dblp.uni-trier.dewww.uni-trier.de

Kwangjo Kim

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
56EEJiqiang Lv, Kui Ren, Xiaofeng Chen, Kwangjo Kim: The ring authenticated encryption scheme - How to provide a clue wisely. Inf. Sci. 179(1-2): 161-168 (2009)
2008
55EEJin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong: Generic Security-Amplifying Methods of Ordinary Digital Signatures. ACNS 2008: 224-241
54EEXiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, Kwangjo Kim: Efficient generic on-line/off-line (threshold) signatures without key exposure. Inf. Sci. 178(21): 4192-4203 (2008)
2007
53EESungchul Heo, Zeen Kim, Kwangjo Kim: Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups. GLOBECOM 2007: 464-468
52EEJangseong Kim, Zeen Kim, Kwangjo Kim: A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment. ICISC 2007: 37-48
51EEJin Li, Tsz Hon Yuen, Kwangjo Kim: Practical Threshold Signatures Without Random Oracles. ProvSec 2007: 198-207
50EEJin Li, Kwangjo Kim, Fangguo Zhang, Xiaofeng Chen: Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature. ProvSec 2007: 208-217
49EEDuc-Liem Vo, Kwangjo Kim: Security Analysis of an ID-Based Key Agreement for Peer Group Communication. IEICE Transactions 90-A(11): 2624-2625 (2007)
2006
48EEYoungjoon Seo, Hyunrok Lee, Kwangjo Kim: A Scalable and Untraceable Authentication Protocol for RFID. EUC Workshops 2006: 252-261
47EEDivyan M. Konidala, Kwangjo Kim: Mobile RFID Applications and Security Challenges. ICISC 2006: 194-205
2005
46EEDuc-Liem Vo, Kwangjo Kim: Yet Another Forward Secure Signature from Bilinear Pairings. ICISC 2005: 441-455
45EEDivyan M. Konidala, Dang Nguyen Duc, Dongman Lee, Kwangjo Kim: A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments. PerCom Workshops 2005: 136-140
44EEFangguo Zhang, Kwangjo Kim: Cryptanalysis of Lee-Hwang-Li's key authentication scheme. Applied Mathematics and Computation 161(1): 101-107 (2005)
43EEJiqiang Lv, Xinmei Wang, Kwangjo Kim: Security of a multisignature scheme for specified group of verifiers. Applied Mathematics and Computation 166(1): 58-63 (2005)
42EEJiqiang Lv, Xinmei Wang, Kwangjo Kim: Practical convertible authenticated encryption schemes using self-certified public keys. Applied Mathematics and Computation 169(2): 1285-1297 (2005)
2004
41EESungJun Min, Go Yamamoto, Kwangjo Kim: Weak Property of Malleability in NTRUSign. ACISP 2004: 379-390
40EEXiaofeng Chen, Fangguo Zhang, Kwangjo Kim: Limited Verifier Signature from Bilinear Pairings. ACNS 2004: 135-148
39EEByoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo: Secure Key Issuing in ID-based Cryptography. ACSW Frontiers 2004: 69-74
38EESongwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Kim, So Ran Ine: Threshold Password-Based Authentication Using Bilinear Pairings. EuroPKI 2004: 350-363
37EEXiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim: New ID-Based Threshold Signature Scheme from Bilinear Pairings. INDOCRYPT 2004: 371-383
36EEXiaofeng Chen, Fangguo Zhang, Kwangjo Kim: Chameleon Hashing Without Key Exposure. ISC 2004: 87-98
35EEKui Ren, Hyunrok Lee, Kwangjo Kim, Taewhan Yoo: Efficient Authenticated Key Agreement Protocol for Dynamic Groups. WISA 2004: 144-159
34EEKui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng, Kwangjo Kim: Highly reliable trust establishment scheme in ad hoc networks. Computer Networks 45(6): 687-699 (2004)
2003
33EEArvind Narayanan, C. Pandu Rangan, Kwangjo Kim: Practical Pay TV Schemes. ACISP 2003: 192-203
32EEFangguo Zhang, Kwangjo Kim: Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. ACISP 2003: 312-323
31EESangwon Lee, Yongdae Kim, Kwangjo Kim, DaeHyun Ryu: An Efficient Tree-Based Group Key Agreement Using Bilinear Map. ACNS 2003: 357-371
30EEDang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim: A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption. ICICS 2003: 11-21
29EEYan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim: ID-Based Distributed "Magic Ink" Signature from Pairings. ICICS 2003: 249-259
28EEByoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo: Providing Receipt-Freeness in Mixnet-Based Voting Protocols. ICISC 2003: 245-258
27EEXiaofeng Chen, Byoungcheon Lee, Kwangjo Kim: Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. ICISC 2003: 259-273
26EEV. Vinod, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim: On the Power of Computational Secret Sharing. INDOCRYPT 2003: 162-176
25EESuGil Choi, Kwangjo Kim, ByeongGon Kim: Practical Solution for Location Privacy in Mobile IPv6. WISA 2003: 69-83
2002
24 Kwangjo Kim: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings Springer 2002
23EEFangguo Zhang, Shengli Liu, Kwangjo Kim: Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems. ACISP 2002: 203-213
22EEMyungsun Kim, Kwangjo Kim: A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem. ACISP 2002: 362-378
21EEFangguo Zhang, Kwangjo Kim: ID-Based Blind Signature and Ring Signature from Pairings. ASIACRYPT 2002: 533-547
20EEMyungsun Kim, Jongseong Kim, Kwangjo Kim: Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption. ICICS 2002: 97-108
19EEByoungcheon Lee, Kwangjo Kim: Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer. ICISC 2002: 389-406
18EEByoungcheon Lee, Kwangjo Kim: Self-certified Signatures. INDOCRYPT 2002: 199-214
2001
17 Kwangjo Kim: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings Springer 2001
16EEByoungcheon Lee, Heesun Kim, Kwangjo Kim: Secure Mobile Agent Using Strong Non-designated Proxy Signature. ACISP 2001: 474
15EEJinho Kim, Kwangjo Kim, Chulsoo Lee: An Efficient and Provably Secure Threshold Blind Signature. ICISC 2001: 318-327
14EEJung Hee Cheon, MunJu Kim, Kwangjo Kim, Jung-Yeun Lee, SungWoo Kang: Improved Impossible Differential Cryptanalysis of Rijndael and Crypton. ICISC 2001: 39-49
13EEByoungcheon Lee, Kwangjo Kim, Joongsoo Ma: Efficient Public Auction with One-Time Registration and Public Verifiability. INDOCRYPT 2001: 162-174
2000
12 Joonsang Baek, Byoungcheon Lee, Kwangjo Kim: Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption. ACISP 2000: 49-58
11EEByoungcheon Lee, Kwangjo Kim: Secure Matchmaking Protocol. ICISC 2000: 123-134
10EEBoyeon Song, Kwangjo Kim: Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation. INDOCRYPT 2000: 237-249
9EEGookwhan Ahn, Kwangjo Kim, Hee Yong Youn: Tapping Alert Protocol. WETICE 2000: 159-164
1999
8 Moonseog Seo, Kwangjo Kim: Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme. ICISC 1999: 269-277
7EEKwangjo Kim, Sangjoon Park, Joonsang Baek: Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol. ICPP Workshops 1999: 140-145
1997
6 Sangjoon Park, Sangwoo Park, Kwangjo Kim, Dongho Won: Two efficient RSA multisignature schemes. ICICS 1997: 217-222
5EESung-Mo Park, Sangjin Lee, Soo Hak Sung, Kwangjo Kim: Improving Bounds for the Number of Correlation Immune Boolean Functions. Inf. Process. Lett. 61(4): 209-212 (1997)
1996
4 Kwangjo Kim, Tsutomu Matsumoto: Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings Springer 1996
1994
3 Seongtaek Chee, Sangjin Lee, Kwangjo Kim: Semi-bent Functions. ASIACRYPT 1994: 107-118
1991
2 Kwangjo Kim: Construction of DES-like S-boxes Based on Boolean Functions Satisfyieng the SAC. ASIACRYPT 1991: 59-72
1990
1EEKwangjo Kim, Tsutomu Matsumoto, Hideki Imai: A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion. CRYPTO 1990: 564-574

Coauthor Index

1Gookwhan Ahn [9]
2Joonsang Baek [7] [12]
3Feng Bao [34]
4Colin Boyd [28] [39]
5Seongtaek Chee [3]
6Xiaofeng Chen [27] [29] [36] [37] [40] [50] [54] [56]
7Jung Hee Cheon [14] [30]
8SuGil Choi [25]
9Ed Dawson [28] [39]
10Robert H. Deng (Robert Huijie Deng) [34]
11Dang Nguyen Duc [30] [45]
12Kyusuk Han [38]
13Sungchul Heo [53]
14Hideki Imai [1]
15So Ran Ine [38]
16Seok-kyu Kang [38]
17SungWoo Kang [14]
18ByeongGon Kim [25]
19Heesun Kim [16]
20Jangseong Kim [52]
21Jinho Kim [15]
22Jongseong Kim [20]
23MunJu Kim [14]
24Myungsun Kim [20] [22]
25Yongdae Kim [31]
26Zeen Kim [52] [53]
27Divyan M. Konidala [37] [45] [47]
28Byoungcheon Lee [11] [12] [13] [16] [18] [19] [27] [28] [39]
29Chulsoo Lee [15]
30Dongman Lee [45]
31Hyunrok Lee [35] [48] [54]
32Jung-Yeun Lee [14]
33Sangjin Lee [3] [5]
34Sangwon Lee [31]
35Songwon Lee [38]
36Jin Li [50] [51] [55]
37Tieyan Li [34]
38Shengli Liu [23]
39Jiqiang Lu (Jiqiang Lv) [42] [43] [56]
40Joongsoo Ma [13]
41Tsutomu Matsumoto [1] [4]
42SungJun Min [41]
43Yi Mu [54]
44Arvind Narayanan [26] [33]
45Sangjoon Park [6] [7]
46Sangwoo Park [6]
47Sung-Mo Park [5]
48C. Pandu Rangan (Chanrasekharan Pandu Rangan) [26] [33]
49Kui Ren [34] [35] [56]
50DaeHyun Ryu [31]
51Moonseog Seo [8]
52Youngjoon Seo [48]
53Boyeon Song [10]
54K. Srinathan (Kannan Srinathan) [26]
55Soo Hak Sung [5]
56Willy Susilo [54]
57Haibo Tian [54]
58Vinod Vaikuntanathan (V. Vinod) [26]
59Duc-Liem Vo [46] [49]
60Zhiguo Wan [34]
61Xinmei Wang [42] [43]
62Baodian Wei [54]
63Dongho Won [6]
64Duncan S. Wong [55]
65Yan Xie [29]
66Go Yamamoto [41]
67Jeongmo Yang [28] [39]
68Seungjae Yoo [28] [39]
69Taewhan Yoo [35]
70Hee Yong Youn [9]
71Tsz Hon Yuen [51]
72Fangguo Zhang [21] [23] [29] [32] [36] [37] [40] [44] [50] [54] [55]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)