Search the dblp DataBase
Kwangjo Kim :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Joonsang Baek , Byoungcheon Lee , Kwangjo Kim Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:49-58 [Conf ] Myungsun Kim , Kwangjo Kim A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:362-378 [Conf ] Arvind Narayanan , C. Pandu Rangan , Kwangjo Kim Practical Pay TV Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:192-203 [Conf ] Byoungcheon Lee , Heesun Kim , Kwangjo Kim Secure Mobile Agent Using Strong Non-designated Proxy Signature. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:474- [Conf ] SungJun Min , Go Yamamoto , Kwangjo Kim Weak Property of Malleability in NTRUSign. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:379-390 [Conf ] Fangguo Zhang , Kwangjo Kim Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:312-323 [Conf ] Fangguo Zhang , Shengli Liu , Kwangjo Kim Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:203-213 [Conf ] Xiaofeng Chen , Fangguo Zhang , Kwangjo Kim Limited Verifier Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:135-148 [Conf ] Sangwon Lee , Yongdae Kim , Kwangjo Kim , Dae-Hyun Ryu An Efficient Tree-Based Group Key Agreement Using Bilinear Map. [Citation Graph (0, 0)][DBLP ] ACNS, 2003, pp:357-371 [Conf ] Byoungcheon Lee , Colin Boyd , Ed Dawson , Kwangjo Kim , Jeongmo Yang , Seungjae Yoo Secure Key Issuing in ID-based Cryptography. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2004, pp:69-74 [Conf ] Kwangjo Kim Construction of DES-like S-boxes Based on Boolean Functions Satisfyieng the SAC. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:59-72 [Conf ] Seongtaek Chee , Sangjin Lee , Kwangjo Kim Semi-bent Functions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:107-118 [Conf ] Fangguo Zhang , Kwangjo Kim ID-Based Blind Signature and Ring Signature from Pairings. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:533-547 [Conf ] Kwangjo Kim , Tsutomu Matsumoto , Hideki Imai A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:564-574 [Conf ] Youngjoon Seo , Hyunrok Lee , Kwangjo Kim A Scalable and Untraceable Authentication Protocol for RFID. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2006, pp:252-261 [Conf ] Songwon Lee , Kyusuk Han , Seok-kyu Kang , Kwangjo Kim , So Ran Ine Threshold Password-Based Authentication Using Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2004, pp:350-363 [Conf ] Myungsun Kim , Jongseong Kim , Kwangjo Kim Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:97-108 [Conf ] Dang Nguyen Duc , Jung Hee Cheon , Kwangjo Kim A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:11-21 [Conf ] Sangjoon Park , Sangwoo Park , Kwangjo Kim , Dongho Won Two efficient RSA multisignature schemes. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:217-222 [Conf ] Yan Xie , Fangguo Zhang , Xiaofeng Chen , Kwangjo Kim ID-Based Distributed "Magic Ink" Signature from Pairings. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:249-259 [Conf ] Duc-Liem Vo , Kwangjo Kim Yet Another Forward Secure Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:441-455 [Conf ] Jinho Kim , Kwangjo Kim , Chulsoo Lee An Efficient and Provably Secure Threshold Blind Signature. [Citation Graph (0, 0)][DBLP ] ICISC, 2001, pp:318-327 [Conf ] Xiaofeng Chen , Byoungcheon Lee , Kwangjo Kim Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. [Citation Graph (0, 0)][DBLP ] ICISC, 2003, pp:259-273 [Conf ] Jung Hee Cheon , MunJu Kim , Kwangjo Kim , Jung-Yeun Lee , SungWoo Kang Improved Impossible Differential Cryptanalysis of Rijndael and Crypton. [Citation Graph (0, 0)][DBLP ] ICISC, 2001, pp:39-49 [Conf ] Divyan M. Konidala , Kwangjo Kim Mobile RFID Applications and Security Challenges. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:194-205 [Conf ] Byoungcheon Lee , Colin Boyd , Ed Dawson , Kwangjo Kim , Jeongmo Yang , Seungjae Yoo Providing Receipt-Freeness in Mixnet-Based Voting Protocols. [Citation Graph (0, 0)][DBLP ] ICISC, 2003, pp:245-258 [Conf ] Byoungcheon Lee , Kwangjo Kim Secure Matchmaking Protocol. [Citation Graph (0, 0)][DBLP ] ICISC, 2000, pp:123-134 [Conf ] Byoungcheon Lee , Kwangjo Kim Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:389-406 [Conf ] Moonseog Seo , Kwangjo Kim Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:269-277 [Conf ] Kwangjo Kim , Sangjoon Park , Joonsang Baek Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation Protocol. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 1999, pp:140-145 [Conf ] Byoungcheon Lee , Kwangjo Kim Self-certified Signatures. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2002, pp:199-214 [Conf ] Byoungcheon Lee , Kwangjo Kim , Joongsoo Ma Efficient Public Auction with One-Time Registration and Public Verifiability. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:162-174 [Conf ] Xiaofeng Chen , Fangguo Zhang , Divyan M. Konidala , Kwangjo Kim New ID-Based Threshold Signature Scheme from Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:371-383 [Conf ] Boyeon Song , Kwangjo Kim Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:237-249 [Conf ] V. Vinod , Arvind Narayanan , K. Srinathan , C. Pandu Rangan , Kwangjo Kim On the Power of Computational Secret Sharing. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2003, pp:162-176 [Conf ] Xiaofeng Chen , Fangguo Zhang , Kwangjo Kim Chameleon Hashing Without Key Exposure. [Citation Graph (0, 0)][DBLP ] ISC, 2004, pp:87-98 [Conf ] Divyan M. Konidala , Dang Nguyen Duc , Dongman Lee , Kwangjo Kim A Capability-Based Privacy-Preserving Scheme for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP ] PerCom Workshops, 2005, pp:136-140 [Conf ] Gookwhan Ahn , Kwangjo Kim , Hee Yong Youn Tapping Alert Protocol. [Citation Graph (0, 0)][DBLP ] WETICE, 2000, pp:159-164 [Conf ] Kui Ren , Hyunrok Lee , Kwangjo Kim , Taewhan Yoo Efficient Authenticated Key Agreement Protocol for Dynamic Groups. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:144-159 [Conf ] SuGil Choi , Kwangjo Kim , ByeongGon Kim Practical Solution for Location Privacy in Mobile IPv6. [Citation Graph (0, 0)][DBLP ] WISA, 2003, pp:69-83 [Conf ] Kui Ren , Tieyan Li , Zhiguo Wan , Feng Bao , Robert H. Deng , Kwangjo Kim Highly reliable trust establishment scheme in ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2004, v:45, n:6, pp:687-699 [Journal ] Sung-Mo Park , Sangjin Lee , Soo Hak Sung , Kwangjo Kim Improving Bounds for the Number of Correlation Immune Boolean Functions. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1997, v:61, n:4, pp:209-212 [Journal ] Jangseong Kim , Zeen Kim , Kwangjo Kim A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP ] ICISC, 2007, pp:37-48 [Conf ] Jin Li , Kwangjo Kim , Fangguo Zhang , Xiaofeng Chen Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature. [Citation Graph (0, 0)][DBLP ] ProvSec, 2007, pp:208-217 [Conf ] Jin Li , Tsz Hon Yuen , Kwangjo Kim Practical Threshold Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP ] ProvSec, 2007, pp:198-207 [Conf ] Generic Security-Amplifying Methods of Ordinary Digital Signatures. [Citation Graph (, )][DBLP ] Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy. [Citation Graph (, )][DBLP ] Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups. [Citation Graph (, )][DBLP ] Forward Secure ID-Based Group Key Agreement Protocol with Anonymity. [Citation Graph (, )][DBLP ] Search in 0.016secs, Finished in 0.018secs