2009 |
34 | EE | Pil Joong Lee,
Jung Hee Cheon:
Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers
Springer 2009 |
33 | EE | Minkyu Kim,
Jung Hee Cheon,
Jin Hong:
Subset-Restricted Random Walks for Pollard rho Method on Fpm.
Public Key Cryptography 2009: 54-67 |
2008 |
32 | EE | Ali Bagherzandi,
Jung Hee Cheon,
Stanislaw Jarecki:
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma.
ACM Conference on Computer and Communications Security 2008: 449-458 |
31 | EE | Jung Hee Cheon,
Jin Hong,
Minkyu Kim:
Speeding Up the Pollard Rho Method on Prime Fields.
ASIACRYPT 2008: 471-488 |
30 | EE | Sungwook Kim,
Jung Hee Cheon:
A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents.
Public Key Cryptography 2008: 328-343 |
29 | EE | Jung Hee Cheon,
Nicholas Hopper,
Yongdae Kim,
Ivan Osipkov:
Provably Secure Timed-Release Public Key Encryption.
ACM Trans. Inf. Syst. Secur. 11(2): (2008) |
28 | EE | Jung Hee Cheon,
HongTae Kim:
Analysis of Low Hamming Weight Products.
Discrete Applied Mathematics 156(12): 2264-2269 (2008) |
27 | EE | Jung Hee Cheon,
Nam-Su Jho,
Myung-Hwan Kim,
Eun Sun Yoo:
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption.
IEEE Transactions on Information Theory 54(11): 5155-5171 (2008) |
2007 |
26 | EE | Jung Hee Cheon,
Jeong Hyun Yi:
Fast Batch Verification of Multiple Signatures.
Public Key Cryptography 2007: 442-457 |
2006 |
25 | EE | Jung Hee Cheon:
Security Analysis of the Strong Diffie-Hellman Problem.
EUROCRYPT 2006: 1-11 |
24 | EE | Jung Hee Cheon,
Nicholas Hopper,
Yongdae Kim,
Ivan Osipkov:
Timed-Release and Key-Insulated Public Key Encryption.
Financial Cryptography 2006: 191-205 |
23 | EE | Taekyoung Kwon,
Jung Hee Cheon,
Yongdae Kim,
Jaeil Lee:
Privacy Protection in PKIs: A Separation-of-Authority Approach.
WISA 2006: 297-311 |
22 | EE | Jung Hee Cheon,
Dong Hoon Lee:
Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations.
IEEE Trans. Computers 55(12): 1536-1542 (2006) |
21 | EE | Jung Hee Cheon,
Dong Hoon Lee:
Quadratic Equations from APN Power Functions.
IEICE Transactions 89-A(1): 19-27 (2006) |
20 | EE | Jung Hee Cheon,
Woo-Hwan Kim,
Hyun Soo Nam:
Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme.
Inf. Process. Lett. 97(3): 118-123 (2006) |
2005 |
19 | EE | Nam-Su Jho,
Eun Sun Yoo,
Jung Hee Cheon,
Myung-Hwan Kim:
New broadcast encryption scheme using tree-based circle.
Digital Rights Management Workshop 2005: 37-44 |
18 | EE | Nam-Su Jho,
Jung Yeon Hwang,
Jung Hee Cheon,
Myung-Hwan Kim,
Dong Hoon Lee,
Eun Sun Yoo:
One-Way Chain Based Broadcast Encryption Schemes.
EUROCRYPT 2005: 559-574 |
2004 |
17 | EE | Jung Hee Cheon,
Dong Hoon Lee:
Resistance of S-Boxes against Algebraic Attacks.
FSE 2004: 83-94 |
16 | EE | HyoJin Yoon,
Jung Hee Cheon,
Yongdae Kim:
Batch Verifications with ID-Based Signatures.
ICISC 2004: 233-248 |
15 | EE | Eun Sun Yoo,
Nam-Su Jho,
Jung Hee Cheon,
Myung-Hwan Kim:
Efficient Broadcast Encryption Using Multiple Interpolation Methods.
ICISC 2004: 87-103 |
2003 |
14 | EE | Jung Hee Cheon,
Byungheup Jun:
A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem.
CRYPTO 2003: 212-225 |
13 | EE | Jung-Yeun Lee,
Jung Hee Cheon,
Seungjoo Kim:
An Analysis of Proxy Signatures: Is a Secure Channel Necessary?
CT-RSA 2003: 68-79 |
12 | EE | Dang Nguyen Duc,
Jung Hee Cheon,
Kwangjo Kim:
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption.
ICICS 2003: 11-21 |
11 | EE | Jae Choon Cha,
Jung Hee Cheon:
An Identity-Based Signature from Gap Diffie-Hellman Groups.
Public Key Cryptography 2003: 18-30 |
10 | EE | Jung Hee Cheon,
Seongtaek Chee:
Nonlinearity of Boolean Functions and Hyperelliptic Curves.
SIAM J. Discrete Math. 16(3): 354-365 (2003) |
2002 |
9 | EE | Hae Young Kim,
Jung Youl Park,
Jung Hee Cheon,
Je Hong Park,
Jae Heon Kim,
Sang Geun Hahn:
Fast Elliptic Curve Point Counting Using Gaussian Normal Basis.
ANTS 2002: 292-307 |
2001 |
8 | EE | Jae Choon Cha,
Ki Hyoung Ko,
Sangjin Lee,
Jae Woo Han,
Jung Hee Cheon:
An Efficient Implementation of Braid Groups.
ASIACRYPT 2001: 144-156 |
7 | EE | Jung Hee Cheon:
Nonlinear Vector Resilient Functions.
CRYPTO 2001: 458-469 |
6 | EE | Jung Hee Cheon,
MunJu Kim,
Kwangjo Kim,
Jung-Yeun Lee,
SungWoo Kang:
Improved Impossible Differential Cryptanalysis of Rijndael and Crypton.
ICISC 2001: 39-49 |
5 | EE | Seungjoo Kim,
Jung Hee Cheon,
Marc Joye,
Seongan Lim,
Masahiro Mambo,
Dongho Won,
Yuliang Zheng:
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).
IMA Int. Conf. 2001: 114-127 |
2000 |
4 | EE | Ki Hyoung Ko,
Sangjin Lee,
Jung Hee Cheon,
Jae Woo Han,
Ju-Sung Kang,
Choonsik Park:
New Public-Key Cryptosystem Using Braid Groups.
CRYPTO 2000: 166-183 |
3 | EE | Jung Hee Cheon,
Seongtaek Chee:
Elliptic Curves and Resilient Functions.
ICISC 2000: 64-72 |
1999 |
2 | EE | Jung Hee Cheon,
Seongtaek Chee,
Choonsik Park:
S-boxes with Controllable Nonlinearity.
EUROCRYPT 1999: 286-294 |
1998 |
1 | EE | Jung Hee Cheon,
Sung-Mo Park,
Sangwoo Park,
Daeho Kim:
Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map.
Public Key Cryptography 1998: 195-202 |