| 2008 |
| 20 | EE | Chae Hoon Lim:
LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks.
ICDCS Workshops 2008: 376-381 |
| 2006 |
| 19 | EE | Chae Hoon Lim,
Taekyoung Kwon:
Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer.
ICICS 2006: 1-20 |
| 2005 |
| 18 | EE | Chae Hoon Lim,
Tymur Korkishko:
mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors.
WISA 2005: 243-258 |
| 2004 |
| 17 | | Chae Hoon Lim,
Moti Yung:
Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers
Springer 2004 |
| 16 | EE | Chae Hoon Lim:
A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks.
ACISP 2004: 289-300 |
| 2003 |
| 15 | | Pil Joong Lee,
Chae Hoon Lim:
Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers
Springer 2003 |
| 2000 |
| 14 | | Chae Hoon Lim,
Hyo Sun Hwang:
Fast Implementation of Elliptic Curve Arithmetic in GF(pn).
Public Key Cryptography 2000: 405-421 |
| 1999 |
| 13 | EE | Eunjong Hong,
Jai-Hoon Chung,
Chae Hoon Lim:
Hardware Design and Performance Estimation of the 128-bit Block Cipher Crypton.
CHES 1999: 49-60 |
| 12 | EE | Chae Hoon Lim:
A Revised Version of Crypton - Crypton V1.0.
FSE 1999: 31-45 |
| 11 | | Chae Hoon Lim,
Hyo Sun Hwang:
Speeding Up Elliptic Scalar Multiplication with Precomputation.
ICISC 1999: 102-119 |
| 1998 |
| 10 | EE | Chae Hoon Lim,
Pil Joong Lee:
A Study on the Proposed Korean Digital Signature Algorithm.
ASIACRYPT 1998: 175-186 |
| 9 | EE | Wenbo Mao,
Chae Hoon Lim:
Cryptoanalysis in Prime Order Subgroups of Z*n.
ASIACRYPT 1998: 214-226 |
| 1997 |
| 8 | EE | Chae Hoon Lim,
Pil Joong Lee:
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp.
CRYPTO 1997: 249-263 |
| 1996 |
| 7 | | Chae Hoon Lim,
Pil Joong Lee:
Directed Signatures and Application to Threshold Cryptosystems.
Security Protocols Workshop 1996: 131-138 |
| 1995 |
| 6 | EE | Chae Hoon Lim,
Pil Joong Lee:
Security and Performance of Server-Aided RSA Computation Protocols.
CRYPTO 1995: 70-83 |
| 5 | EE | Chae Hoon Lim,
Pil Joong Lee:
Server (Prover/Signer)-Aided Verification of Identity Proofs and Signatures.
EUROCRYPT 1995: 64-78 |
| 4 | | Chae Hoon Lim,
Pil Joong Lee:
Several Practical Protocols for Authentication and Key Exchange.
Inf. Process. Lett. 53(2): 91-96 (1995) |
| 1994 |
| 3 | EE | Chae Hoon Lim,
Pil Joong Lee:
More Flexible Exponentiation with Precomputation.
CRYPTO 1994: 95-107 |
| 1993 |
| 2 | EE | Chae Hoon Lim,
Pil Joong Lee:
Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks.
CRYPTO 1993: 420-434 |
| 1992 |
| 1 | | Chae Hoon Lim,
Pil Joong Lee:
Modified Maurer-Yacobi`s scheme and its applications.
AUSCRYPT 1992: 308-323 |