2008 |
66 | EE | JungHoon Ha,
Sang-Jae Moon,
Jianying Zhou,
JaeCheol Ha:
A New Formal Proof Model for RFID Location Privacy.
ESORICS 2008: 267-281 |
65 | EE | Zhihong Liu,
Jianfeng Ma,
Qiping Huang,
Sang-Jae Moon:
A pairwise key establishment scheme for heterogeneous sensor networks.
HeterSanet 2008: 53-60 |
64 | EE | Wei Wang,
Jianfeng Ma,
Sang-Jae Moon:
CRMS: A Collusion-Resistant Matrix System for Group Key Management in Wireless Networks.
ICC 2008: 1551-1555 |
63 | EE | Zhihong Liu,
Jianfeng Ma,
Qiping Huang,
Sang-Jae Moon:
Keying material based key pre-distribution scheme.
ISI 2008: 218-221 |
62 | EE | HyeongRag Kim,
Hoon Jae Lee,
Sang-Jae Moon:
A Security Enhancement of the E0 Cipher in Bluetooth System.
KES-AMSTA 2008: 858-867 |
61 | | Zhihong Liu,
Jianfeng Ma,
Qiping Huang,
Sang-Jae Moon:
Keying Material Based Key Pre-distribution Scheme for Sensor Networks.
Ad Hoc & Sensor Wireless Networks 6(1-2): 67-89 (2008) |
60 | EE | Tao Feng,
FengHua Li,
Jianfeng Ma,
Sang-Jae Moon:
A new approach for UC security concurrent deniable authentication.
Science in China Series F: Information Sciences 51(4): 352-367 (2008) |
2007 |
59 | EE | JaeCheol Ha,
Hwankoo Kim,
JeaHoon Park,
Sang-Jae Moon,
Juan Manuel González Nieto,
Colin Boyd:
HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System.
EUC Workshops 2007: 557-567 |
58 | EE | JaeCheol Ha,
Sang-Jae Moon,
Juan Manuel González Nieto,
Colin Boyd:
Low-Cost and Strong-Security RFID Authentication Protocol.
EUC Workshops 2007: 795-807 |
57 | EE | Meng-Hui Lim,
Sanggon Lee,
Sang-Jae Moon:
Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol.
ICISS 2007: 64-76 |
56 | EE | Xinghua Li,
Jianfeng Ma,
Sang-Jae Moon:
Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan.
NPC 2007: 306-314 |
55 | EE | JaeCheol Ha,
Sang-Jae Moon,
Juan Manuel González Nieto,
Colin Boyd:
Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP).
PAKDD Workshops 2007: 574-583 |
54 | EE | JaeCheol Ha,
JeaHoon Park,
Sang-Jae Moon,
Sung-Ming Yen:
Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC.
WISA 2007: 333-344 |
53 | EE | Sung-Ming Yen,
Wei-Chih Lien,
Sang-Jae Moon:
Inefficiency of common-multiplicand multiplication and exponentiation algorithms by performing binary complements.
Applied Mathematics and Computation 189(1): 285-290 (2007) |
52 | EE | JungHoon Ha,
Jianying Zhou,
Sang-Jae Moon:
A secure double auction protocol against false bids.
Decision Support Systems 44(1): 147-158 (2007) |
51 | EE | Young-Ho Park,
Hwangjun Song,
KyungKeun Lee,
CheolSoo Kim,
Sanggon Lee,
Sang-Jae Moon:
Secure Route Discovery Protocol for Ad Hoc Networks.
IEICE Transactions 90-A(2): 539-541 (2007) |
50 | EE | Fan Zhang,
Jianfeng Ma,
Sang-Jae Moon:
Universally composable anonymous Hash certification model.
Science in China Series F: Information Sciences 50(3): 440-455 (2007) |
2006 |
49 | EE | Xinghua Li,
Sang-Jae Moon,
Jianfeng Ma:
On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan.
ACNS 2006: 340-348 |
48 | EE | JeaHoon Park,
Hoon Jae Lee,
JaeCheol Ha,
YongJe Choi,
Howon Kim,
Sang-Jae Moon:
A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit.
CIS 2006: 417-426 |
47 | EE | Wei Wang,
Jianfeng Ma,
Sang-Jae Moon:
Ternary Tree Based Group Key Management in Dynamic Peer Networks.
CIS 2006: 513-522 |
46 | EE | Sung-Ming Yen,
Dongryeol Kim,
Sang-Jae Moon:
Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection.
FDTC 2006: 53-61 |
45 | EE | JaeCheol Ha,
JungHoon Ha,
Sang-Jae Moon,
Colin Boyd:
LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System.
ICUCT 2006: 80-89 |
44 | EE | JongMin Jeong,
Goo Yeon Lee,
Sang-Jae Moon:
Extended Authentication Integrating Scheme for Beyond 3G Wireless Networks.
ISCIS 2006: 413-423 |
43 | EE | HyungSo Yoo,
Christoph Herbst,
Stefan Mangard,
Elisabeth Oswald,
Sang-Jae Moon:
Investigations of Power Analysis Attacks and Countermeasures for ARIA.
WISA 2006: 160-172 |
42 | EE | Dong Jin Kwak,
Sang-Jae Moon,
Guilin Wang,
Robert H. Deng:
A secure extension of the Kwak-Moon group signcryption scheme.
Computers & Security 25(6): 435-444 (2006) |
41 | EE | JoongHyo Oh,
Sang-Jae Moon,
Jianfeng Ma:
An Attack on the Identity-Based Key Agreement Protocols in Multiple PKG Environment.
IEICE Transactions 89-A(3): 826-829 (2006) |
40 | EE | KyungKeun Lee,
Young-Ho Park,
Sang-Jae Moon:
Cryptanalysis on the Robust and Simple Authentication Protocol for Secure Communication on the Web.
IEICE Transactions 89-A(6): 1859-1862 (2006) |
39 | EE | JungHoon Ha,
Jianying Zhou,
Sang-Jae Moon:
Improved Double Auction Protocol based on a Hybrid Trust Model.
JCP 1(2): 33-41 (2006) |
2005 |
38 | EE | Xinghua Li,
Jianfeng Ma,
Sang-Jae Moon:
On the Security of the Canetti-Krawczyk Model.
CIS (2) 2005: 356-363 |
37 | EE | Fan Zhang,
Jianfeng Ma,
Sang-Jae Moon:
The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i.
CIS (2) 2005: 488-493 |
36 | EE | JaeCheol Ha,
ChangKyun Kim,
Sang-Jae Moon,
IlHwan Park,
HyungSo Yoo:
Differential Power Analysis on Block Cipher ARIA.
HPCC 2005: 541-548 |
35 | EE | ChangKyun Kim,
JaeCheol Ha,
Sang-Jae Moon,
Sung-Ming Yen,
Sung-Hyun Kim:
A CRT-Based RSA Countermeasure Against Physical Cryptanalysis.
HPCC 2005: 549-554 |
34 | EE | Sung-Ming Yen,
Lee-Chun Ko,
Sang-Jae Moon,
JaeCheol Ha:
Relative Doubling Attack Against Montgomery Ladder.
ICISC 2005: 117-128 |
33 | EE | JoongHyo Oh,
KyungKeun Lee,
Sang-Jae Moon:
How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes.
ICISS 2005: 290-303 |
32 | EE | JungHoon Ha,
Jianying Zhou,
Sang-Jae Moon:
A Robust Double Auction Protocol Based on a Hybrid Trust Model.
ICISS 2005: 77-90 |
31 | EE | KyungKeun Lee,
JoongHyo Oh,
Sang-Jae Moon:
How to Generate Universally Verifiable Signatures in Ad-Hoc Networks.
MADNES 2005: 118-131 |
30 | EE | Wei Wang,
Jianfeng Ma,
Sang-Jae Moon:
Efficient Group Key Management for Dynamic Peer Networks.
MSN 2005: 753-762 |
29 | EE | Sung-Ming Yen,
Wei-Chih Lien,
Sang-Jae Moon,
JaeCheol Ha:
Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption.
Mycrypt 2005: 183-195 |
28 | EE | Sanggon Lee,
Yvonne Hitchcock,
Young-Ho Park,
Sang-Jae Moon:
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves.
Selected Areas in Cryptography 2005: 205-220 |
27 | EE | JungHoon Ha,
Jianying Zhou,
Sang-Jae Moon:
An Improved Double Auction Protocol Against False Bids.
TrustBus 2005: 274-287 |
2004 |
26 | EE | ChangKyun Kim,
JaeCheol Ha,
Sung-Hyun Kim,
Seokyu Kim,
Sung-Ming Yen,
Sang-Jae Moon:
A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks.
ICCSA (1) 2004: 150-158 |
25 | EE | Hoon Jae Lee,
ManKi Ahn,
Seongan Lim,
Sang-Jae Moon:
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks.
ICCSA (1) 2004: 517-526 |
24 | EE | Sung-Ming Yen,
Chien-Ning Chen,
Sang-Jae Moon,
JaeCheol Ha:
Improvement on Ha-Moon Randomized Exponentiation Algorithm.
ICISC 2004: 154-167 |
23 | EE | Kevin Chen,
Matthew Henricksen,
William Millan,
Joanne Fuller,
Leonie Ruth Simpson,
Ed Dawson,
Hoon Jae Lee,
Sang-Jae Moon:
Dragon: A Fast Word Based Stream Cipher.
ICISC 2004: 33-50 |
22 | EE | Guilin Wang,
Robert H. Deng,
Dong Jin Kwak,
Sang-Jae Moon:
Security Analysis of Two Signcryption Schemes.
ISC 2004: 123-133 |
21 | EE | HyungSo Yoo,
ChangKyun Kim,
JaeCheol Ha,
Sang-Jae Moon,
IlHwan Park:
Side Channel Cryptanalysis on SEED.
WISA 2004: 411-424 |
20 | EE | Dong Jin Kwak,
Sang-Jae Moon:
A Distributed Sign-and-Encryption for Anonymity.
IEICE Transactions 87-A(1): 228-230 (2004) |
2003 |
19 | EE | Sung-Ming Yen,
Sang-Jae Moon,
JaeCheol Ha:
Permanent Fault Attack on the Parameters of RSA with CRT.
ACISP 2003: 285-296 |
18 | EE | Hwankoo Kim,
Sang-Jae Moon:
Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders.
ACISP 2003: 488-497 |
17 | EE | Dong Jin Kwak,
Sang-Jae Moon:
Efficient Distributed Signcryption Scheme as Group Signcryption.
ACNS 2003: 403-417 |
16 | EE | MyungSik Choi,
Dong Jin Kwak,
Sang-Jae Moon:
A Proposal for DoS-Defensive Internet Key Exchange.
ICCSA (2) 2003: 328-337 |
15 | EE | MahnKi Ahn,
JaeCheol Ha,
Hoon Jae Lee,
Sang-Jae Moon:
A Random M-ary Method Based Countermeasure against Side Channel Attacks.
ICCSA (2) 2003: 338-347 |
14 | EE | Sung-Ming Yen,
Seungjoo Kim,
Seongan Lim,
Sang-Jae Moon:
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis.
IEEE Trans. Computers 52(4): 461-472 (2003) |
2002 |
13 | EE | Andrew Clark,
Ed Dawson,
Joanne Fuller,
Jovan Dj. Golic,
Hoon Jae Lee,
William Millan,
Sang-Jae Moon,
Leone Simpson:
The LILI-II Keystream Generator.
ACISP 2002: 25-39 |
12 | EE | Dong Jin Kwak,
JaeCheol Ha,
Hoon Jae Lee,
Hwankoo Kim,
Sang-Jae Moon:
A WTLS Handshake Protocol with User Anonymity and Forward Secrecy.
CDMA International Conference 2002: 219-230 |
11 | EE | JaeCheol Ha,
Sang-Jae Moon:
Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks.
CHES 2002: 551-563 |
10 | EE | Sung-Ming Yen,
Sang-Jae Moon,
JaeCheol Ha:
Hardware Fault Attackon RSA with CRT Revisited.
ICISC 2002: 374-388 |
9 | EE | Hoon Jae Lee,
Sang-Jae Moon:
Parallel stream cipher for secure high-speed communications.
Signal Processing 82(2): 259-265 (2002) |
2001 |
8 | EE | Hwankoo Kim,
Sang-Jae Moon:
New Public-Key Cryptosystem Using Divisor Class Groups.
ACISP 2001: 74-83 |
7 | EE | Sung-Ming Yen,
Seungjoo Kim,
Seongan Lim,
Sang-Jae Moon:
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis.
ICISC 2001: 397-413 |
6 | EE | Sung-Ming Yen,
Seungjoo Kim,
Seongan Lim,
Sang-Jae Moon:
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack.
ICISC 2001: 414-427 |
2000 |
5 | | Kook-Heui Lee,
Sang-Jae Moon:
AKA Protocols for Mobile Communications.
ACISP 2000: 400-411 |
4 | | DongGook Park,
Colin Boyd,
Sang-Jae Moon:
Forward Secrecy and Its Application to Future Mobile Communications Security.
Public Key Cryptography 2000: 433-445 |
3 | EE | Hoon Jae Lee,
Sang-Jae Moon:
On an improved summation generator with 2-bit memory.
Signal Processing 80(1): 211-217 (2000) |
1999 |
2 | | Kook-Heui Lee,
Sang-Jae Moon,
Won-Young Jeong,
Tae-Geun Kim:
A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications.
ICISC 1999: 156-168 |
1998 |
1 | EE | JaeCheol Ha,
Sang-Jae Moon:
A Common-Multiplicand Method to the Montgomery Algorithm for Speeding up Exponentiation.
Inf. Process. Lett. 66(2): 105-107 (1998) |