dblp.uni-trier.dewww.uni-trier.de

Chae Hoon Lim

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
20EEChae Hoon Lim: LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks. ICDCS Workshops 2008: 376-381
2006
19EEChae Hoon Lim, Taekyoung Kwon: Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. ICICS 2006: 1-20
2005
18EEChae Hoon Lim, Tymur Korkishko: mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors. WISA 2005: 243-258
2004
17 Chae Hoon Lim, Moti Yung: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers Springer 2004
16EEChae Hoon Lim: A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks. ACISP 2004: 289-300
2003
15 Pil Joong Lee, Chae Hoon Lim: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers Springer 2003
2000
14 Chae Hoon Lim, Hyo Sun Hwang: Fast Implementation of Elliptic Curve Arithmetic in GF(pn). Public Key Cryptography 2000: 405-421
1999
13EEEunjong Hong, Jai-Hoon Chung, Chae Hoon Lim: Hardware Design and Performance Estimation of the 128-bit Block Cipher Crypton. CHES 1999: 49-60
12EEChae Hoon Lim: A Revised Version of Crypton - Crypton V1.0. FSE 1999: 31-45
11 Chae Hoon Lim, Hyo Sun Hwang: Speeding Up Elliptic Scalar Multiplication with Precomputation. ICISC 1999: 102-119
1998
10EEChae Hoon Lim, Pil Joong Lee: A Study on the Proposed Korean Digital Signature Algorithm. ASIACRYPT 1998: 175-186
9EEWenbo Mao, Chae Hoon Lim: Cryptoanalysis in Prime Order Subgroups of Z*n. ASIACRYPT 1998: 214-226
1997
8EEChae Hoon Lim, Pil Joong Lee: A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp. CRYPTO 1997: 249-263
1996
7 Chae Hoon Lim, Pil Joong Lee: Directed Signatures and Application to Threshold Cryptosystems. Security Protocols Workshop 1996: 131-138
1995
6EEChae Hoon Lim, Pil Joong Lee: Security and Performance of Server-Aided RSA Computation Protocols. CRYPTO 1995: 70-83
5EEChae Hoon Lim, Pil Joong Lee: Server (Prover/Signer)-Aided Verification of Identity Proofs and Signatures. EUROCRYPT 1995: 64-78
4 Chae Hoon Lim, Pil Joong Lee: Several Practical Protocols for Authentication and Key Exchange. Inf. Process. Lett. 53(2): 91-96 (1995)
1994
3EEChae Hoon Lim, Pil Joong Lee: More Flexible Exponentiation with Precomputation. CRYPTO 1994: 95-107
1993
2EEChae Hoon Lim, Pil Joong Lee: Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks. CRYPTO 1993: 420-434
1992
1 Chae Hoon Lim, Pil Joong Lee: Modified Maurer-Yacobi`s scheme and its applications. AUSCRYPT 1992: 308-323

Coauthor Index

1Jai-Hoon Chung [13]
2Eunjong Hong [13]
3Hyo Sun Hwang [11] [14]
4Tymur Korkishko [18]
5Taekyoung Kwon [19]
6Pil Joong Lee [1] [2] [3] [4] [5] [6] [7] [8] [10] [15]
7Wenbo Mao [9]
8Moti Yung (Mordechai M. Yung) [17]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)