


default search action
Seungjoo Kim
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Yejun Kim
, Kwangsoo Cho, Seungjoo Kim
:
Challenges in Dynamic Analysis of Drone Firmware and Its Solutions. IEEE Access 12: 106593-106604 (2024) - [j29]Jaewan Seo
, Jiwon Kwak, Seungjoo Kim
:
Development for High-Assurance Software Update Management System Complying With UN R156. IEEE Access 12: 135811-135830 (2024) - [c79]Hojung Yang, Suhyeon Lee, Seungjoo Kim:
A Tip for IOTA Privacy: IOTA Light Node Deanonymization via Tip Selection. ICBC 2024: 494-502 - [i18]Haena Kim, Yejun Kim, Seungjoo Kim:
A Study on the Security Requirements Analysis to build a Zero Trust-based Remote Work Environment. CoRR abs/2401.03675 (2024) - [i17]Hojung Yang, Suhyeon Lee, Seungjoo Kim:
A Tip for IOTA Privacy: IOTA Light Node Deanonymization via Tip Selection. CoRR abs/2403.11171 (2024) - 2023
- [j28]Suhyeon Lee
, Seungjoo Kim
:
Shorting attack: Predatory, destructive short selling on Proof-of-Stake cryptocurrencies. Concurr. Comput. Pract. Exp. 35(16) (2023) - [j27]Suhyeon Lee
, Seungjoo Kim:
Rethinking selfish mining under pooled mining. ICT Express 9(3): 356-361 (2023) - [c78]Taehyun Ahn
, Jiwon Kwak
, Seungjoo Kim
:
mdTLS: How to Make Middlebox-Aware TLS More Efficient? ICISC (2) 2023: 39-59 - [i16]Taehyun Ahn, Jiwon Kwak, Seungjoo Kim:
mdTLS: How to Make middlebox-aware TLS more efficient? CoRR abs/2306.03573 (2023) - [i15]Yejun Kim, Kwangsoo Cho, Seungjoo Kim:
Difficulties in Dynamic Analysis of Drone Firmware and Its Solutions. CoRR abs/2312.16818 (2023) - 2022
- [j26]Suhyeon Lee
, Seungjoo Kim
:
Blockchain as a Cyber Defense: Opportunities, Applications, and Challenges. IEEE Access 10: 2602-2618 (2022) - [j25]Sooyoung Kang, Seungjoo Kim
:
CIA-level driven secure SDLC framework for integrating security into SDLC process. J. Ambient Intell. Humaniz. Comput. 13(10): 4601-4624 (2022) - [c77]Suhyeon Lee
, Donghwan Lee
, Seungjoo Kim
:
Block Double-Submission Attack: Block Withholding Can Be Self-Destructive. AFT 2022: 232-243 - [c76]Suhyeon Lee
, Kwangsoo Cho, Seungjoo Kim:
Do You Really Need to Disguise Normal Servers as Honeypots? MILCOM 2022: 166-172 - [i14]Suhyeon Lee
, Donghwan Lee
, Seungjoo Kim:
Block Double-Submission Attack: Block Withholding Can Be Self-Destructive. CoRR abs/2208.05425 (2022) - [i13]Suhyeon Lee
, Kwangsoo Cho, Seungjoo Kim:
Do You Really Need to Disguise Normal Servers as Honeypots? CoRR abs/2210.17399 (2022) - 2020
- [j24]Sungyong Cha
, Seungsoo Baek
, Seungjoo Kim
:
Blockchain Based Sensitive Data Management by Using Key Escrow Encryption System From the Perspective of Supply Chain. IEEE Access 8: 154269-154280 (2020) - [c75]Suhyeon Lee
, Seungjoo Kim
:
Proof-of-stake at stake: predatory, destructive attack on PoS cryptocurrencies. CryBlock@MOBICOM 2020: 7-11 - [i12]Suhyeon Lee, Seungjoo Kim:
Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains. IACR Cryptol. ePrint Arch. 2020: 19 (2020)
2010 – 2019
- 2019
- [c74]Suhyeon Lee
, Seungjoo Kim
:
Countering Block Withholding Attack Efficiently. INFOCOM Workshops 2019: 330-335 - [i11]Suhyeon Lee, Seungjoo Kim:
Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment. IACR Cryptol. ePrint Arch. 2019: 486 (2019) - 2018
- [j23]Sungyong Cha
, Seungsoo Baek
, Sooyoung Kang, Seungjoo Kim
:
Security Evaluation Framework for Military IoT Devices. Secur. Commun. Networks 2018: 6135845:1-6135845:12 (2018) - [e2]Jong Kim, Gail-Joon Ahn, Seungjoo Kim, Yongdae Kim, Javier López, Taesoo Kim:
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018. ACM 2018 [contents] - [i10]Suhyeon Lee, Seungjoo Kim:
Countering Block Withholding Attack Effciently. IACR Cryptol. ePrint Arch. 2018: 1211 (2018) - [i9]Suhyeon Lee, Seungjoo Kim:
Pooled Mining Makes Selfish Mining Tricky. IACR Cryptol. ePrint Arch. 2018: 1230 (2018) - 2017
- [j22]Sooyoung Kang, Seungjoo Kim
:
How to Obtain Common Criteria Certification of Smart TV for Home IoT Security and Reliability. Symmetry 9(10): 233 (2017) - [j21]Jong Han Lee, Seungjoo Kim
:
Analysis and Security Evaluation of Security Threat on Broadcasting Service. Wirel. Pers. Commun. 95(4): 4149-4169 (2017) - 2016
- [j20]Seungsoo Baek, Seung-Hyun Seo
, Seungjoo Kim
:
Preserving Patient's Anonymity for Mobile Healthcare System in IoT Environment. Int. J. Distributed Sens. Networks 12(9): 2171642 (2016) - [j19]Kyumin Cho, Hyunwoo Lim, Taeshik Shon, Seungjoo Kim
:
A novel security architecture of electronic vehicle system for smart grid communication. J. Supercomput. 72(1): 214-231 (2016) - 2015
- [j18]Jonghan Lee, Kyumin Cho, ChangYong Lee, Seungjoo Kim
:
VoIP-aware network attack detection based on statistics and behavior of SIP traffic. Peer-to-Peer Netw. Appl. 8(5): 872-880 (2015) - [c73]Seungsoo Baek, Seung-Hyun Seo
, Seungjoo Kim
:
Preserving biosensor users' anonymity over wireless cellular network. ICUFN 2015: 470-475 - 2013
- [j17]Donghyun Choi, Hanjae Jeong, Dongho Won, Seungjoo Kim:
Hybrid Key Management Architecture for Robust SCADA Systems. J. Inf. Sci. Eng. 29(2): 281-298 (2013) - [j16]Sangsik Lee, Donghyun Choi, Dongho Won, Seungjoo Kim
:
Vulnerabilities and Countermeasures of Commercial Online Music Streaming Services in Korea. J. Softw. 8(3): 520-527 (2013) - [c72]Minsu Park, Sunghoon Kang, Seungjoo Kim
:
A study on weakness and improvement of Cloud Shredder. ICTC 2013: 1107-1113 - 2012
- [j15]Seung-Hyun Seo
, Kyu Young Choi
, Jung Yeon Hwang, Seungjoo Kim
:
Efficient certificateless proxy signature scheme with provable security. Inf. Sci. 188: 322-337 (2012) - [c71]Heasuk Jo, Seungjoo Kim
, Dongho Won:
Weakness and simple improvement of anonymous mutual authentication protocol with link-layer. CUBE 2012: 816-819 - [c70]Hanjae Jeong, Seungjoo Kim
, Dongho Won:
On the security of an novel protocol for downloadable CAS. ICUIMC 2012: 65:1-65:5 - 2011
- [j14]Heasuk Jo, Seungjoo Kim
, Dongho Won:
Advanced Information Security Management Evaluation System. KSII Trans. Internet Inf. Syst. 5(6): 1192-1213 (2011) - [j13]Byunghee Lee, Kyungho Son, Dongho Won, Seungjoo Kim:
Secure Data Deletion for USB Flash Memory. J. Inf. Sci. Eng. 27(3): 933-952 (2011) - [c69]Kyoungju Kwak, Kwang-Woo Lee, Dongho Won, Seungjoo Kim
:
Analysis and countermeasures of security vulnerability on portal sites. ICUIMC 2011: 98 - 2010
- [j12]Yunho Lee, Seungjoo Kim
, Dongho Won:
Enhancement of two-factor authenticated key exchange protocols in public wireless LANs. Comput. Electr. Eng. 36(1): 213-223 (2010) - [j11]Yunho Lee, Sangjoon Park, Masahiro Mambo, Seungjoo Kim
, Dongho Won:
Towards trustworthy e-voting using paper receipts. Comput. Stand. Interfaces 32(5-6): 305-311 (2010) - [j10]Hanjae Jeong, Dongho Won, Seungjoo Kim:
Weaknesses and Improvement of Secure Hash-Based Strong-Password Authentication Protocol. J. Inf. Sci. Eng. 26(5): 1845-1858 (2010) - [c68]Seungjin Son, Kwang-Woo Lee, Dongho Won, Seungjoo Kim
:
U-healthcare system protecting privacy based on cloaker. BIBM Workshops 2010: 417-423 - [c67]Heasuk Jo, Seungjoo Kim
, Dongho Won:
A Study on Comparative Analysis of the Information Security Management Systems. ICCSA (4) 2010: 510-519 - [c66]Sangsik Lee, Donghyun Choi, Dongho Won, Seungjoo Kim
:
Security analysis on commercial online music streaming service and countermeasures. ICUIMC 2010: 59 - [c65]Yu-na Hwang, Hanjae Jeong, Sungkyu Cho, Songyi Kim, Dongho Won, Seungjoo Kim
:
A Proposal of Appropriate Evaluation Scheme for Exchangeable CAS (XCAS), . ISPEC 2010: 217-228 - [c64]Kwang-Woo Lee, Yunho Lee, Dongho Won, Seungjoo Kim
:
Protection Profile for Secure E-Voting Systems. ISPEC 2010: 386-397 - [c63]Taehyun Kim, Dongho Won, Kwang-Woo Lee, Hogab Kang, Seungjoo Kim:
Automated DCI compliance test system for Digital Cinema Entities. NCM 2010: 434-439 - [c62]Keunwoo Rhee, Byunghee Lee, Dongho Won, Hac Yun Na, Seungjoo Kim
:
Vulnerabilities and Improvements of Du-Xiao-Chen-Wu's Secure Cell Relay Routing Protocol for Sensor Networks. SECURWARE 2010: 1-4 - [c61]Mijin Kim, Seungjoo Kim
, Dongho Won:
An Exquisite Authentication Scheme with Key Agreement Preserving User Anonymity. WISM 2010: 244-253
2000 – 2009
- 2009
- [c60]Yoonyoung Lee, Soonhaeng Hur, Dongho Won, Seungjoo Kim
:
Cipher Suite Setting Problem of SSL Protocol and it's Solutions. AINA Workshops 2009: 140-146 - [c59]Mijin Kim, Byunghee Lee, Seungjoo Kim
, Dongho Won:
Weaknesses and Improvements of Kuo-Lee's One-Time Password Authentication Scheme. FGIT-FGCN 2009: 421-430 - [c58]Wansuck Yi, Seungjoo Kim
, Dongho Won:
Smart Card Based AKE Protocol Using Biometric Information in Pervasive Computing Environments. ICCSA (2) 2009: 182-190 - [c57]Kwang-Woo Lee, Yunho Lee, Seungjoo Kim
, Dongho Won:
A Practical Approach to a Reliable Electronic Election. ICCSA (2) 2009: 191-203 - [c56]Mijin Kim, Heasuk Jo, Seungjoo Kim
, Dongho Won:
Security Weakness in a Provable Secure Authentication Protocol Given Forward Secure Session Key. ICCSA (2) 2009: 204-211 - [c55]Heasuk Jo, Woongryul Jeon, Yunho Lee, Seungjoo Kim
, Dongho Won:
Security Specification for Conversion Technologies of Heterogeneous DRM Systems. ISPEC 2009: 159-170 - [c54]Heasuk Jo, Yunho Lee, Mijin Kim, Seungjoo Kim
, Dongho Won:
Off-Line Password-Guessing Attack to Yang's and Huang's Authentication Schemes for Session Initiation Protocol. NCM 2009: 618-621 - 2008
- [c53]Sumin Hong, Woongryul Jeon, Seungjoo Kim
, Dongho Won, Choonsik Park:
The Vulnerabilities Analysis of Fuzzy Vault Using Password. FGCN (3: BSBT) 2008: 76-83 - [c52]Yunho Lee, Seungjoo Kim
, Dongho Won:
How to Trust DRE Voting Machines Preserving Voter Privacy. ICEBE 2008: 302-307 - [c51]Namje Park
, Dooho Choi
, Seungjoo Kim
, Dongho Won:
Enforcing security in mobile RFID networks multilateral approaches and solutions. NOMS 2008: 999-1002 - [c50]Yachi Peng, Maowei Yu, Woo sok Jang, Sue Gyeong Syn, Seungjoo Kim:
Liuliu Pangpang. SIGGRAPH ASIA Art Gallery & Emerging Technologies 2008: 23 - [c49]Donghyun Choi, Sungkyu Cho, Dongho Won, Seungjoo Kim
:
Protection Profile for Connected Interoperable DRM Framework. WISA 2008: 320-332 - 2007
- [j9]Junghyun Nam, Seungjoo Kim
, Sangjoon Park, Dongho Won:
Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 299-302 (2007) - [j8]Junghyun Nam, Youngsook Lee, Seungjoo Kim
, Dongho Won:
Security weakness in a three-party pairing-based protocol for password authenticated key exchange. Inf. Sci. 177(6): 1364-1375 (2007) - [c48]Donghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim
, Dongho Won:
An Efficient and Secure Rights Sharing Method for DRM System Against Replay Attack. ATC 2007: 135-145 - [c47]Namje Park
, Seungjoo Kim
, Dongho Won:
Privacy Preserving Enhanced Service Mechanism in Mobile RFID Network. AWIC 2007: 278-283 - [c46]Sangjoon Park, Junghyun Nam, Seungjoo Kim
, Dongho Won:
Efficient Password-Authenticated Key Exchange Based on RSA. CT-RSA 2007: 309-323 - [c45]Donghwi Shin, Youngsung Choi, Yunho Lee, Sangjoon Park, Seungjoo Kim
, Dongho Won:
Security Analysis on the Authentication Mechanisms of Korean Popular Messengers. HCI (5) 2007: 547-552 - [c44]YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim, Dongho Won:
A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain. KES-AMSTA 2007: 1007-1016 - 2006
- [j7]Junghyun Nam, Seungjoo Kim
, Dongho Won:
Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 209-212 (2006) - [j6]Junghyun Nam, Seungjoo Kim
, Dongho Won:
Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 213-218 (2006) - [j5]Yunho Lee, Seungjoo Kim
, Dongho Won:
Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(7): 2084-2087 (2006) - [c43]Namje Park
, Jin Kwak
, Seungjoo Kim
, Dongho Won, Howon Kim:
WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. APWeb Workshops 2006: 741-748 - [c42]Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim
, Kouichi Sakurai, Dongho Won:
An RFID System Based MCLT System with Improved Privacy. EUC Workshops 2006: 579-590 - [c41]YoungGyo Lee, Jeonghee Ahn, Seungjoo Kim
, Dongho Won:
A PKI System for Detecting the Exposure of a User's Secret Key. EuroPKI 2006: 248-250 - [c40]Youngsook Lee, Junghyun Nam, Seungjoo Kim
, Dongho Won:
Two Efficient and Secure Authentication Schemes Using Smart Cards. ICCSA (5) 2006: 858-866 - [c39]He Zheng, Jin Kwak
, Kyungho Son, Wansuk Lee, Seungjoo Kim
, Dongho Won:
Confidence Value Based Multi Levels of Authentication for Ubiquitous Computing Environments. ICCSA (2) 2006: 954-963 - [c38]Keunwoo Rhee, Jin Kwak, Wan S. Yi, Chanho Park, Sangjoon Park, Hyungkyu Yang, Seungjoo Kim
, Dongho Won:
Efficient RFID Authentication Protocol for Minimizing RFID Tag Computation. ICHIT 2006: 607-616 - [c37]Namje Park, Seungjoo Kim
, Dongho Won, Howon Kim:
Security Analysis and Implementation Leveraging Globally Networked RFIDs. PWC 2006: 494-505 - [c36]Jeeyeon Kim, Seungjoo Kim
, Kilsoo Chun, Jaeil Lee, Dongho Won:
Group Key Agreement Protocol Among Mobile Devices in Different Cells. ISPA Workshops 2006: 1090-1097 - [c35]Namje Park, Jin Kwak, Seungjoo Kim, Dongho Won, Howon Kim:
Security Techniques Based on EPC Gen2 Tag for Secure Mobile RFID Network Services. KES (1) 2006: 924-934 - [c34]Yunho Lee, Heasuk Jo, Seungjoo Kim
, Dongho Won:
An Efficient Dispute Resolving Method for Digital Images. OTM Workshops (1) 2006: 331-341 - [e1]Dongho Won, Seungjoo Kim:
Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3935, Springer 2006, ISBN 3-540-33354-1 [contents] - [i8]Yunho Lee, Kwang-Woo Lee, Seungjoo Kim, Dongho Won:
Towards Trustworthy e-Voting using Paper Receipts. IACR Cryptol. ePrint Arch. 2006: 167 (2006) - 2005
- [j4]Junghyun Nam, Seungjoo Kim
, Dongho Won:
A weakness in the Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement scheme for low-power mobile devices. IEEE Commun. Lett. 9(5): 429-431 (2005) - [j3]Junghyun Nam, Jinwoo Lee, Seungjoo Kim
, Dongho Won:
DDH-based group key agreement in a mobile environment. J. Syst. Softw. 78(1): 73-83 (2005) - [c33]Namje Park, Howon Kim, Kyoil Chung, Seungjoo Kim
, Dongho Won:
XKMS-Based Key Management for Open LBS in Web Services Environment. AWIC 2005: 367-373 - [c32]Namje Park, Kiyoung Moon, Howon Kim, Seungjoo Kim
, Dongho Won:
XML-Based Security Acceleration Methods Supporting Fast Mobile Grid. EC-Web 2005: 316-326 - [c31]Jin Kwak
, Keunwoo Rhee, Soohyun Oh, Seungjoo Kim
, Dongho Won:
RFID System with Fairness Within the Framework of Security and Privacy. ESAS 2005: 142-152 - [c30]Yunho Lee, Kwang-Woo Lee, Seungjoo Kim
, Dongho Won, Hyungkyu Yang:
A Method for Deciding Quantization Steps in QIM Watermarking Schemes. EUC Workshops 2005: 965-975 - [c29]YoungGyo Lee, Injung Kim, Seungjoo Kim
, Dongho Won:
A Method for Detecting the Exposure of OCSP Responder's Session Private Key in D-OCSP-KIS. EuroPKI 2005: 215-226 - [c28]Namje Park
, Kiyoung Moon, Kyoil Chung, Seungjoo Kim
, Dongho Won:
XML-Based Digital Signature Accelerator in Open Mobile Grid Computing. GCC 2005: 323-333 - [c27]Junghyun Nam, Hyunjue Kim, Seungjoo Kim
, Dongho Won, Hyungkyu Yang:
Practical and Provably-Secure Multicasting over High-Delay Networks. International Conference on Computational Science (2) 2005: 493-501 - [c26]Seokhyang Cho, Junghyun Nam, Seungjoo Kim
, Dongho Won:
An Efficient Dynamic Group Key Agreement for Low-Power Mobile Devices. ICCSA (1) 2005: 498-507 - [c25]Namje Park, Howon Kim, Seungjoo Kim
, Dongho Won:
Open Location-Based Service Using Secure Middleware Infrastructure in Web Services. ICCSA (2) 2005: 1146-1155 - [c24]Hyunjue Kim, Junghyun Nam, Seungjoo Kim
, Dongho Won:
Secure and Efficient ID-Based Group Key Agreement Fitted for Pay-TV. PCM (2) 2005: 117-128 - [c23]Keunwoo Rhee, Jin Kwak, Seungjoo Kim
, Dongho Won:
Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment. SPC 2005: 70-84 - [c22]Junghyun Nam, Seungjoo Kim
, Dongho Won:
Secure Group Communications over Combined Wired and Wireless Networks. TrustBus 2005: 90-99 - [c21]Junghyun Nam, Seungjoo Kim, Dongho Won:
Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols. WISA 2005: 1-9 - [i7]Junghyun Nam, Seungjoo Kim, Dongho Won:
Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing. IACR Cryptol. ePrint Arch. 2005: 269 (2005) - 2004
- [c20]Junghyun Nam, Seokhyang Cho, Seungjoo Kim
, Dongho Won:
Simple and Efficient Group Key Agreement Based on Factoring. ICCSA (1) 2004: 645-654 - [c19]Jeeyeon Kim, Seungjoo Kim
, Jin Kwak, Dongho Won:
Cryptanalysis and Improvement of Password Authenticated Key Exchange Scheme between Clients with Different Passwords. ICCSA (1) 2004: 895-902 - [c18]Seungjoo Kim
, Dongho Won:
Threshold Entrusted Undeniable Signature. ICISC 2004: 195-203 - [i6]Junghyun Nam, Sungduk Kim, Seungjoo Kim, Dongho Won:
Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange. IACR Cryptol. ePrint Arch. 2004: 115 (2004) - [i5]Junghyun Nam, Jinwoo Lee, Seungjoo Kim, Dongho Won:
DDH-based Group Key Agreement in a Mobile Environment. IACR Cryptol. ePrint Arch. 2004: 127 (2004) - [i4]Junghyun Nam, Seungjoo Kim, Dongho Won:
Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices. IACR Cryptol. ePrint Arch. 2004: 251 (2004) - [i3]Junghyun Nam, Seungjoo Kim, Dongho Won:
A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme. IACR Cryptol. ePrint Arch. 2004: 257 (2004) - [i2]Junghyun Nam, Seungjoo Kim, Hyungkyu Yang, Dongho Won:
Secure Group Communications over Combined Wired/Wireless Networks. IACR Cryptol. ePrint Arch. 2004: 260 (2004) - [i1]Junghyun Nam, Seungjoo Kim, Dongho Won:
A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords. IACR Cryptol. ePrint Arch. 2004: 348 (2004) - 2003
- [j2]Kilsoo Chun, Seungjoo Kim
, Sangjin Lee, Soo Hak Sung, Seonhee Yoon:
Differential and linear cryptanalysis for 2-round SPNs. Inf. Process. Lett. 87(5): 277-282 (2003) - [j1]Sung-Ming Yen, Seungjoo Kim
, Seongan Lim, Sang-Jae Moon:
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. IEEE Trans. Computers 52(4): 461-472 (2003) - [c17]Jung-Yeun Lee, Jung Hee Cheon, Seungjoo Kim
:
An Analysis of Proxy Signatures: Is a Secure Channel Necessary? CT-RSA 2003: 68-79 - [c16]Seungjoo Kim
, Masahiro Mambo, Yuliang Zheng
:
Rethinking Chosen-Ciphertext Security under Kerckhoffs' Assumption. CT-RSA 2003: 227-243 - [c15]Jeeyeon Kim, Hyunjo Kwon, Haeryong Park, Seungjoo Kim
, Dongho Won:
An Improvement of VeriSign's Key Roaming Service Protocol. ICWE 2003: 281-288 - [c14]Ikkwon Yie, Seongan Lim, Seungjoo Kim
, Dongryeol Kim:
Prime Numbers of Diffie-Hellman Groups for IKE-MODP. INDOCRYPT 2003: 228-234 - 2001
- [c13]Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon:
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. ICISC 2001: 397-413 - [c12]Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon:
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. ICISC 2001: 414-427 - [c11]Seungjoo Kim
, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng
:
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). IMACC 2001: 114-127 - [c10]Seongan Lim, Seungjoo Kim
, Ikkwon Yie, Jaemoon Kim:
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001. INDOCRYPT 2001: 308-315 - [c9]Seongan Lim, Seungjoo Kim
, Ikkwon Yie, Jaemoon Kim, Hongsub Lee:
XTR Extended to GF(p6m). Selected Areas in Cryptography 2001: 301-312 - [c8]Jeeyeon Kim, Seungjoo Kim
, Hyunjo Kwon, Sungjae Lee, Sangjoon Park, Dongho Won:
Forward-Secure Commercial Key Escrow Systems. WETICE 2001: 211-216 - 2000
- [c7]Seongan Lim, Seungjoo Kim
, Ikkwon Yie, Hongsub Lee:
A Generalized Takagi-Cryptosystem with a modulus of the form prqs. INDOCRYPT 2000: 283-294
1990 – 1999
- 1999
- [c6]Seungjoo Kim
, Insoo Lee, Masahiro Mambo, Sungjun Park:
On the Difficulty of Key Recovery Systems. ISW 1999: 207-224 - [c5]Marc Joye, Seungjoo Kim
, Narn-Yih Lee:
Cryptanalysis of Two Group Signature Schemes. ISW 1999: 271-275 - 1998
- [c4]Seungjoo Kim, Soohyun Oh, Dongho Won:
One-time self-certified public keys, revisited. ICISC 1998: 59-69 - 1997
- [c3]Seungjoo Kim, Sangjoon Park, Dongho Won:
Proxy signatures, Revisited. ICICS 1997: 223-232 - [c2]Seungjoo Kim
, Sangjoon Park, Dongho Won:
Group Signatures for Hierarchical Multigroups. ISW 1997: 273-281 - 1996
- [c1]Seungjoo Kim
, Sungjun Park, Dongho Won:
Convertible Group Signatures. ASIACRYPT 1996: 311-321
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint