Search the dblp DataBase
Pil Joong Lee :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yong Ho Hwang , Chong Hee Kim , Pil Joong Lee An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:377-386 [Conf ] Yong Ho Hwang , Dae Hyun Yum , Pil Joong Lee EPA: An Efficient Password-Based Protocal for Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:452-463 [Conf ] Chong Hee Kim , Yong Ho Hwang , Pil Joong Lee TTS without Revocation Capability Secure Against CCA2. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:36-49 [Conf ] Dae Hyun Yum , Pil Joong Lee Generic Construction of Certificateless Signature. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:200-211 [Conf ] Pil Joong Lee Secure User Access Control for Public Networks. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:46-57 [Conf ] Chong Hee Kim , Yong Ho Hwang , Pil Joong Lee An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:359-373 [Conf ] Chae Hoon Lim , Pil Joong Lee Modified Maurer-Yacobi`s scheme and its applications. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:308-323 [Conf ] Chae Hoon Lim , Pil Joong Lee A Study on the Proposed Korean Digital Signature Algorithm. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:175-186 [Conf ] Jae Wook Chung , Sang Gyoo Sim , Pil Joong Lee Fast Implementation of Elliptic Curve Defined over GF(p m ) on CalmRISC with MAC2424 Coprocessor. [Citation Graph (0, 0)][DBLP ] CHES, 2000, pp:57-70 [Conf ] Pil Joong Lee , Eun Jeong Lee , Yong Duk Kim How to Implement Cost-Effective and Secure Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] CHES, 1999, pp:73-79 [Conf ] Ernest F. Brickell , Pil Joong Lee , Yacov Yacobi Secure Audio Teleconference. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:418-426 [Conf ] Chae Hoon Lim , Pil Joong Lee Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:420-434 [Conf ] Chae Hoon Lim , Pil Joong Lee More Flexible Exponentiation with Precomputation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:95-107 [Conf ] Chae Hoon Lim , Pil Joong Lee Security and Performance of Server-Aided RSA Computation Protocols. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:70-83 [Conf ] Chae Hoon Lim , Pil Joong Lee A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1997, pp:249-263 [Conf ] Pil Joong Lee , Ernest F. Brickell An Observation on the Security of McEliece's Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:275-280 [Conf ] Chae Hoon Lim , Pil Joong Lee Server (Prover/Signer)-Aided Verification of Identity Proofs and Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:64-78 [Conf ] Yong Ho Hwang , Chong Hee Kim , Pil Joong Lee An Efficient Revocation Scheme for Stateless Receivers. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2004, pp:322-334 [Conf ] Dae Hyun Yum , Pil Joong Lee Identity-Based Cryptography in Public Key Management. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2004, pp:71-84 [Conf ] Yong Ho Hwang , Pil Joong Lee Efficient Broadcast Encryption Scheme with Log-Key Storage. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2006, pp:281-295 [Conf ] Yong Ho Hwang , Sang Gyoo Sim , Pil Joong Lee Bit-Serial Multipliers for Exponentiation and Division in GF(2m ) Using Irreducible AOP. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:442-450 [Conf ] Dae Hyun Yum , Pil Joong Lee A Distributed Online Certificate Status Protocol Based on GQ Signature Scheme. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:471-480 [Conf ] Dae Hyun Yum , Pil Joong Lee Generic Construction of Certificateless Encryption. [Citation Graph (0, 0)][DBLP ] ICCSA (1), 2004, pp:802-811 [Conf ] Sang Gyoo Sim , Dong Jin Park , Pil Joong Lee New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:291-304 [Conf ] Eun Jeong Lee , Duk Soo Kim , Pil Joong Lee Speed-up of arithmetics in Fp m for elliptic curve cryptosystems. [Citation Graph (0, 0)][DBLP ] ICISC, 1998, pp:81-91 [Conf ] Dae Hyun Yum , Pil Joong Lee New Signcryption Schemes Based on KCDSA. [Citation Graph (0, 0)][DBLP ] ICISC, 2001, pp:305-317 [Conf ] Dae Hyun Yum , Pil Joong Lee Separable Implicit Certificate Revocation. [Citation Graph (0, 0)][DBLP ] ICISC, 2004, pp:121-136 [Conf ] Dae Hyun Yum , Pil Joong Lee Efficient Key Updating Signature Schemes Based on IBS. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:167-182 [Conf ] Nam Yul Yu , Young Kim , Pil Joong Lee Iterative Decoding of Product Codes Composed of Extended Hamming Codes. [Citation Graph (0, 0)][DBLP ] ISCC, 2000, pp:732-737 [Conf ] Jung Wook Lee , Yong Ho Hwang , Pil Joong Lee Efficient Public Key Broadcast Encryption Using Identifier of Receivers. [Citation Graph (0, 0)][DBLP ] ISPEC, 2006, pp:153-164 [Conf ] Yong Ho Hwang , Dae Hyun Yum , Pil Joong Lee Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System. [Citation Graph (0, 0)][DBLP ] ISC, 2005, pp:344-358 [Conf ] Dae Hyun Yum , Jae Eun Kang , Pil Joong Lee Advanced Certificate Status Protocol. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:229-240 [Conf ] Chong Hee Kim , Pil Joong Lee New Key Recovery in WAKE Protocol. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:325-338 [Conf ] Nan Kyoung Park , Joon Ho Hwang , Pil Joong Lee HAS-V: A New Hash Function with Variable Output Length. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2000, pp:202-216 [Conf ] Chae Hoon Lim , Pil Joong Lee Directed Signatures and Application to Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1996, pp:131-138 [Conf ] Dong Jin Park , Sang Gyoo Sim , Pil Joong Lee Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves. [Citation Graph (0, 0)][DBLP ] WISA, 2003, pp:474-488 [Conf ] Jong Hoon Shin , Dong Jin Park , Pil Joong Lee DPA Attack on the Improved Ha-Moon Algorithm. [Citation Graph (0, 0)][DBLP ] WISA, 2005, pp:283-291 [Conf ] Dong Jin Park , Kihyun Kim , Pil Joong Lee Public Key Encryption with Conjunctive Field Keyword Search. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:73-86 [Conf ] Chong Hee Kim , Yong Ho Hwang , Pil Joong Lee Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:264-277 [Conf ] Chae Hoon Lim , Pil Joong Lee Several Practical Protocols for Authentication and Key Exchange. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1995, v:53, n:2, pp:91-96 [Journal ] Hyuck M. Kwon , Pil Joong Lee Combined Tone and Noise Jamming Against Coded FH/MFSK ECCM Radios. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1990, v:8, n:5, pp:871-883 [Journal ] Pil Joong Lee There are many good periodically time-varying convolutional codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1989, v:35, n:2, pp:460-463 [Journal ] Chong Hee Kim , Jong Hoon Shin , Jean-Jacques Quisquater , Pil Joong Lee Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. [Citation Graph (0, 0)][DBLP ] ICISC, 2007, pp:273-281 [Conf ] Yevgeniy Dodis , Pil Joong Lee , Dae Hyun Yum Optimistic Fair Exchange in a Multi-user Setting. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:118-133 [Conf ] Yong Ho Hwang , Pil Joong Lee Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System. [Citation Graph (0, 0)][DBLP ] Pairing, 2007, pp:2-22 [Conf ] Trapdoor Sanitizable Signatures Made Easy. [Citation Graph (, )][DBLP ] On Fast Verification of Hash Chains. [Citation Graph (, )][DBLP ] Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity. [Citation Graph (, )][DBLP ] Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers. [Citation Graph (, )][DBLP ] Search in 0.008secs, Finished in 0.011secs