The SCEAS System
Navigation Menu

Search the dblp DataBase


Sang-Jae Moon: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Andrew Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon Jae Lee, William Millan, Sang-Jae Moon, Leone Simpson
    The LILI-II Keystream Generator. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:25-39 [Conf]
  2. Hwankoo Kim, Sang-Jae Moon
    New Public-Key Cryptosystem Using Divisor Class Groups. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:74-83 [Conf]
  3. Hwankoo Kim, Sang-Jae Moon
    Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:488-497 [Conf]
  4. Kook-Heui Lee, Sang-Jae Moon
    AKA Protocols for Mobile Communications. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:400-411 [Conf]
  5. Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha
    Permanent Fault Attack on the Parameters of RSA with CRT. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:285-296 [Conf]
  6. Dong Jin Kwak, Sang-Jae Moon
    Efficient Distributed Signcryption Scheme as Group Signcryption. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:403-417 [Conf]
  7. Xinghua Li, Sang-Jae Moon, Jianfeng Ma
    On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:340-348 [Conf]
  8. Dong Jin Kwak, JaeCheol Ha, Hoon Jae Lee, Hwankoo Kim, Sang-Jae Moon
    A WTLS Handshake Protocol with User Anonymity and Forward Secrecy. [Citation Graph (0, 0)][DBLP]
    CDMA International Conference, 2002, pp:219-230 [Conf]
  9. JaeCheol Ha, Sang-Jae Moon
    Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:551-563 [Conf]
  10. Xinghua Li, Jianfeng Ma, Sang-Jae Moon
    On the Security of the Canetti-Krawczyk Model. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:356-363 [Conf]
  11. Fan Zhang, Jianfeng Ma, Sang-Jae Moon
    The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:488-493 [Conf]
  12. Sung-Ming Yen, Dongryeol Kim, Sang-Jae Moon
    Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. [Citation Graph (0, 0)][DBLP]
    FDTC, 2006, pp:53-61 [Conf]
  13. ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, Sung-Ming Yen, Sung-Hyun Kim
    A CRT-Based RSA Countermeasure Against Physical Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    HPCC, 2005, pp:549-554 [Conf]
  14. JaeCheol Ha, ChangKyun Kim, Sang-Jae Moon, IlHwan Park, HyungSo Yoo
    Differential Power Analysis on Block Cipher ARIA. [Citation Graph (0, 0)][DBLP]
    HPCC, 2005, pp:541-548 [Conf]
  15. MahnKi Ahn, JaeCheol Ha, Hoon Jae Lee, Sang-Jae Moon
    A Random M-ary Method Based Countermeasure against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2003, pp:338-347 [Conf]
  16. MyungSik Choi, Dong Jin Kwak, Sang-Jae Moon
    A Proposal for DoS-Defensive Internet Key Exchange. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2003, pp:328-337 [Conf]
  17. ChangKyun Kim, JaeCheol Ha, Sung-Hyun Kim, Seokyu Kim, Sung-Ming Yen, Sang-Jae Moon
    A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:150-158 [Conf]
  18. Hoon Jae Lee, ManKi Ahn, Seongan Lim, Sang-Jae Moon
    A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:517-526 [Conf]
  19. Kevin Chen, Matthew Henricksen, William Millan, Joanne Fuller, Leonie Ruth Simpson, Ed Dawson, Hoon Jae Lee, Sang-Jae Moon
    Dragon: A Fast Word Based Stream Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:33-50 [Conf]
  20. Kook-Heui Lee, Sang-Jae Moon, Won-Young Jeong, Tae-Geun Kim
    A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:156-168 [Conf]
  21. Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, JaeCheol Ha
    Improvement on Ha-Moon Randomized Exponentiation Algorithm. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:154-167 [Conf]
  22. Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
    RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:397-413 [Conf]
  23. Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
    A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:414-427 [Conf]
  24. Sung-Ming Yen, Lee-Chun Ko, Sang-Jae Moon, JaeCheol Ha
    Relative Doubling Attack Against Montgomery Ladder. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:117-128 [Conf]
  25. Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha
    Hardware Fault Attackon RSA with CRT Revisited. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:374-388 [Conf]
  26. JungHoon Ha, Jianying Zhou, Sang-Jae Moon
    A Robust Double Auction Protocol Based on a Hybrid Trust Model. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:77-90 [Conf]
  27. JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon
    How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:290-303 [Conf]
  28. JongMin Jeong, Goo Yeon Lee, Sang-Jae Moon
    Extended Authentication Integrating Scheme for Beyond 3G Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2006, pp:413-423 [Conf]
  29. Guilin Wang, Robert H. Deng, Dong Jin Kwak, Sang-Jae Moon
    Security Analysis of Two Signcryption Schemes. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:123-133 [Conf]
  30. KyungKeun Lee, JoongHyo Oh, Sang-Jae Moon
    How to Generate Universally Verifiable Signatures in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:118-131 [Conf]
  31. Wei Wang, Jianfeng Ma, Sang-Jae Moon
    Efficient Group Key Management for Dynamic Peer Networks. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:753-762 [Conf]
  32. Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha
    Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:183-195 [Conf]
  33. DongGook Park, Colin Boyd, Sang-Jae Moon
    Forward Secrecy and Its Application to Future Mobile Communications Security. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:433-445 [Conf]
  34. Sanggon Lee, Yvonne Hitchcock, Youngho Park, Sangjae Moon
    Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2005, pp:205-220 [Conf]
  35. JungHoon Ha, Jianying Zhou, Sang-Jae Moon
    An Improved Double Auction Protocol Against False Bids. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:274-287 [Conf]
  36. HyungSo Yoo, ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, IlHwan Park
    Side Channel Cryptanalysis on SEED. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:411-424 [Conf]
  37. Dong Jin Kwak, Sang-Jae Moon, Guilin Wang, Robert H. Deng
    A secure extension of the Kwak-Moon group signcryption scheme. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:6, pp:435-444 [Journal]
  38. Dong Jin Kwak, Sang-Jae Moon
    A Distributed Sign-and-Encryption for Anonymity. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:228-230 [Journal]
  39. JaeCheol Ha, Sang-Jae Moon
    A Common-Multiplicand Method to the Montgomery Algorithm for Speeding up Exponentiation. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1998, v:66, n:2, pp:105-107 [Journal]
  40. Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
    RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2003, v:52, n:4, pp:461-472 [Journal]
  41. Hoon Jae Lee, Sang-Jae Moon
    On an improved summation generator with 2-bit memory. [Citation Graph (0, 0)][DBLP]
    Signal Processing, 2000, v:80, n:1, pp:211-217 [Journal]
  42. Wei Wang, Jianfeng Ma, Sang-Jae Moon
    Ternary Tree Based Group Key Management in Dynamic Peer Networks. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:513-522 [Conf]
  43. JeaHoon Park, Hoon Jae Lee, JaeCheol Ha, Yongje Choi, Howon Kim, Sang-Jae Moon
    A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:417-426 [Conf]
  44. Xinghua Li, Jianfeng Ma, Sang-Jae Moon
    Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan. [Citation Graph (0, 0)][DBLP]
    NPC, 2007, pp:306-314 [Conf]
  45. HyungSo Yoo, Christoph Herbst, Stefan Mangard, Elisabeth Oswald, Sang-Jae Moon
    Investigations of Power Analysis Attacks and Countermeasures for ARIA. [Citation Graph (0, 0)][DBLP]
    WISA, 2006, pp:160-172 [Conf]
  46. JaeCheol Ha, JungHoon Ha, Sang-Jae Moon, Colin Boyd
    LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System. [Citation Graph (0, 0)][DBLP]
    ICUCT, 2006, pp:80-89 [Conf]
  47. JungHoon Ha, Jianying Zhou, Sang-Jae Moon
    A secure double auction protocol against false bids. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2007, v:44, n:1, pp:147-158 [Journal]

  48. A New Formal Proof Model for RFID Location Privacy. [Citation Graph (, )][DBLP]

  49. Low-Cost and Strong-Security RFID Authentication Protocol. [Citation Graph (, )][DBLP]

  50. HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System. [Citation Graph (, )][DBLP]

  51. CRMS: A Collusion-Resistant Matrix System for Group Key Management in Wireless Networks. [Citation Graph (, )][DBLP]

  52. Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol. [Citation Graph (, )][DBLP]

  53. Keying material based key pre-distribution scheme. [Citation Graph (, )][DBLP]

  54. Multi-path Protocol for High Data Confidentiality and Reliability in Wireless Sensor Networks Using Non-dominated Dynamic Compensation. [Citation Graph (, )][DBLP]

  55. A pairwise key establishment scheme for heterogeneous sensor networks. [Citation Graph (, )][DBLP]

  56. Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP). [Citation Graph (, )][DBLP]

  57. Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. [Citation Graph (, )][DBLP]

  58. A Security Enhancement of the E0 Cipher in Bluetooth System. [Citation Graph (, )][DBLP]

  59. A new fault cryptanalysis on montgomery ladder exponentiation algorithm. [Citation Graph (, )][DBLP]

  60. Stability analysis of a SEIQV epidemic model for rapid spreading worms. [Citation Graph (, )][DBLP]

Search in 0.005secs, Finished in 0.007secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002