Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-10 of 53 (Search time: 0.006 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
Anonymous fingerprinting as secure as the bilinear Diffie-Hellman assumption

Kim, Myungsun; Kim, Jongseong; Kim, Kwangjo, INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2513, pp.97 - 108, 2002

2
Self-certified signatures

Lee, Byoungcheon; Kim, Kwangjo, PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2551, pp.199 - 214, 2002-12

3
The ring authenticated encryption scheme - How to provide a clue wisely

Lv, Jiqiang; Ren, Kui; Chen, Xiaofeng; Kim, Kwangjo, INFORMATION SCIENCES, v.179, no.1-2, pp.161 - 168, 2009-01

4
ID-based distributed "magic ink" signature from pairings

Xie, Yan; Zhang, Fangguo; Chen, Xiaofeng; Kim, Kwangjo, INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2836, pp.249 - 259, 2003

5
Weak property of malleability in NTRUSign

Min, S; Yamamoto, G; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3108, pp.379 - 390, 2004

6
Efficient ID-based blind signature and proxy signature from bilinear pairings

Zhang, Fangguo; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2727, pp.312 - 323, 2003

7
Improved Impossible Differential Cryptanaylsis of Rijndael and Crypton

Cheon, Jung Hee; Kim, MunJu; Lee, Jung-Yeun; Kim, Kwangjo; Kang, SungWoo, LECTURE NOTES IN COMPUTER SCIENCE, v.2288, no.0, pp.39 - 49, 2002-12

8
Efficient Public Auction with One-Time Registration and Public Verifiability

Byoungcheon Lee; Kim, Kwangjo; Ma, JoongSoo, LECTURE NOTES IN COMPUTER SCIENCE, v.2247, no.0, pp.162 - 174, 2001-12

9
Providing receipt-freeness in mixnet-based voting protocols

Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2971, pp.245 - 258, 2004

10
An efficient tree-based group key agreement using bilinear map

Lee, Sangwon; Kim, Yongdae; Kim, Kwangjo; Ryu, Dae-Hyun, APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2846, pp.357 - 371, 2003

rss_1.0 rss_2.0 atom_1.0