2009 |
56 | EE | Jiqiang Lv,
Kui Ren,
Xiaofeng Chen,
Kwangjo Kim:
The ring authenticated encryption scheme - How to provide a clue wisely.
Inf. Sci. 179(1-2): 161-168 (2009) |
2008 |
55 | EE | Jin Li,
Kwangjo Kim,
Fangguo Zhang,
Duncan S. Wong:
Generic Security-Amplifying Methods of Ordinary Digital Signatures.
ACNS 2008: 224-241 |
54 | EE | Xiaofeng Chen,
Fangguo Zhang,
Haibo Tian,
Baodian Wei,
Willy Susilo,
Yi Mu,
Hyunrok Lee,
Kwangjo Kim:
Efficient generic on-line/off-line (threshold) signatures without key exposure.
Inf. Sci. 178(21): 4192-4203 (2008) |
2007 |
53 | EE | Sungchul Heo,
Zeen Kim,
Kwangjo Kim:
Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups.
GLOBECOM 2007: 464-468 |
52 | EE | Jangseong Kim,
Zeen Kim,
Kwangjo Kim:
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment.
ICISC 2007: 37-48 |
51 | EE | Jin Li,
Tsz Hon Yuen,
Kwangjo Kim:
Practical Threshold Signatures Without Random Oracles.
ProvSec 2007: 198-207 |
50 | EE | Jin Li,
Kwangjo Kim,
Fangguo Zhang,
Xiaofeng Chen:
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature.
ProvSec 2007: 208-217 |
49 | EE | Duc-Liem Vo,
Kwangjo Kim:
Security Analysis of an ID-Based Key Agreement for Peer Group Communication.
IEICE Transactions 90-A(11): 2624-2625 (2007) |
2006 |
48 | EE | Youngjoon Seo,
Hyunrok Lee,
Kwangjo Kim:
A Scalable and Untraceable Authentication Protocol for RFID.
EUC Workshops 2006: 252-261 |
47 | EE | Divyan M. Konidala,
Kwangjo Kim:
Mobile RFID Applications and Security Challenges.
ICISC 2006: 194-205 |
2005 |
46 | EE | Duc-Liem Vo,
Kwangjo Kim:
Yet Another Forward Secure Signature from Bilinear Pairings.
ICISC 2005: 441-455 |
45 | EE | Divyan M. Konidala,
Dang Nguyen Duc,
Dongman Lee,
Kwangjo Kim:
A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments.
PerCom Workshops 2005: 136-140 |
44 | EE | Fangguo Zhang,
Kwangjo Kim:
Cryptanalysis of Lee-Hwang-Li's key authentication scheme.
Applied Mathematics and Computation 161(1): 101-107 (2005) |
43 | EE | Jiqiang Lv,
Xinmei Wang,
Kwangjo Kim:
Security of a multisignature scheme for specified group of verifiers.
Applied Mathematics and Computation 166(1): 58-63 (2005) |
42 | EE | Jiqiang Lv,
Xinmei Wang,
Kwangjo Kim:
Practical convertible authenticated encryption schemes using self-certified public keys.
Applied Mathematics and Computation 169(2): 1285-1297 (2005) |
2004 |
41 | EE | SungJun Min,
Go Yamamoto,
Kwangjo Kim:
Weak Property of Malleability in NTRUSign.
ACISP 2004: 379-390 |
40 | EE | Xiaofeng Chen,
Fangguo Zhang,
Kwangjo Kim:
Limited Verifier Signature from Bilinear Pairings.
ACNS 2004: 135-148 |
39 | EE | Byoungcheon Lee,
Colin Boyd,
Ed Dawson,
Kwangjo Kim,
Jeongmo Yang,
Seungjae Yoo:
Secure Key Issuing in ID-based Cryptography.
ACSW Frontiers 2004: 69-74 |
38 | EE | Songwon Lee,
Kyusuk Han,
Seok-kyu Kang,
Kwangjo Kim,
So Ran Ine:
Threshold Password-Based Authentication Using Bilinear Pairings.
EuroPKI 2004: 350-363 |
37 | EE | Xiaofeng Chen,
Fangguo Zhang,
Divyan M. Konidala,
Kwangjo Kim:
New ID-Based Threshold Signature Scheme from Bilinear Pairings.
INDOCRYPT 2004: 371-383 |
36 | EE | Xiaofeng Chen,
Fangguo Zhang,
Kwangjo Kim:
Chameleon Hashing Without Key Exposure.
ISC 2004: 87-98 |
35 | EE | Kui Ren,
Hyunrok Lee,
Kwangjo Kim,
Taewhan Yoo:
Efficient Authenticated Key Agreement Protocol for Dynamic Groups.
WISA 2004: 144-159 |
34 | EE | Kui Ren,
Tieyan Li,
Zhiguo Wan,
Feng Bao,
Robert H. Deng,
Kwangjo Kim:
Highly reliable trust establishment scheme in ad hoc networks.
Computer Networks 45(6): 687-699 (2004) |
2003 |
33 | EE | Arvind Narayanan,
C. Pandu Rangan,
Kwangjo Kim:
Practical Pay TV Schemes.
ACISP 2003: 192-203 |
32 | EE | Fangguo Zhang,
Kwangjo Kim:
Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings.
ACISP 2003: 312-323 |
31 | EE | Sangwon Lee,
Yongdae Kim,
Kwangjo Kim,
DaeHyun Ryu:
An Efficient Tree-Based Group Key Agreement Using Bilinear Map.
ACNS 2003: 357-371 |
30 | EE | Dang Nguyen Duc,
Jung Hee Cheon,
Kwangjo Kim:
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption.
ICICS 2003: 11-21 |
29 | EE | Yan Xie,
Fangguo Zhang,
Xiaofeng Chen,
Kwangjo Kim:
ID-Based Distributed "Magic Ink" Signature from Pairings.
ICICS 2003: 249-259 |
28 | EE | Byoungcheon Lee,
Colin Boyd,
Ed Dawson,
Kwangjo Kim,
Jeongmo Yang,
Seungjae Yoo:
Providing Receipt-Freeness in Mixnet-Based Voting Protocols.
ICISC 2003: 245-258 |
27 | EE | Xiaofeng Chen,
Byoungcheon Lee,
Kwangjo Kim:
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption.
ICISC 2003: 259-273 |
26 | EE | V. Vinod,
Arvind Narayanan,
K. Srinathan,
C. Pandu Rangan,
Kwangjo Kim:
On the Power of Computational Secret Sharing.
INDOCRYPT 2003: 162-176 |
25 | EE | SuGil Choi,
Kwangjo Kim,
ByeongGon Kim:
Practical Solution for Location Privacy in Mobile IPv6.
WISA 2003: 69-83 |
2002 |
24 | | Kwangjo Kim:
Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings
Springer 2002 |
23 | EE | Fangguo Zhang,
Shengli Liu,
Kwangjo Kim:
Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems.
ACISP 2002: 203-213 |
22 | EE | Myungsun Kim,
Kwangjo Kim:
A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem.
ACISP 2002: 362-378 |
21 | EE | Fangguo Zhang,
Kwangjo Kim:
ID-Based Blind Signature and Ring Signature from Pairings.
ASIACRYPT 2002: 533-547 |
20 | EE | Myungsun Kim,
Jongseong Kim,
Kwangjo Kim:
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption.
ICICS 2002: 97-108 |
19 | EE | Byoungcheon Lee,
Kwangjo Kim:
Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer.
ICISC 2002: 389-406 |
18 | EE | Byoungcheon Lee,
Kwangjo Kim:
Self-certified Signatures.
INDOCRYPT 2002: 199-214 |
2001 |
17 | | Kwangjo Kim:
Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings
Springer 2001 |
16 | EE | Byoungcheon Lee,
Heesun Kim,
Kwangjo Kim:
Secure Mobile Agent Using Strong Non-designated Proxy Signature.
ACISP 2001: 474 |
15 | EE | Jinho Kim,
Kwangjo Kim,
Chulsoo Lee:
An Efficient and Provably Secure Threshold Blind Signature.
ICISC 2001: 318-327 |
14 | EE | Jung Hee Cheon,
MunJu Kim,
Kwangjo Kim,
Jung-Yeun Lee,
SungWoo Kang:
Improved Impossible Differential Cryptanalysis of Rijndael and Crypton.
ICISC 2001: 39-49 |
13 | EE | Byoungcheon Lee,
Kwangjo Kim,
Joongsoo Ma:
Efficient Public Auction with One-Time Registration and Public Verifiability.
INDOCRYPT 2001: 162-174 |
2000 |
12 | | Joonsang Baek,
Byoungcheon Lee,
Kwangjo Kim:
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption.
ACISP 2000: 49-58 |
11 | EE | Byoungcheon Lee,
Kwangjo Kim:
Secure Matchmaking Protocol.
ICISC 2000: 123-134 |
10 | EE | Boyeon Song,
Kwangjo Kim:
Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation.
INDOCRYPT 2000: 237-249 |
9 | EE | Gookwhan Ahn,
Kwangjo Kim,
Hee Yong Youn:
Tapping Alert Protocol.
WETICE 2000: 159-164 |
1999 |
8 | | Moonseog Seo,
Kwangjo Kim:
Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme.
ICISC 1999: 269-277 |
7 | EE | Kwangjo Kim,
Sangjoon Park,
Joonsang Baek:
Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol.
ICPP Workshops 1999: 140-145 |
1997 |
6 | | Sangjoon Park,
Sangwoo Park,
Kwangjo Kim,
Dongho Won:
Two efficient RSA multisignature schemes.
ICICS 1997: 217-222 |
5 | EE | Sung-Mo Park,
Sangjin Lee,
Soo Hak Sung,
Kwangjo Kim:
Improving Bounds for the Number of Correlation Immune Boolean Functions.
Inf. Process. Lett. 61(4): 209-212 (1997) |
1996 |
4 | | Kwangjo Kim,
Tsutomu Matsumoto:
Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings
Springer 1996 |
1994 |
3 | | Seongtaek Chee,
Sangjin Lee,
Kwangjo Kim:
Semi-bent Functions.
ASIACRYPT 1994: 107-118 |
1991 |
2 | | Kwangjo Kim:
Construction of DES-like S-boxes Based on Boolean Functions Satisfyieng the SAC.
ASIACRYPT 1991: 59-72 |
1990 |
1 | EE | Kwangjo Kim,
Tsutomu Matsumoto,
Hideki Imai:
A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion.
CRYPTO 1990: 564-574 |