The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chong Hee Kim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yong Ho Hwang, Chong Hee Kim, Pil Joong Lee
    An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:377-386 [Conf]
  2. Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
    TTS without Revocation Capability Secure Against CCA2. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:36-49 [Conf]
  3. Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
    An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:359-373 [Conf]
  4. Yong Ho Hwang, Chong Hee Kim, Pil Joong Lee
    An Efficient Revocation Scheme for Stateless Receivers. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:322-334 [Conf]
  5. Chong Hee Kim, Pil Joong Lee
    New Key Recovery in WAKE Protocol. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:325-338 [Conf]
  6. Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
    Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:264-277 [Conf]
  7. Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee
    Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:273-281 [Conf]
  8. Chong Hee Kim, Jean-Jacques Quisquater
    Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:215-228 [Conf]

  9. RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. [Citation Graph (, )][DBLP]


  10. New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough. [Citation Graph (, )][DBLP]


  11. Fault Attacks on Public Key Elements: Application to DLP-Based Schemes. [Citation Graph (, )][DBLP]


  12. How can we overcome both side channel analysis and fault attacks on RSA-CRT? [Citation Graph (, )][DBLP]


  13. Method for Detecting Vulnerability to Doubling Attacks. [Citation Graph (, )][DBLP]


  14. The Swiss-Knife RFID Distance Bounding Protocol. [Citation Graph (, )][DBLP]


  15. A Probing Attack on AES. [Citation Graph (, )][DBLP]


  16. Faults, Injection Methods, and Fault Attacks. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002