The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jongin Lim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dong-Guk Han, Jongin Lim, Kouichi Sakurai
    On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:454-465 [Conf]
  2. Sangwoo Park, Soo Hak Sung, Seongtaek Chee, Jongin Lim
    On the Security of Reduced Versions of 3-Pass HAVAL. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:406-419 [Conf]
  3. Jong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, Laurence Tianruo Yang
    Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. [Citation Graph (0, 0)][DBLP]
    AINA, 2007, pp:311-316 [Conf]
  4. Jin Wook Byun, Dong Hoon Lee, Jongin Lim
    Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    APWeb, 2006, pp:830-836 [Conf]
  5. Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi
    Known-IV Attacks on Triple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:208-221 [Conf]
  6. Sangwoo Park, Soo Hak Sung, Seongtaek Chee, E-Joong Yoon, Jongin Lim
    On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:176-191 [Conf]
  7. Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim
    Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:168-181 [Conf]
  8. Tae-Hyun Kim, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim
    Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:119-134 [Conf]
  9. Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee
    HIGHT: A New Block Cipher Suitable for Low-Resource Device. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:46-59 [Conf]
  10. Jin Wook Byun, Dong Hoon Lee, Jongin Lim
    Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:143-148 [Conf]
  11. Sosun Kim, Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim
    A Fast Inversion Algorithm and Low-Complexity Architecture over GF(2m). [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:1-8 [Conf]
  12. Kwangsoo Lee, Changho Jung, Sangjin Lee, HyungJun Kim, Jongin Lim
    Applying LR Cube Analysis to JSteg Detection. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:275-276 [Conf]
  13. Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim
    Generic Transformation for Scalable Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:276-292 [Conf]
  14. Kihong Kim, Jinkeun Hong, Jongin Lim
    A Secure and Efficient Communication Resume Protocol for Secure Wireless Networks. [Citation Graph (0, 0)][DBLP]
    DAIS, 2005, pp:157-168 [Conf]
  15. Kihong Kim, Jinkeun Hong, Jongin Lim
    Analysis of the Power Consumption of Secure Communication in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    DEXA, 2006, pp:894-903 [Conf]
  16. Young-Ho Park, Sangtae Jeong, Jongin Lim
    Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:197-208 [Conf]
  17. Kihong Kim, Jinkeun Hong, Jongin Lim
    Fast and Secure Communication Resume Protocol for Wireless Networks. [Citation Graph (0, 0)][DBLP]
    Euro-Par, 2005, pp:1120-1129 [Conf]
  18. Jin Wook Byun, Dong Hoon Lee, Jongin Lim
    Efficient Conjunctive Keyword Search on Encrypted Data Storage System. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2006, pp:184-196 [Conf]
  19. Seokhie Hong, Sangjin Lee, Jongin Lim, Jaechul Sung, Dong Hyeon Cheon, Inho Cho
    Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:273-283 [Conf]
  20. Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim
    Impossible Differential Cryptanalysis of Zodiac. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:300-311 [Conf]
  21. Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim
    Saturation Attacks on Reduced Round Skipjack. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:100-111 [Conf]
  22. Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, Jongin Lim
    Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:49-60 [Conf]
  23. Sangwoo Park, Soo Hak Sung, Sangjin Lee, Jongin Lim
    Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:247-260 [Conf]
  24. Jaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee, Jongin Lim
    Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:567-576 [Conf]
  25. Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun
    Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:381-390 [Conf]
  26. Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim
    Color Cube Analysis for Detection of LSB Steganography in RGB Color Images. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:537-546 [Conf]
  27. Dong Jin Yang, Chang Han Kim, Young-Ho Park, Yongtae Kim, Jongin Lim
    Modified Sequential Normal Basis Multipliers for Type II Optimal Normal Bases. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:647-656 [Conf]
  28. Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai
    Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:305-317 [Conf]
  29. Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, Jongin Lim
    A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:456-468 [Conf]
  30. Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim
    On Security Notions for Steganalysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:440-454 [Conf]
  31. Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim
    New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:21-32 [Conf]
  32. Seonhee Lee, Seokhie Hong, Sangjin Lee, Jongin Lim, Seonhee Yoon
    Truncated Differential Cryptanalysis of Camellia. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:32-38 [Conf]
  33. Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee, Jongin Lim
    Off-Line Authentication Using Watermarks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:200-213 [Conf]
  34. Kihong Kim, Jinkeun Hong, Jongin Lim
    Analysis/Synthesis of Speech Signals Based on AbS/OLA Sinusoidal Modeling Using Elliptic Filter. [Citation Graph (0, 0)][DBLP]
    IDEAL, 2005, pp:141-148 [Conf]
  35. Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee, Jongin Lim
    A Key Management Scheme for Large Scale Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PWC, 2006, pp:437-446 [Conf]
  36. Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim
    New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:312-326 [Conf]
  37. Jongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, Jung Hwan Song
    Related-Key Attacks on Reduced Rounds of SHACAL-2. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:175-190 [Conf]
  38. Taeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim
    Covert Channel Detection in the ICMP Payload Using Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2003, pp:828-835 [Conf]
  39. Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim
    Further Security Analysis of XTR. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:33-44 [Conf]
  40. Dong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim
    Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:238-253 [Conf]
  41. Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim
    A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:288-299 [Conf]
  42. Hyejoung Yoo, Hyungwoo Lee, Sangjin Lee, Jongin Lim
    Designated Verification of Non-invertible Watermark. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:338-351 [Conf]
  43. Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun
    Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. [Citation Graph (0, 0)][DBLP]
    KES (2), 2005, pp:453-459 [Conf]
  44. Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim
    Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:298-307 [Conf]
  45. Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim
    An Efficient ID-Based Delegation Network. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:382-391 [Conf]
  46. Young-Ho Park, Sangtae Jeong, Chang Han Kim, Jongin Lim
    An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:323-334 [Conf]
  47. Young-Ho Park, Sangho Oh, Sangjin Lee, Jongin Lim, Maenghee Sung
    An Improved Method of Multiplication on Certain Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:310-322 [Conf]
  48. Jung Youp Lee, Seok Won Jung, Jongin Lim
    Detecting Trapdoors in Smart Cards Using Timing and Power Analysis. [Citation Graph (0, 0)][DBLP]
    TestCom, 2005, pp:275-288 [Conf]
  49. Donghoon Chang, Jaechul Sung, Soo Hak Sung, Sangjin Lee, Jongin Lim
    Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:160-174 [Conf]
  50. Dong-Guk Han, Ki Soon Yoon, Young-Ho Park, Chang Han Kim, Jongin Lim
    Optimal Extension Fields for XTR. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:369-384 [Conf]
  51. Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim
    An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:144-158 [Conf]
  52. Seokhee Lee, Hyunsang Kim, Sangjin Lee, Jongin Lim
    Digital evidence collection process in integrity and memory information gathering. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:236-247 [Conf]
  53. Kihong Kim, Jinkeun Hong, Jongin Lim
    Sinusoidal Modeling Using Wavelet Packet Transform Applied to the Analysis and Synthesis of Speech Signals. [Citation Graph (0, 0)][DBLP]
    TSD, 2005, pp:241-248 [Conf]
  54. Hyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, Jongin Lim
    Oblivious Conjunctive Keyword Search. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:318-327 [Conf]
  55. Eunjin Lee, Deukjo Hong, Donghoon Chang, Seokhie Hong, Jongin Lim
    A Weak Key Class of XTEA for a Related-Key Rectangle Attack. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:286-297 [Conf]
  56. Kihong Kim, Jinkeun Hong, Jongin Lim
    Approach of the Secure Communication Mechanism in Aero-wireless Environment. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:1070-1075 [Conf]
  57. Jong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, Laurence Tianruo Yang
    Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:1233-1238 [Conf]
  58. Seokhie Hong, Jaechul Sung, Sangjin Lee, Jongin Lim, JongSu Kim
    Provable security for 13 round Skipjack-like structure. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2002, v:82, n:5, pp:243-246 [Journal]
  59. Changho Seo, Jongin Lim, Hichum Eun
    On Comparison and Analysis of Algorithms for Multiplication in GF(2^m). [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 1995, v:51, n:3, pp:456-459 [Journal]
  60. Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi
    Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2006, v:19, n:4, pp:441-462 [Journal]
  61. Chang Han Kim, Sangho Oh, Jongin Lim
    A New Hardware Architecture for Operations in GF(2m). [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2002, v:51, n:1, pp:90-92 [Journal]
  62. Sangho Oh, Chang Han Kim, Jongin Lim, Dong Hyeon Cheon
    Efficient Normal Basis Multipliers in Composite Fields. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2000, v:49, n:10, pp:1133-1138 [Journal]
  63. Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim
    Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:143-157 [Conf]
  64. Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee, Jongin Lim
    Classification of Key Management Schemes for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    APWeb/WAIM Workshops, 2007, pp:664-673 [Conf]
  65. Sung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim
    SPA Countermeasure Based on Unsigned Left-to-Right Recodings. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:286-295 [Conf]
  66. Young-Gab Kim, Dongwon Jeong, Soo-Hyun Park, Jongin Lim, Doo-Kwon Baik
    Modeling and Simulation for Security Risk Propagation in Critical Information Systems. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:858-868 [Conf]
  67. Young-Gab Kim, Jongin Lim
    Quantitative Risk Analysis and Evaluation in Information Systems: A Case Study. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (3), 2007, pp:1040-1047 [Conf]
  68. Sun-Hee Lim, Ki-Seok Bang, Okyeon Yi, Jongin Lim
    A Secure Handover Protocol Design in Wireless Networks with Formal Verification. [Citation Graph (0, 0)][DBLP]
    WWIC, 2007, pp:67-78 [Conf]
  69. HeeSeok Kim, Tae-Hyun Kim, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim, Jongin Lim
    Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:39-52 [Conf]
  70. Young-Gab Kim, Jongin Lim
    HMM-Based Approach for Evaluating Risk Propagation. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:325-326 [Conf]
  71. Hyun-A Park, Dong Hoon Lee, Jongin Lim, Sang Hyun Cho
    PPIDS: Privacy Preserving Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    PAISI, 2007, pp:269-274 [Conf]

  72. Bogus Data Filtering in Sensor Networks. [Citation Graph (, )][DBLP]


  73. A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model. [Citation Graph (, )][DBLP]


  74. An Efficient Key Establishment Scheme for Self-organizing Sensor Networks. [Citation Graph (, )][DBLP]


  75. Improved remote user authentication scheme using bilinear pairings. [Citation Graph (, )][DBLP]


  76. Windows Pagefile Collection and Analysis for a Live Forensics Context. [Citation Graph (, )][DBLP]


  77. A Field Guide to Hidden Accounting Information Detection. [Citation Graph (, )][DBLP]


  78. Impossible differential cryptanalysis using matrix method. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.010secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002