Seungjoo (Gabriel) Kim
Seungjoo (Gabriel) Kim
Professor at the School of Cybersecurity in Korea University
在 的电子邮件经过验证 - 首页
Proxy signatures, revisited
S Kim, S Park, D Won
International Conference on Information and Communications Security, 223-232, 1997
Challenge-response based RFID authentication protocol for distributed database environment
K Rhee, J Kwak, S Kim, D Won
International Conference on Security in Pervasive Computing, 70-84, 2005
WIPI mobile platform with secure service for mobile RFID network environment
N Park, J Kwak, S Kim, D Won, H Kim
Asia-Pacific Web Conference, 741-748, 2006
RSA speedup with Chinese remainder theorem immune against hardware fault cryptanalysis
SM Yen, S Kim, S Lim, SJ Moon
IEEE Transactions on computers 52 (4), 461-472, 2003
A countermeasure against one physical cryptanalysis may benefit another attack
Y Sung-Ming, S Kim, S Lim, S Moon
International Conference on Information Security and Cryptology, 414-427, 2001
An analysis of proxy signatures: Is a secure channel necessary?
JY Lee, JH Cheon, S Kim
Cryptographers’ Track at the RSA Conference, 68-79, 2003
Advanced key-management architecture for secure SCADA communications
D Choi, H Kim, D Won, S Kim
IEEE transactions on Power delivery 24 (3), 1154-1163, 2009
RSA speedup with residue number system immune against hardware fault cryptanalysis
Y Sung-Ming, S Kim, S Lim, S Moon
international conference on information security and cryptology, 397-413, 2001
Efficient secure group communications for SCADA
D Choi, S Lee, D Won, S Kim
IEEE Transactions on power delivery 25 (2), 714-722, 2009
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
J Nam, Y Lee, S Kim, D Won
Information Sciences 177 (6), 1364-1375, 2007
Convertible group signatures
SJ Kim, SJ Park, DH Won
International Conference on the Theory and Application of Cryptology and …, 1996
Zero-knowledge nominative signatures
S Kim
Proc. Ragocrypt'96, International Conference on the Theory and Application …, 1996
ID-based group signature
S Park, S Kim, D Won
Electronics Letters 33 (19), 1616-1617, 1997
Apparatus and method for inputting graphical password using wheel interface in embedded system
D Won, S Park, S Kim
US Patent 7,992,202, 2011
Improving fairness and privacy of Zhou-Gollmann's fair non-repudiation protocol
K Kim, S Park, J Baek
Proceedings of the 1999 ICPP Workshops on Collaboration and Mobile Computing …, 1999
DDH-based group key agreement in a mobile environment
J Nam, J Lee, S Kim, D Won
Journal of Systems and Software 78 (1), 73-83, 2005
A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices
J Nam, S Kim, D Won
IEEE Communications letters 9 (5), 429-431, 2005
Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords
J Kim, S Kim, J Kwak, D Won
International Conference on Computational Science and Its Applications, 895-902, 2004
Cryptanalysis of two protocols for RSA with CRT based on fault infection
SM Yen, D Kim, SJ Moon
International Workshop on Fault Diagnosis and Tolerance in Cryptography, 53-61, 2006
Forward-secure commercial key escrow systems and escrowing methods thereof
J Kim, S Kim, HJ Kwon, HR Park, H Lee
US Patent App. 09/997,012, 2003
文章 1–20