| 2009 |
| 55 | EE | Pil Joong Lee,
Jung Hee Cheon:
Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers
Springer 2009 |
| 54 | EE | Dae Hyun Yum,
Jae Woo Seo,
Sungwook Eom,
Pil Joong Lee:
Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity.
CT-RSA 2009: 325-339 |
| 2008 |
| 53 | EE | Dae Hyun Yum,
Pil Joong Lee:
Efficient Fair Exchange from Identity-Based Signature.
IEICE Transactions 91-A(1): 119-126 (2008) |
| 52 | EE | Dae Hyun Yum,
Jong Hoon Shin,
Pil Joong Lee:
Security Analysis of Yeh-Tsai Security Mechanism.
IEICE Transactions 91-D(5): 1477-1480 (2008) |
| 51 | EE | Dae Hyun Yum,
Jae Woo Seo,
Pil Joong Lee:
Generalized Combinatoric Accumulator.
IEICE Transactions 91-D(5): 1489-1491 (2008) |
| 50 | | Yevgeniy Dodis,
Pil Joong Lee,
Dae Hyun Yum:
Optimistic Fair Exchange in a Multi-user Setting.
J. UCS 14(3): 318-346 (2008) |
| 2007 |
| 49 | EE | Chong Hee Kim,
Jong Hoon Shin,
Jean-Jacques Quisquater,
Pil Joong Lee:
Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier.
ICISC 2007: 273-281 |
| 48 | EE | Yong Ho Hwang,
Pil Joong Lee:
Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System.
Pairing 2007: 2-22 |
| 47 | EE | Yevgeniy Dodis,
Pil Joong Lee,
Dae Hyun Yum:
Optimistic Fair Exchange in a Multi-user Setting.
Public Key Cryptography 2007: 118-133 |
| 46 | EE | Dae Hyun Yum,
Pil Joong Lee:
Security Analysis of Zhu-Bao's Verifiably Committed Signature.
IEICE Transactions 90-A(12): 2962-2964 (2007) |
| 2006 |
| 45 | EE | Yong Ho Hwang,
Pil Joong Lee:
Efficient Broadcast Encryption Scheme with Log-Key Storage.
Financial Cryptography 2006: 281-295 |
| 44 | EE | Jung Wook Lee,
Yong Ho Hwang,
Pil Joong Lee:
Efficient Public Key Broadcast Encryption Using Identifier of Receivers.
ISPEC 2006: 153-164 |
| 2005 |
| 43 | EE | Yong Ho Hwang,
Dae Hyun Yum,
Pil Joong Lee:
Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System.
ISC 2005: 344-358 |
| 42 | EE | Jong Hoon Shin,
Dong Jin Park,
Pil Joong Lee:
DPA Attack on the Improved Ha-Moon Algorithm.
WISA 2005: 283-291 |
| 41 | EE | Dae Hyun Yum,
Pil Joong Lee:
Cryptanalysis of Yeh-Shen-Hwang's One-Time Password Authentication Scheme.
IEICE Transactions 88-B(4): 1647-1648 (2005) |
| 2004 |
| 40 | | Pil Joong Lee:
Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings
Springer 2004 |
| 39 | EE | Dae Hyun Yum,
Pil Joong Lee:
Generic Construction of Certificateless Signature.
ACISP 2004: 200-211 |
| 38 | EE | Chong Hee Kim,
Yong Ho Hwang,
Pil Joong Lee:
TTS without Revocation Capability Secure Against CCA2.
ACISP 2004: 36-49 |
| 37 | EE | Yong Ho Hwang,
Chong Hee Kim,
Pil Joong Lee:
An Efficient Revocation Scheme for Stateless Receivers.
EuroPKI 2004: 322-334 |
| 36 | EE | Dae Hyun Yum,
Pil Joong Lee:
Identity-Based Cryptography in Public Key Management.
EuroPKI 2004: 71-84 |
| 35 | EE | Yong Ho Hwang,
Sang Gyoo Sim,
Pil Joong Lee:
Bit-Serial Multipliers for Exponentiation and Division in GF(2m) Using Irreducible AOP.
ICCSA (1) 2004: 442-450 |
| 34 | EE | Dae Hyun Yum,
Pil Joong Lee:
A Distributed Online Certificate Status Protocol Based on GQ Signature Scheme.
ICCSA (1) 2004: 471-480 |
| 33 | EE | Dae Hyun Yum,
Pil Joong Lee:
Generic Construction of Certificateless Encryption.
ICCSA (1) 2004: 802-811 |
| 32 | EE | Sang Gyoo Sim,
Dong Jin Park,
Pil Joong Lee:
New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm.
ICICS 2004: 291-304 |
| 31 | EE | Dae Hyun Yum,
Pil Joong Lee:
Separable Implicit Certificate Revocation.
ICISC 2004: 121-136 |
| 30 | EE | Chong Hee Kim,
Yong Ho Hwang,
Pil Joong Lee:
Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels.
WISA 2004: 264-277 |
| 29 | EE | Dong Jin Park,
Kihyun Kim,
Pil Joong Lee:
Public Key Encryption with Conjunctive Field Keyword Search.
WISA 2004: 73-86 |
| 2003 |
| 28 | | Pil Joong Lee,
Chae Hoon Lim:
Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers
Springer 2003 |
| 27 | EE | Yong Ho Hwang,
Chong Hee Kim,
Pil Joong Lee:
An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers.
ACISP 2003: 377-386 |
| 26 | EE | Yong Ho Hwang,
Dae Hyun Yum,
Pil Joong Lee:
EPA: An Efficient Password-Based Protocal for Authenticated Key Exchange.
ACISP 2003: 452-463 |
| 25 | EE | Chong Hee Kim,
Yong Ho Hwang,
Pil Joong Lee:
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
ASIACRYPT 2003: 359-373 |
| 24 | EE | Dae Hyun Yum,
Pil Joong Lee:
Efficient Key Updating Signature Schemes Based on IBS.
IMA Int. Conf. 2003: 167-182 |
| 23 | EE | Dae Hyun Yum,
Jae Eun Kang,
Pil Joong Lee:
Advanced Certificate Status Protocol.
MMM-ACNS 2003: 229-240 |
| 22 | EE | Dong Jin Park,
Sang Gyoo Sim,
Pil Joong Lee:
Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves.
WISA 2003: 474-488 |
| 2001 |
| 21 | EE | Dae Hyun Yum,
Pil Joong Lee:
New Signcryption Schemes Based on KCDSA.
ICISC 2001: 305-317 |
| 20 | EE | Chong Hee Kim,
Pil Joong Lee:
New Key Recovery in WAKE Protocol.
Public Key Cryptography 2001: 325-338 |
| 2000 |
| 19 | EE | Jae Wook Chung,
Sang Gyoo Sim,
Pil Joong Lee:
Fast Implementation of Elliptic Curve Defined over GF(pm) on CalmRISC with MAC2424 Coprocessor.
CHES 2000: 57-70 |
| 18 | EE | Nam Yul Yu,
Young Kim,
Pil Joong Lee:
Iterative Decoding of Product Codes Composed of Extended Hamming Codes.
ISCC 2000: 732-737 |
| 17 | EE | Nan Kyoung Park,
Joon Ho Hwang,
Pil Joong Lee:
HAS-V: A New Hash Function with Variable Output Length.
Selected Areas in Cryptography 2000: 202-216 |
| 1999 |
| 16 | EE | Pil Joong Lee,
Eun Jeong Lee,
Yong Duk Kim:
How to Implement Cost-Effective and Secure Public Key Cryptosystems.
CHES 1999: 73-79 |
| 1998 |
| 15 | EE | Chae Hoon Lim,
Pil Joong Lee:
A Study on the Proposed Korean Digital Signature Algorithm.
ASIACRYPT 1998: 175-186 |
| 14 | | Eun Jeong Lee,
Duk Soo Kim,
Pil Joong Lee:
Speed-up of arithmetics in Fpm for elliptic curve cryptosystems.
ICISC 1998: 81-91 |
| 1997 |
| 13 | EE | Chae Hoon Lim,
Pil Joong Lee:
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp.
CRYPTO 1997: 249-263 |
| 1996 |
| 12 | | Chae Hoon Lim,
Pil Joong Lee:
Directed Signatures and Application to Threshold Cryptosystems.
Security Protocols Workshop 1996: 131-138 |
| 1995 |
| 11 | EE | Chae Hoon Lim,
Pil Joong Lee:
Security and Performance of Server-Aided RSA Computation Protocols.
CRYPTO 1995: 70-83 |
| 10 | EE | Chae Hoon Lim,
Pil Joong Lee:
Server (Prover/Signer)-Aided Verification of Identity Proofs and Signatures.
EUROCRYPT 1995: 64-78 |
| 9 | | Chae Hoon Lim,
Pil Joong Lee:
Several Practical Protocols for Authentication and Key Exchange.
Inf. Process. Lett. 53(2): 91-96 (1995) |
| 1994 |
| 8 | EE | Chae Hoon Lim,
Pil Joong Lee:
More Flexible Exponentiation with Precomputation.
CRYPTO 1994: 95-107 |
| 1993 |
| 7 | EE | Chae Hoon Lim,
Pil Joong Lee:
Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks.
CRYPTO 1993: 420-434 |
| 1992 |
| 6 | | Chae Hoon Lim,
Pil Joong Lee:
Modified Maurer-Yacobi`s scheme and its applications.
AUSCRYPT 1992: 308-323 |
| 1990 |
| 5 | | Pil Joong Lee:
Secure User Access Control for Public Networks.
AUSCRYPT 1990: 46-57 |
| 4 | | Hyuck M. Kwon,
Pil Joong Lee:
Combined Tone and Noise Jamming Against Coded FH/MFSK ECCM Radios.
IEEE Journal on Selected Areas in Communications 8(5): 871-883 (1990) |
| 1989 |
| 3 | | Pil Joong Lee:
There are many good periodically time-varying convolutional codes.
IEEE Transactions on Information Theory 35(2): 460-463 (1989) |
| 1988 |
| 2 | EE | Pil Joong Lee,
Ernest F. Brickell:
An Observation on the Security of McEliece's Public-Key Cryptosystem.
EUROCRYPT 1988: 275-280 |
| 1987 |
| 1 | EE | Ernest F. Brickell,
Pil Joong Lee,
Yacov Yacobi:
Secure Audio Teleconference.
CRYPTO 1987: 418-426 |