The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kwangjo Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Joonsang Baek, Byoungcheon Lee, Kwangjo Kim
    Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:49-58 [Conf]
  2. Myungsun Kim, Kwangjo Kim
    A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:362-378 [Conf]
  3. Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim
    Practical Pay TV Schemes. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:192-203 [Conf]
  4. Byoungcheon Lee, Heesun Kim, Kwangjo Kim
    Secure Mobile Agent Using Strong Non-designated Proxy Signature. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:474- [Conf]
  5. SungJun Min, Go Yamamoto, Kwangjo Kim
    Weak Property of Malleability in NTRUSign. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:379-390 [Conf]
  6. Fangguo Zhang, Kwangjo Kim
    Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:312-323 [Conf]
  7. Fangguo Zhang, Shengli Liu, Kwangjo Kim
    Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:203-213 [Conf]
  8. Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
    Limited Verifier Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:135-148 [Conf]
  9. Sangwon Lee, Yongdae Kim, Kwangjo Kim, Dae-Hyun Ryu
    An Efficient Tree-Based Group Key Agreement Using Bilinear Map. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:357-371 [Conf]
  10. Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo
    Secure Key Issuing in ID-based Cryptography. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2004, pp:69-74 [Conf]
  11. Kwangjo Kim
    Construction of DES-like S-boxes Based on Boolean Functions Satisfyieng the SAC. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:59-72 [Conf]
  12. Seongtaek Chee, Sangjin Lee, Kwangjo Kim
    Semi-bent Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:107-118 [Conf]
  13. Fangguo Zhang, Kwangjo Kim
    ID-Based Blind Signature and Ring Signature from Pairings. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:533-547 [Conf]
  14. Kwangjo Kim, Tsutomu Matsumoto, Hideki Imai
    A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:564-574 [Conf]
  15. Youngjoon Seo, Hyunrok Lee, Kwangjo Kim
    A Scalable and Untraceable Authentication Protocol for RFID. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:252-261 [Conf]
  16. Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Kim, So Ran Ine
    Threshold Password-Based Authentication Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:350-363 [Conf]
  17. Myungsun Kim, Jongseong Kim, Kwangjo Kim
    Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:97-108 [Conf]
  18. Dang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim
    A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:11-21 [Conf]
  19. Sangjoon Park, Sangwoo Park, Kwangjo Kim, Dongho Won
    Two efficient RSA multisignature schemes. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:217-222 [Conf]
  20. Yan Xie, Fangguo Zhang, Xiaofeng Chen, Kwangjo Kim
    ID-Based Distributed "Magic Ink" Signature from Pairings. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:249-259 [Conf]
  21. Duc-Liem Vo, Kwangjo Kim
    Yet Another Forward Secure Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:441-455 [Conf]
  22. Jinho Kim, Kwangjo Kim, Chulsoo Lee
    An Efficient and Provably Secure Threshold Blind Signature. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:318-327 [Conf]
  23. Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim
    Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:259-273 [Conf]
  24. Jung Hee Cheon, MunJu Kim, Kwangjo Kim, Jung-Yeun Lee, SungWoo Kang
    Improved Impossible Differential Cryptanalysis of Rijndael and Crypton. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:39-49 [Conf]
  25. Divyan M. Konidala, Kwangjo Kim
    Mobile RFID Applications and Security Challenges. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:194-205 [Conf]
  26. Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo
    Providing Receipt-Freeness in Mixnet-Based Voting Protocols. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:245-258 [Conf]
  27. Byoungcheon Lee, Kwangjo Kim
    Secure Matchmaking Protocol. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:123-134 [Conf]
  28. Byoungcheon Lee, Kwangjo Kim
    Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:389-406 [Conf]
  29. Moonseog Seo, Kwangjo Kim
    Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:269-277 [Conf]
  30. Kwangjo Kim, Sangjoon Park, Joonsang Baek
    Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:140-145 [Conf]
  31. Byoungcheon Lee, Kwangjo Kim
    Self-certified Signatures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:199-214 [Conf]
  32. Byoungcheon Lee, Kwangjo Kim, Joongsoo Ma
    Efficient Public Auction with One-Time Registration and Public Verifiability. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:162-174 [Conf]
  33. Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim
    New ID-Based Threshold Signature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:371-383 [Conf]
  34. Boyeon Song, Kwangjo Kim
    Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:237-249 [Conf]
  35. V. Vinod, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim
    On the Power of Computational Secret Sharing. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:162-176 [Conf]
  36. Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
    Chameleon Hashing Without Key Exposure. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:87-98 [Conf]
  37. Divyan M. Konidala, Dang Nguyen Duc, Dongman Lee, Kwangjo Kim
    A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2005, pp:136-140 [Conf]
  38. Gookwhan Ahn, Kwangjo Kim, Hee Yong Youn
    Tapping Alert Protocol. [Citation Graph (0, 0)][DBLP]
    WETICE, 2000, pp:159-164 [Conf]
  39. Kui Ren, Hyunrok Lee, Kwangjo Kim, Taewhan Yoo
    Efficient Authenticated Key Agreement Protocol for Dynamic Groups. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:144-159 [Conf]
  40. SuGil Choi, Kwangjo Kim, ByeongGon Kim
    Practical Solution for Location Privacy in Mobile IPv6. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:69-83 [Conf]
  41. Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H. Deng, Kwangjo Kim
    Highly reliable trust establishment scheme in ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2004, v:45, n:6, pp:687-699 [Journal]
  42. Sung-Mo Park, Sangjin Lee, Soo Hak Sung, Kwangjo Kim
    Improving Bounds for the Number of Correlation Immune Boolean Functions. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1997, v:61, n:4, pp:209-212 [Journal]
  43. Jangseong Kim, Zeen Kim, Kwangjo Kim
    A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:37-48 [Conf]
  44. Jin Li, Kwangjo Kim, Fangguo Zhang, Xiaofeng Chen
    Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature. [Citation Graph (0, 0)][DBLP]
    ProvSec, 2007, pp:208-217 [Conf]
  45. Jin Li, Tsz Hon Yuen, Kwangjo Kim
    Practical Threshold Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ProvSec, 2007, pp:198-207 [Conf]

  46. Generic Security-Amplifying Methods of Ordinary Digital Signatures. [Citation Graph (, )][DBLP]


  47. Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy. [Citation Graph (, )][DBLP]


  48. Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups. [Citation Graph (, )][DBLP]


  49. Forward Secure ID-Based Group Key Agreement Protocol with Anonymity. [Citation Graph (, )][DBLP]


Search in 0.007secs, Finished in 0.010secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002