA block ciphers J Nakahara Jr, PSLM Barreto, B Preneel, J Vandewalle, HY Kim Cryptology ePrint Archive, 2001 | 40 | 2001 |
Improved Square Attacks against Reduced-Round Hierocrypt PSLM Barreto, V Rijmen, J Nakahara, B Preneel, J Vandewalle, HY Kim Fast Software Encryption: 8th International Workshop, FSE 2001 Yokohama …, 2002 | 37 | 2002 |
Differential audio analysis: a new side-channel attack on PIN pads G de Souza Faria, HY Kim International Journal of Information Security 18, 73-84, 2019 | 33 | 2019 |
Classificação de imagens de sensoriamento remoto pela aprendizagem por árvore de decisão: uma avaliação de desempenho MH Shiba, RL Santos, JA Quintanilha, HY Kim Simpósio Brasileiro de Sensoriamento Remoto 12, 4319-4326, 2005 | 32 | 2005 |
Correlation-based multi-shape granulometry with application in porous silicon nanomaterial characterization HY Kim, RH Maruta, DR Huanca, WJ Salcedo Journal of Porous Materials 20, 375-385, 2013 | 23 | 2013 |
Identification of pressed keys from mechanical vibrations G de Souza Faria, HY Kim IEEE Transactions on Information Forensics and Security 8 (7), 1221-1229, 2013 | 22 | 2013 |
A public-key authentication watermarking for binary images HY Kim, RL De Queiroz 2004 International Conference on Image Processing, 2004. ICIP'04. 5, 3459-3462, 2004 | 21 | 2004 |