Author of the publication

Unlimited-Vocabulary Grapheme-to-Morpheme Conversion for Korean TTS

, , , and . Proceedings of ACL-COLING 98, page 675--679. (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Differential Cryptanalysis of TEA and XTEA., , , , , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 402-417. Springer, (2003)A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks., , , , , and . IACR Cryptol. ePrint Arch., (2023)A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model., , , , , and . IACR Cryptol. ePrint Arch., (2004)Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA., , , , and . FSE, volume 2365 of Lecture Notes in Computer Science, page 49-60. Springer, (2002)Services-Oriented Computing in a Ubiquitous Computing Platform., , , and . ICSOC, volume 4294 of Lecture Notes in Computer Science, page 601-612. Springer, (2006)New Parallel Domain Extenders for UOWHF., , , , and . ASIACRYPT, volume 2894 of Lecture Notes in Computer Science, page 208-227. Springer, (2003)Unlimited-Vocabulary Grapheme-to-Morpheme Conversion for Korean TTS, , , and . Proceedings of ACL-COLING 98, page 675--679. (1998)Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers., , , , , , and . J. Cryptol., 19 (4): 441-462 (2006)Amplified Boomerang Attack against Reduced-Round SHACAL., , , , , and . ASIACRYPT, volume 2501 of Lecture Notes in Computer Science, page 243-253. Springer, (2002)An Event Detection Service for Spatio-temporal Applications., , , , and . W2GIS, volume 4295 of Lecture Notes in Computer Science, page 22-30. Springer, (2006)