2009 |
55 | EE | Pil Joong Lee,
Jung Hee Cheon:
Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers
Springer 2009 |
54 | EE | Dae Hyun Yum,
Jae Woo Seo,
Sungwook Eom,
Pil Joong Lee:
Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity.
CT-RSA 2009: 325-339 |
2008 |
53 | EE | Dae Hyun Yum,
Pil Joong Lee:
Efficient Fair Exchange from Identity-Based Signature.
IEICE Transactions 91-A(1): 119-126 (2008) |
52 | EE | Dae Hyun Yum,
Jong Hoon Shin,
Pil Joong Lee:
Security Analysis of Yeh-Tsai Security Mechanism.
IEICE Transactions 91-D(5): 1477-1480 (2008) |
51 | EE | Dae Hyun Yum,
Jae Woo Seo,
Pil Joong Lee:
Generalized Combinatoric Accumulator.
IEICE Transactions 91-D(5): 1489-1491 (2008) |
50 | | Yevgeniy Dodis,
Pil Joong Lee,
Dae Hyun Yum:
Optimistic Fair Exchange in a Multi-user Setting.
J. UCS 14(3): 318-346 (2008) |
2007 |
49 | EE | Chong Hee Kim,
Jong Hoon Shin,
Jean-Jacques Quisquater,
Pil Joong Lee:
Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier.
ICISC 2007: 273-281 |
48 | EE | Yong Ho Hwang,
Pil Joong Lee:
Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System.
Pairing 2007: 2-22 |
47 | EE | Yevgeniy Dodis,
Pil Joong Lee,
Dae Hyun Yum:
Optimistic Fair Exchange in a Multi-user Setting.
Public Key Cryptography 2007: 118-133 |
46 | EE | Dae Hyun Yum,
Pil Joong Lee:
Security Analysis of Zhu-Bao's Verifiably Committed Signature.
IEICE Transactions 90-A(12): 2962-2964 (2007) |
2006 |
45 | EE | Yong Ho Hwang,
Pil Joong Lee:
Efficient Broadcast Encryption Scheme with Log-Key Storage.
Financial Cryptography 2006: 281-295 |
44 | EE | Jung Wook Lee,
Yong Ho Hwang,
Pil Joong Lee:
Efficient Public Key Broadcast Encryption Using Identifier of Receivers.
ISPEC 2006: 153-164 |
2005 |
43 | EE | Yong Ho Hwang,
Dae Hyun Yum,
Pil Joong Lee:
Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System.
ISC 2005: 344-358 |
42 | EE | Jong Hoon Shin,
Dong Jin Park,
Pil Joong Lee:
DPA Attack on the Improved Ha-Moon Algorithm.
WISA 2005: 283-291 |
41 | EE | Dae Hyun Yum,
Pil Joong Lee:
Cryptanalysis of Yeh-Shen-Hwang's One-Time Password Authentication Scheme.
IEICE Transactions 88-B(4): 1647-1648 (2005) |
2004 |
40 | | Pil Joong Lee:
Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings
Springer 2004 |
39 | EE | Dae Hyun Yum,
Pil Joong Lee:
Generic Construction of Certificateless Signature.
ACISP 2004: 200-211 |
38 | EE | Chong Hee Kim,
Yong Ho Hwang,
Pil Joong Lee:
TTS without Revocation Capability Secure Against CCA2.
ACISP 2004: 36-49 |
37 | EE | Yong Ho Hwang,
Chong Hee Kim,
Pil Joong Lee:
An Efficient Revocation Scheme for Stateless Receivers.
EuroPKI 2004: 322-334 |
36 | EE | Dae Hyun Yum,
Pil Joong Lee:
Identity-Based Cryptography in Public Key Management.
EuroPKI 2004: 71-84 |
35 | EE | Yong Ho Hwang,
Sang Gyoo Sim,
Pil Joong Lee:
Bit-Serial Multipliers for Exponentiation and Division in GF(2m) Using Irreducible AOP.
ICCSA (1) 2004: 442-450 |
34 | EE | Dae Hyun Yum,
Pil Joong Lee:
A Distributed Online Certificate Status Protocol Based on GQ Signature Scheme.
ICCSA (1) 2004: 471-480 |
33 | EE | Dae Hyun Yum,
Pil Joong Lee:
Generic Construction of Certificateless Encryption.
ICCSA (1) 2004: 802-811 |
32 | EE | Sang Gyoo Sim,
Dong Jin Park,
Pil Joong Lee:
New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm.
ICICS 2004: 291-304 |
31 | EE | Dae Hyun Yum,
Pil Joong Lee:
Separable Implicit Certificate Revocation.
ICISC 2004: 121-136 |
30 | EE | Chong Hee Kim,
Yong Ho Hwang,
Pil Joong Lee:
Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels.
WISA 2004: 264-277 |
29 | EE | Dong Jin Park,
Kihyun Kim,
Pil Joong Lee:
Public Key Encryption with Conjunctive Field Keyword Search.
WISA 2004: 73-86 |
2003 |
28 | | Pil Joong Lee,
Chae Hoon Lim:
Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers
Springer 2003 |
27 | EE | Yong Ho Hwang,
Chong Hee Kim,
Pil Joong Lee:
An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers.
ACISP 2003: 377-386 |
26 | EE | Yong Ho Hwang,
Dae Hyun Yum,
Pil Joong Lee:
EPA: An Efficient Password-Based Protocal for Authenticated Key Exchange.
ACISP 2003: 452-463 |
25 | EE | Chong Hee Kim,
Yong Ho Hwang,
Pil Joong Lee:
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
ASIACRYPT 2003: 359-373 |
24 | EE | Dae Hyun Yum,
Pil Joong Lee:
Efficient Key Updating Signature Schemes Based on IBS.
IMA Int. Conf. 2003: 167-182 |
23 | EE | Dae Hyun Yum,
Jae Eun Kang,
Pil Joong Lee:
Advanced Certificate Status Protocol.
MMM-ACNS 2003: 229-240 |
22 | EE | Dong Jin Park,
Sang Gyoo Sim,
Pil Joong Lee:
Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves.
WISA 2003: 474-488 |
2001 |
21 | EE | Dae Hyun Yum,
Pil Joong Lee:
New Signcryption Schemes Based on KCDSA.
ICISC 2001: 305-317 |
20 | EE | Chong Hee Kim,
Pil Joong Lee:
New Key Recovery in WAKE Protocol.
Public Key Cryptography 2001: 325-338 |
2000 |
19 | EE | Jae Wook Chung,
Sang Gyoo Sim,
Pil Joong Lee:
Fast Implementation of Elliptic Curve Defined over GF(pm) on CalmRISC with MAC2424 Coprocessor.
CHES 2000: 57-70 |
18 | EE | Nam Yul Yu,
Young Kim,
Pil Joong Lee:
Iterative Decoding of Product Codes Composed of Extended Hamming Codes.
ISCC 2000: 732-737 |
17 | EE | Nan Kyoung Park,
Joon Ho Hwang,
Pil Joong Lee:
HAS-V: A New Hash Function with Variable Output Length.
Selected Areas in Cryptography 2000: 202-216 |
1999 |
16 | EE | Pil Joong Lee,
Eun Jeong Lee,
Yong Duk Kim:
How to Implement Cost-Effective and Secure Public Key Cryptosystems.
CHES 1999: 73-79 |
1998 |
15 | EE | Chae Hoon Lim,
Pil Joong Lee:
A Study on the Proposed Korean Digital Signature Algorithm.
ASIACRYPT 1998: 175-186 |
14 | | Eun Jeong Lee,
Duk Soo Kim,
Pil Joong Lee:
Speed-up of arithmetics in Fpm for elliptic curve cryptosystems.
ICISC 1998: 81-91 |
1997 |
13 | EE | Chae Hoon Lim,
Pil Joong Lee:
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp.
CRYPTO 1997: 249-263 |
1996 |
12 | | Chae Hoon Lim,
Pil Joong Lee:
Directed Signatures and Application to Threshold Cryptosystems.
Security Protocols Workshop 1996: 131-138 |
1995 |
11 | EE | Chae Hoon Lim,
Pil Joong Lee:
Security and Performance of Server-Aided RSA Computation Protocols.
CRYPTO 1995: 70-83 |
10 | EE | Chae Hoon Lim,
Pil Joong Lee:
Server (Prover/Signer)-Aided Verification of Identity Proofs and Signatures.
EUROCRYPT 1995: 64-78 |
9 | | Chae Hoon Lim,
Pil Joong Lee:
Several Practical Protocols for Authentication and Key Exchange.
Inf. Process. Lett. 53(2): 91-96 (1995) |
1994 |
8 | EE | Chae Hoon Lim,
Pil Joong Lee:
More Flexible Exponentiation with Precomputation.
CRYPTO 1994: 95-107 |
1993 |
7 | EE | Chae Hoon Lim,
Pil Joong Lee:
Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks.
CRYPTO 1993: 420-434 |
1992 |
6 | | Chae Hoon Lim,
Pil Joong Lee:
Modified Maurer-Yacobi`s scheme and its applications.
AUSCRYPT 1992: 308-323 |
1990 |
5 | | Pil Joong Lee:
Secure User Access Control for Public Networks.
AUSCRYPT 1990: 46-57 |
4 | | Hyuck M. Kwon,
Pil Joong Lee:
Combined Tone and Noise Jamming Against Coded FH/MFSK ECCM Radios.
IEEE Journal on Selected Areas in Communications 8(5): 871-883 (1990) |
1989 |
3 | | Pil Joong Lee:
There are many good periodically time-varying convolutional codes.
IEEE Transactions on Information Theory 35(2): 460-463 (1989) |
1988 |
2 | EE | Pil Joong Lee,
Ernest F. Brickell:
An Observation on the Security of McEliece's Public-Key Cryptosystem.
EUROCRYPT 1988: 275-280 |
1987 |
1 | EE | Ernest F. Brickell,
Pil Joong Lee,
Yacov Yacobi:
Secure Audio Teleconference.
CRYPTO 1987: 418-426 |