2008 |
20 | EE | Chae Hoon Lim:
LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks.
ICDCS Workshops 2008: 376-381 |
2006 |
19 | EE | Chae Hoon Lim,
Taekyoung Kwon:
Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer.
ICICS 2006: 1-20 |
2005 |
18 | EE | Chae Hoon Lim,
Tymur Korkishko:
mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors.
WISA 2005: 243-258 |
2004 |
17 | | Chae Hoon Lim,
Moti Yung:
Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers
Springer 2004 |
16 | EE | Chae Hoon Lim:
A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks.
ACISP 2004: 289-300 |
2003 |
15 | | Pil Joong Lee,
Chae Hoon Lim:
Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers
Springer 2003 |
2000 |
14 | | Chae Hoon Lim,
Hyo Sun Hwang:
Fast Implementation of Elliptic Curve Arithmetic in GF(pn).
Public Key Cryptography 2000: 405-421 |
1999 |
13 | EE | Eunjong Hong,
Jai-Hoon Chung,
Chae Hoon Lim:
Hardware Design and Performance Estimation of the 128-bit Block Cipher Crypton.
CHES 1999: 49-60 |
12 | EE | Chae Hoon Lim:
A Revised Version of Crypton - Crypton V1.0.
FSE 1999: 31-45 |
11 | | Chae Hoon Lim,
Hyo Sun Hwang:
Speeding Up Elliptic Scalar Multiplication with Precomputation.
ICISC 1999: 102-119 |
1998 |
10 | EE | Chae Hoon Lim,
Pil Joong Lee:
A Study on the Proposed Korean Digital Signature Algorithm.
ASIACRYPT 1998: 175-186 |
9 | EE | Wenbo Mao,
Chae Hoon Lim:
Cryptoanalysis in Prime Order Subgroups of Z*n.
ASIACRYPT 1998: 214-226 |
1997 |
8 | EE | Chae Hoon Lim,
Pil Joong Lee:
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp.
CRYPTO 1997: 249-263 |
1996 |
7 | | Chae Hoon Lim,
Pil Joong Lee:
Directed Signatures and Application to Threshold Cryptosystems.
Security Protocols Workshop 1996: 131-138 |
1995 |
6 | EE | Chae Hoon Lim,
Pil Joong Lee:
Security and Performance of Server-Aided RSA Computation Protocols.
CRYPTO 1995: 70-83 |
5 | EE | Chae Hoon Lim,
Pil Joong Lee:
Server (Prover/Signer)-Aided Verification of Identity Proofs and Signatures.
EUROCRYPT 1995: 64-78 |
4 | | Chae Hoon Lim,
Pil Joong Lee:
Several Practical Protocols for Authentication and Key Exchange.
Inf. Process. Lett. 53(2): 91-96 (1995) |
1994 |
3 | EE | Chae Hoon Lim,
Pil Joong Lee:
More Flexible Exponentiation with Precomputation.
CRYPTO 1994: 95-107 |
1993 |
2 | EE | Chae Hoon Lim,
Pil Joong Lee:
Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks.
CRYPTO 1993: 420-434 |
1992 |
1 | | Chae Hoon Lim,
Pil Joong Lee:
Modified Maurer-Yacobi`s scheme and its applications.
AUSCRYPT 1992: 308-323 |