dblp.uni-trier.dewww.uni-trier.de

Pil Joong Lee

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
55EEPil Joong Lee, Jung Hee Cheon: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers Springer 2009
54EEDae Hyun Yum, Jae Woo Seo, Sungwook Eom, Pil Joong Lee: Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity. CT-RSA 2009: 325-339
2008
53EEDae Hyun Yum, Pil Joong Lee: Efficient Fair Exchange from Identity-Based Signature. IEICE Transactions 91-A(1): 119-126 (2008)
52EEDae Hyun Yum, Jong Hoon Shin, Pil Joong Lee: Security Analysis of Yeh-Tsai Security Mechanism. IEICE Transactions 91-D(5): 1477-1480 (2008)
51EEDae Hyun Yum, Jae Woo Seo, Pil Joong Lee: Generalized Combinatoric Accumulator. IEICE Transactions 91-D(5): 1489-1491 (2008)
50 Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum: Optimistic Fair Exchange in a Multi-user Setting. J. UCS 14(3): 318-346 (2008)
2007
49EEChong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee: Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. ICISC 2007: 273-281
48EEYong Ho Hwang, Pil Joong Lee: Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System. Pairing 2007: 2-22
47EEYevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum: Optimistic Fair Exchange in a Multi-user Setting. Public Key Cryptography 2007: 118-133
46EEDae Hyun Yum, Pil Joong Lee: Security Analysis of Zhu-Bao's Verifiably Committed Signature. IEICE Transactions 90-A(12): 2962-2964 (2007)
2006
45EEYong Ho Hwang, Pil Joong Lee: Efficient Broadcast Encryption Scheme with Log-Key Storage. Financial Cryptography 2006: 281-295
44EEJung Wook Lee, Yong Ho Hwang, Pil Joong Lee: Efficient Public Key Broadcast Encryption Using Identifier of Receivers. ISPEC 2006: 153-164
2005
43EEYong Ho Hwang, Dae Hyun Yum, Pil Joong Lee: Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System. ISC 2005: 344-358
42EEJong Hoon Shin, Dong Jin Park, Pil Joong Lee: DPA Attack on the Improved Ha-Moon Algorithm. WISA 2005: 283-291
41EEDae Hyun Yum, Pil Joong Lee: Cryptanalysis of Yeh-Shen-Hwang's One-Time Password Authentication Scheme. IEICE Transactions 88-B(4): 1647-1648 (2005)
2004
40 Pil Joong Lee: Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings Springer 2004
39EEDae Hyun Yum, Pil Joong Lee: Generic Construction of Certificateless Signature. ACISP 2004: 200-211
38EEChong Hee Kim, Yong Ho Hwang, Pil Joong Lee: TTS without Revocation Capability Secure Against CCA2. ACISP 2004: 36-49
37EEYong Ho Hwang, Chong Hee Kim, Pil Joong Lee: An Efficient Revocation Scheme for Stateless Receivers. EuroPKI 2004: 322-334
36EEDae Hyun Yum, Pil Joong Lee: Identity-Based Cryptography in Public Key Management. EuroPKI 2004: 71-84
35EEYong Ho Hwang, Sang Gyoo Sim, Pil Joong Lee: Bit-Serial Multipliers for Exponentiation and Division in GF(2m) Using Irreducible AOP. ICCSA (1) 2004: 442-450
34EEDae Hyun Yum, Pil Joong Lee: A Distributed Online Certificate Status Protocol Based on GQ Signature Scheme. ICCSA (1) 2004: 471-480
33EEDae Hyun Yum, Pil Joong Lee: Generic Construction of Certificateless Encryption. ICCSA (1) 2004: 802-811
32EESang Gyoo Sim, Dong Jin Park, Pil Joong Lee: New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm. ICICS 2004: 291-304
31EEDae Hyun Yum, Pil Joong Lee: Separable Implicit Certificate Revocation. ICISC 2004: 121-136
30EEChong Hee Kim, Yong Ho Hwang, Pil Joong Lee: Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels. WISA 2004: 264-277
29EEDong Jin Park, Kihyun Kim, Pil Joong Lee: Public Key Encryption with Conjunctive Field Keyword Search. WISA 2004: 73-86
2003
28 Pil Joong Lee, Chae Hoon Lim: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers Springer 2003
27EEYong Ho Hwang, Chong Hee Kim, Pil Joong Lee: An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers. ACISP 2003: 377-386
26EEYong Ho Hwang, Dae Hyun Yum, Pil Joong Lee: EPA: An Efficient Password-Based Protocal for Authenticated Key Exchange. ACISP 2003: 452-463
25EEChong Hee Kim, Yong Ho Hwang, Pil Joong Lee: An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. ASIACRYPT 2003: 359-373
24EEDae Hyun Yum, Pil Joong Lee: Efficient Key Updating Signature Schemes Based on IBS. IMA Int. Conf. 2003: 167-182
23EEDae Hyun Yum, Jae Eun Kang, Pil Joong Lee: Advanced Certificate Status Protocol. MMM-ACNS 2003: 229-240
22EEDong Jin Park, Sang Gyoo Sim, Pil Joong Lee: Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves. WISA 2003: 474-488
2001
21EEDae Hyun Yum, Pil Joong Lee: New Signcryption Schemes Based on KCDSA. ICISC 2001: 305-317
20EEChong Hee Kim, Pil Joong Lee: New Key Recovery in WAKE Protocol. Public Key Cryptography 2001: 325-338
2000
19EEJae Wook Chung, Sang Gyoo Sim, Pil Joong Lee: Fast Implementation of Elliptic Curve Defined over GF(pm) on CalmRISC with MAC2424 Coprocessor. CHES 2000: 57-70
18EENam Yul Yu, Young Kim, Pil Joong Lee: Iterative Decoding of Product Codes Composed of Extended Hamming Codes. ISCC 2000: 732-737
17EENan Kyoung Park, Joon Ho Hwang, Pil Joong Lee: HAS-V: A New Hash Function with Variable Output Length. Selected Areas in Cryptography 2000: 202-216
1999
16EEPil Joong Lee, Eun Jeong Lee, Yong Duk Kim: How to Implement Cost-Effective and Secure Public Key Cryptosystems. CHES 1999: 73-79
1998
15EEChae Hoon Lim, Pil Joong Lee: A Study on the Proposed Korean Digital Signature Algorithm. ASIACRYPT 1998: 175-186
14 Eun Jeong Lee, Duk Soo Kim, Pil Joong Lee: Speed-up of arithmetics in Fpm for elliptic curve cryptosystems. ICISC 1998: 81-91
1997
13EEChae Hoon Lim, Pil Joong Lee: A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp. CRYPTO 1997: 249-263
1996
12 Chae Hoon Lim, Pil Joong Lee: Directed Signatures and Application to Threshold Cryptosystems. Security Protocols Workshop 1996: 131-138
1995
11EEChae Hoon Lim, Pil Joong Lee: Security and Performance of Server-Aided RSA Computation Protocols. CRYPTO 1995: 70-83
10EEChae Hoon Lim, Pil Joong Lee: Server (Prover/Signer)-Aided Verification of Identity Proofs and Signatures. EUROCRYPT 1995: 64-78
9 Chae Hoon Lim, Pil Joong Lee: Several Practical Protocols for Authentication and Key Exchange. Inf. Process. Lett. 53(2): 91-96 (1995)
1994
8EEChae Hoon Lim, Pil Joong Lee: More Flexible Exponentiation with Precomputation. CRYPTO 1994: 95-107
1993
7EEChae Hoon Lim, Pil Joong Lee: Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks. CRYPTO 1993: 420-434
1992
6 Chae Hoon Lim, Pil Joong Lee: Modified Maurer-Yacobi`s scheme and its applications. AUSCRYPT 1992: 308-323
1990
5 Pil Joong Lee: Secure User Access Control for Public Networks. AUSCRYPT 1990: 46-57
4 Hyuck M. Kwon, Pil Joong Lee: Combined Tone and Noise Jamming Against Coded FH/MFSK ECCM Radios. IEEE Journal on Selected Areas in Communications 8(5): 871-883 (1990)
1989
3 Pil Joong Lee: There are many good periodically time-varying convolutional codes. IEEE Transactions on Information Theory 35(2): 460-463 (1989)
1988
2EEPil Joong Lee, Ernest F. Brickell: An Observation on the Security of McEliece's Public-Key Cryptosystem. EUROCRYPT 1988: 275-280
1987
1EEErnest F. Brickell, Pil Joong Lee, Yacov Yacobi: Secure Audio Teleconference. CRYPTO 1987: 418-426

Coauthor Index

1Ernest F. Brickell [1] [2]
2Jung Hee Cheon [55]
3Jae Wook Chung [19]
4Yevgeniy Dodis [47] [50]
5Sungwook Eom [54]
6Joon Ho Hwang [17]
7Yong Ho Hwang [25] [26] [27] [30] [35] [37] [38] [43] [44] [45] [48]
8Jae Eun Kang [23]
9Chong Hee Kim [20] [25] [27] [30] [37] [38] [49]
10Duk Soo Kim [14]
11Kihyun Kim [29]
12Yong Duk Kim [16]
13Young Kim [18]
14Hyuck M. Kwon [4]
15Eun Jeong Lee [14] [16]
16Jung Wook Lee [44]
17Chae Hoon Lim [6] [7] [8] [9] [10] [11] [12] [13] [15] [28]
18Dong Jin Park [22] [29] [32] [42]
19Nan Kyoung Park [17]
20Jean-Jacques Quisquater [49]
21Jae Woo Seo [51] [54]
22Jong Hoon Shin [42] [49] [52]
23Sang Gyoo Sim [19] [22] [32] [35]
24Yacov Yacobi [1]
25Nam Yul Yu [18]
26Dae Hyun Yum [21] [23] [24] [26] [31] [33] [34] [36] [39] [41] [43] [46] [47] [50] [51] [52] [53] [54]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)