2005 | ||
---|---|---|
6 | EE | Kyungah Shim, Sungsik Woo: Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings. Applied Mathematics and Computation 166(3): 523-530 (2005) |
5 | EE | Kyungah Shim: Off-line password-guessing attacks on the generalized key agreement and password authentication protocol. Applied Mathematics and Computation 169(1): 511-515 (2005) |
4 | EE | Kyungah Shim, Young-Ran Lee: Security flaws in authentication and key establishment protocols for mobile communications. Applied Mathematics and Computation 169(1): 62-74 (2005) |
2002 | ||
3 | EE | Kyungah Shim: The Risks of Compromising Secret Information. ICICS 2002: 122-133 |
2 | EE | Jun-Bum Shin, Kwangsu Lee, Kyungah Shim: New DSA-Verifiable Signcryption Schemes. ICISC 2002: 35-47 |
2001 | ||
1 | EE | Kyungah Shim: Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field. ACISP 2001: 514-520 |
1 | Kwangsu Lee | [2] |
2 | Young-Ran Lee | [4] |
3 | Jun-Bum Shin | [2] |
4 | Sungsik Woo | [6] |