Jong In Lim
List of publications from the DBLP Bibliography Server - FAQ
2008 | ||
---|---|---|
96 | EE | Yong Ho Kim, Kyu Young Choi, Jongin Lim, Dong Hoon Lee: An Efficient Key Establishment Scheme for Self-organizing Sensor Networks. ICDCN 2008: 345-349 |
95 | EE | Sooyoung Chae, Hosub Lee, Jaeik Cho, Manhyun Jung, Jongin Lim, Jongsub Moon: A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model. WISA 2008: 190-200 |
94 | EE | Eunjin Lee, Jongsung Kim, Deukjo Hong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim: Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks. IEICE Transactions 91-A(2): 642-649 (2008) |
93 | EE | Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong, Jongin Lim, Haeryong Park, Kilsoo Chun: Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function. IEICE Transactions 91-A(9): 2607-2614 (2008) |
92 | EE | Taek-Young Youn, Young-Ho Park, Taekyoung Kwon, Soonhak Kwon, Jongin Lim: Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications. IEICE Transactions 91-D(5): 1481-1484 (2008) |
91 | EE | Taek-Young Youn, Young-Ho Park, Changhan Kim, Jongin Lim: Weakness in a RSA-based password authenticated key exchange protocol. Inf. Process. Lett. 108(6): 339-342 (2008) |
2007 | ||
90 | EE | Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim: Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. ACISP 2007: 143-157 |
89 | EE | Jong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, Laurence Tianruo Yang: Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. AINA 2007: 311-316 |
88 | EE | Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee, Jongin Lim: Classification of Key Management Schemes for Wireless Sensor Networks. APWeb/WAIM Workshops 2007: 664-673 |
87 | EE | Sung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim: SPA Countermeasure Based on Unsigned Left-to-Right Recodings. ATC 2007: 286-295 |
86 | EE | Yeog Kim, Jewan Bang, Gu Taek Lee, Sangjin Lee, Jongin Lim: A Field Guide to Hidden Accounting Information Detection. FGCN (2) 2007: 146-150 |
85 | EE | Seokhee Lee, Antonio Savoldi, Sangjin Lee, Jongin Lim: Windows Pagefile Collection and Analysis for a Live Forensics Context. FGCN (2) 2007: 97-101 |
84 | EE | Eun A. Jun, Seok Won Jung, Jeom Goo Kim, Jong In Lim: Efficient an Implementation Method Research of a Smart Card Atomic Operation. ICCSA (2) 2007: 113-121 |
83 | EE | Dong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim: Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. ISPEC 2007: 238-253 |
82 | EE | Young-Gab Kim, Jongin Lim: Quantitative Risk Analysis and Evaluation in Information Systems: A Case Study. International Conference on Computational Science (3) 2007: 1040-1047 |
81 | EE | Kihong Kim, Jinkeun Hong, Jongin Lim: Approach of the Secure Communication Mechanism in Aero-wireless Environment. MUE 2007: 1070-1075 |
80 | EE | Hyun-A Park, Dong Hoon Lee, Jongin Lim, Sang Hyun Cho: PPIDS: Privacy Preserving Intrusion Detection System. PAISI 2007: 269-274 |
79 | EE | Young-Gab Kim, Jongin Lim: HMM-Based Approach for Evaluating Risk Propagation. PAISI 2007: 325-326 |
78 | EE | Yong Ho Kim, Jong Hwan Park, Dong Hoon Lee, Jongin Lim: Bogus Data Filtering in Sensor Networks. PAKDD Workshops 2007: 629-635 |
77 | EE | HeeSeok Kim, Tae-Hyun Kim, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim, Jongin Lim: Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. WISTP 2007: 39-52 |
76 | EE | Sun-Hee Lim, Ki-Seok Bang, Okyeon Yi, Jongin Lim: A Secure Handover Protocol Design in Wireless Networks with Formal Verification. WWIC 2007: 67-78 |
75 | EE | Jin Wook Byun, Dong Hoon Lee, Jong In Lim: EC2C-PAKA: An efficient client-to-client password-authenticated key agreement. Inf. Sci. 177(19): 3995-4013 (2007) |
2006 | ||
74 | EE | Jin Wook Byun, Dong Hoon Lee, Jongin Lim: Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. APWeb 2006: 830-836 |
73 | EE | Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim: Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. CANS 2006: 168-181 |
72 | EE | Tae-Hyun Kim, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim: Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. CARDIS 2006: 119-134 |
71 | EE | Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jaesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee: HIGHT: A New Block Cipher Suitable for Low-Resource Device. CHES 2006: 46-59 |
70 | EE | Young-Gab Kim, Dongwon Jeong, Soo-Hyun Park, Jongin Lim, Doo-Kwon Baik: Modeling and Simulation for Security Risk Propagation in Critical Information Systems. CIS 2006: 858-868 |
69 | EE | Kihong Kim, Jinkeun Hong, Jongin Lim: Analysis of the Power Consumption of Secure Communication in Wireless Networks. DEXA 2006: 894-903 |
68 | EE | Jin Wook Byun, Dong Hoon Lee, Jongin Lim: Efficient Conjunctive Keyword Search on Encrypted Data Storage System. EuroPKI 2006: 184-196 |
67 | EE | Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim: Further Security Analysis of XTR. ISPEC 2006: 33-44 |
66 | EE | Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim: An Efficient ID-Based Delegation Network. OTM Workshops (1) 2006: 382-391 |
65 | EE | Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee, Jongin Lim: A Key Management Scheme for Large Scale Distributed Sensor Networks. PWC 2006: 437-446 |
64 | EE | Eunjin Lee, Deukjo Hong, Donghoon Chang, Seokhie Hong, Jongin Lim: A Weak Key Class of XTEA for a Related-Key Rectangle Attack. VIETCRYPT 2006: 286-297 |
63 | EE | Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi: Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. J. Cryptology 19(4): 441-462 (2006) |
2005 | ||
62 | EE | Sosun Kim, Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim: A Fast Inversion Algorithm and Low-Complexity Architecture over GF(2m). CIS (2) 2005: 1-8 |
61 | EE | Jin Wook Byun, Dong Hoon Lee, Jongin Lim: Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. CIS (2) 2005: 143-148 |
60 | EE | Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim: Generic Transformation for Scalable Broadcast Encryption Schemes. CRYPTO 2005: 276-292 |
59 | EE | Kwangsoo Lee, Changho Jung, Sangjin Lee, HyungJun Kim, Jongin Lim: Applying LR Cube Analysis to JSteg Detection. Communications and Multimedia Security 2005: 275-276 |
58 | EE | Kihong Kim, Jinkeun Hong, Jongin Lim: A Secure and Efficient Communication Resume Protocol for Secure Wireless Networks. DAIS 2005: 157-168 |
57 | EE | Kihong Kim, Jinkeun Hong, Jongin Lim: Fast and Secure Communication Resume Protocol for Wireless Networks. Euro-Par 2005: 1120-1129 |
56 | EE | Su-Mi Lee, Young Ju Hwang, Dong Hoon Lee, Jong In Lim: Efficient Authentication for Low-Cost RFID Systems. ICCSA (1) 2005: 619-627 |
55 | EE | Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun: Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme. ICCSA (2) 2005: 381-390 |
54 | EE | Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim: Color Cube Analysis for Detection of LSB Steganography in RGB Color Images. ICCSA (2) 2005: 537-546 |
53 | EE | Jaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee, Jongin Lim: Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. ICCSA (2) 2005: 567-576 |
52 | EE | Dong Jin Yang, Chang Han Kim, Young-Ho Park, Yongtae Kim, Jongin Lim: Modified Sequential Normal Basis Multipliers for Type II Optimal Normal Bases. ICCSA (2) 2005: 647-656 |
51 | EE | Kihong Kim, Jinkeun Hong, Jongin Lim: Analysis/Synthesis of Speech Signals Based on AbS/OLA Sinusoidal Modeling Using Elliptic Filter. IDEAL 2005: 141-148 |
50 | EE | Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim: A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm. ISC 2005: 288-299 |
49 | EE | Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim: New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography. Information Hiding 2005: 312-326 |
48 | EE | Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun: Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. KES (2) 2005: 453-459 |
47 | EE | Seokhee Lee, Hyunsang Kim, Sangjin Lee, Jongin Lim: Digital evidence collection process in integrity and memory information gathering. SADFE 2005: 236-247 |
46 | EE | Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim: An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism. Selected Areas in Cryptography 2005: 144-158 |
45 | EE | Kihong Kim, Jinkeun Hong, Jongin Lim: Sinusoidal Modeling Using Wavelet Packet Transform Applied to the Analysis and Synthesis of Speech Signals. TSD 2005: 241-248 |
44 | EE | Jung Youp Lee, Seok Won Jung, Jongin Lim: Detecting Trapdoors in Smart Cards Using Timing and Power Analysis. TestCom 2005: 275-288 |
43 | EE | Hyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, Jongin Lim: Oblivious Conjunctive Keyword Search. WISA 2005: 318-327 |
42 | EE | Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai: Side Channel Cryptanalysis on XTR Public Key Cryptosystem. IEICE Transactions 88-A(5): 1214-1223 (2005) |
2004 | ||
41 | Jong In Lim, Dong Hoon Lee: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers Springer 2004 | |
40 | EE | Dong-Guk Han, Jongin Lim, Kouichi Sakurai: On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. ACISP 2004: 454-465 |
39 | EE | Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai: Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. ICICS 2004: 305-317 |
38 | EE | Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim: New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. ICISC 2004: 21-32 |
37 | EE | Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim: On Security Notions for Steganalysis. ICISC 2004: 440-454 |
36 | EE | Jongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, Jung Hwan Song: Related-Key Attacks on Reduced Rounds of SHACAL-2. INDOCRYPT 2004: 175-190 |
2003 | ||
35 | EE | Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim: Digital Signature Schemes with Restriction on Signing Capability. ACISP 2003: 324-335 |
34 | EE | Sangwoo Park, Soo Hak Sung, Sangjin Lee, Jongin Lim: Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES. FSE 2003: 247-260 |
33 | EE | Hyejoung Yoo, Hyungwoo Lee, Sangjin Lee, Jongin Lim: Designated Verification of Non-invertible Watermark. ISC 2003: 338-351 |
32 | EE | Taeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim: Covert Channel Detection in the ICMP Payload Using Support Vector Machine. ISCIS 2003: 828-835 |
31 | EE | Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim: Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property. MMM-ACNS 2003: 298-307 |
2002 | ||
30 | EE | Sangwoo Park, Soo Hak Sung, Seongtaek Chee, Jongin Lim: On the Security of Reduced Versions of 3-Pass HAVAL. ACISP 2002: 406-419 |
29 | EE | Sangwoo Park, Soo Hak Sung, Seongtaek Chee, E-Joong Yoon, Jongin Lim: On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis. ASIACRYPT 2002: 176-191 |
28 | EE | Young-Ho Park, Sangtae Jeong, Jongin Lim: Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms. EUROCRYPT 2002: 197-208 |
27 | EE | Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim: Saturation Attacks on Reduced Round Skipjack. FSE 2002: 100-111 |
26 | EE | Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, Jongin Lim: Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA. FSE 2002: 49-60 |
25 | EE | Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, Jongin Lim: A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. ICICS 2002: 456-468 |
24 | EE | Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim: Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. ICISC 2002: 16-34 |
23 | EE | Hak Soo Ju, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim: An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. ICISC 2002: 421-432 |
22 | EE | Young-Ho Park, Sangho Oh, Sangjin Lee, Jongin Lim, Maenghee Sung: An Improved Method of Multiplication on Certain Elliptic Curves. Public Key Cryptography 2002: 310-322 |
21 | EE | Young-Ho Park, Sangtae Jeong, Chang Han Kim, Jongin Lim: An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves. Public Key Cryptography 2002: 323-334 |
20 | EE | Donghoon Chang, Jaechul Sung, Soo Hak Sung, Sangjin Lee, Jongin Lim: Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. Selected Areas in Cryptography 2002: 160-174 |
19 | EE | Dong-Guk Han, Ki Soon Yoon, Young-Ho Park, Chang Han Kim, Jongin Lim: Optimal Extension Fields for XTR. Selected Areas in Cryptography 2002: 369-384 |
18 | EE | Chang Han Kim, Sangho Oh, Jongin Lim: A New Hardware Architecture for Operations in GF(2m). IEEE Trans. Computers 51(1): 90-92 (2002) |
17 | EE | Seokhie Hong, Jaechul Sung, Sangjin Lee, Jongin Lim, Jongsu Kim: Provable security for 13 round Skipjack-like structure. Inf. Process. Lett. 82(5): 243-246 (2002) |
2001 | ||
16 | EE | Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi: Known-IV Attacks on Triple Modes of Operation of Block Ciphers. ASIACRYPT 2001: 208-221 |
15 | EE | Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim: Impossible Differential Cryptanalysis of Zodiac. FSE 2001: 300-311 |
14 | EE | Jaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi: Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. ICISC 2001: 103-113 |
13 | EE | Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee, Jongin Lim: Off-Line Authentication Using Watermarks. ICISC 2001: 200-213 |
12 | EE | Seonhee Lee, Seokhie Hong, Sangjin Lee, Jongin Lim, Seonhee Yoon: Truncated Differential Cryptanalysis of Camellia. ICISC 2001: 32-38 |
11 | EE | Ik Rae Jeong, Dong Hoon Lee, Jong In Lim: Efficient Transferable Cash with Group Signatures. ISC 2001: 462-474 |
2000 | ||
10 | Heajoung Yoo, Seokhie Hong, Sangjin Lee, Jong In Lim, Okyeon Yi, Maenghee Sung: A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring. ACISP 2000: 41-48 | |
9 | EE | Jaechul Sung, Sangjin Lee, Jong In Lim, Seokhie Hong, Sangjoon Park: Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. ASIACRYPT 2000: 274-288 |
8 | EE | Seokhie Hong, Sangjin Lee, Jongin Lim, Jaechul Sung, Dong Hyeon Cheon, Inho Cho: Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. FSE 2000: 273-283 |
7 | EE | Hyun-Jeong Kim, Jong In Lim, Dong Hoon Lee: Efficient and Secure Member Deletion in Group Signature Schemes. ICISC 2000: 150-161 |
6 | EE | Dong Hyeon Cheon, Sangjin Lee, Jong In Lim, Sung Jae Lee: New Block Cipher DONUT Using Pairwise Perfect Decorrelation. INDOCRYPT 2000: 262-270 |
5 | EE | Sangho Oh, Chang Han Kim, Jongin Lim, Dong Hyeon Cheon: Efficient Normal Basis Multipliers in Composite Fields. IEEE Trans. Computers 49(10): 1133-1138 (2000) |
1999 | ||
4 | Ju-Sung Kang, Choonsik Park, Sangjin Lee, Jong In Lim: On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis. ICISC 1999: 38-52 | |
3 | EE | Chang-Hyi Le, Jong In Lim: A New Aspect of Dual Basis for Efficient Field Arithmetic. Public Key Cryptography 1999: 12-28 |
1998 | ||
2 | EE | Jung Je Son, Jong In Lim, Seongtaek Chee, Soo Hak Sung: Global Avalanche Characteristics and Nonlinearity of Balanced Boolean Functions. Inf. Process. Lett. 65(3): 139-144 (1998) |
1995 | ||
1 | Changho Seo, Jongin Lim, Hichum Eun: On Comparison and Analysis of Algorithms for Multiplication in GF(2^m). J. Comput. Syst. Sci. 51(3): 456-459 (1995) |