The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Pil Joong Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yong Ho Hwang, Chong Hee Kim, Pil Joong Lee
    An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:377-386 [Conf]
  2. Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee
    EPA: An Efficient Password-Based Protocal for Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:452-463 [Conf]
  3. Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
    TTS without Revocation Capability Secure Against CCA2. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:36-49 [Conf]
  4. Dae Hyun Yum, Pil Joong Lee
    Generic Construction of Certificateless Signature. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:200-211 [Conf]
  5. Pil Joong Lee
    Secure User Access Control for Public Networks. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:46-57 [Conf]
  6. Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
    An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:359-373 [Conf]
  7. Chae Hoon Lim, Pil Joong Lee
    Modified Maurer-Yacobi`s scheme and its applications. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:308-323 [Conf]
  8. Chae Hoon Lim, Pil Joong Lee
    A Study on the Proposed Korean Digital Signature Algorithm. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:175-186 [Conf]
  9. Jae Wook Chung, Sang Gyoo Sim, Pil Joong Lee
    Fast Implementation of Elliptic Curve Defined over GF(pm) on CalmRISC with MAC2424 Coprocessor. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:57-70 [Conf]
  10. Pil Joong Lee, Eun Jeong Lee, Yong Duk Kim
    How to Implement Cost-Effective and Secure Public Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CHES, 1999, pp:73-79 [Conf]
  11. Ernest F. Brickell, Pil Joong Lee, Yacov Yacobi
    Secure Audio Teleconference. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:418-426 [Conf]
  12. Chae Hoon Lim, Pil Joong Lee
    Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:420-434 [Conf]
  13. Chae Hoon Lim, Pil Joong Lee
    More Flexible Exponentiation with Precomputation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:95-107 [Conf]
  14. Chae Hoon Lim, Pil Joong Lee
    Security and Performance of Server-Aided RSA Computation Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:70-83 [Conf]
  15. Chae Hoon Lim, Pil Joong Lee
    A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:249-263 [Conf]
  16. Pil Joong Lee, Ernest F. Brickell
    An Observation on the Security of McEliece's Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:275-280 [Conf]
  17. Chae Hoon Lim, Pil Joong Lee
    Server (Prover/Signer)-Aided Verification of Identity Proofs and Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:64-78 [Conf]
  18. Yong Ho Hwang, Chong Hee Kim, Pil Joong Lee
    An Efficient Revocation Scheme for Stateless Receivers. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:322-334 [Conf]
  19. Dae Hyun Yum, Pil Joong Lee
    Identity-Based Cryptography in Public Key Management. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:71-84 [Conf]
  20. Yong Ho Hwang, Pil Joong Lee
    Efficient Broadcast Encryption Scheme with Log-Key Storage. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:281-295 [Conf]
  21. Yong Ho Hwang, Sang Gyoo Sim, Pil Joong Lee
    Bit-Serial Multipliers for Exponentiation and Division in GF(2m) Using Irreducible AOP. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:442-450 [Conf]
  22. Dae Hyun Yum, Pil Joong Lee
    A Distributed Online Certificate Status Protocol Based on GQ Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:471-480 [Conf]
  23. Dae Hyun Yum, Pil Joong Lee
    Generic Construction of Certificateless Encryption. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:802-811 [Conf]
  24. Sang Gyoo Sim, Dong Jin Park, Pil Joong Lee
    New Power Analysis on the Ha-Moon Algorithm and the MIST Algorithm. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:291-304 [Conf]
  25. Eun Jeong Lee, Duk Soo Kim, Pil Joong Lee
    Speed-up of arithmetics in Fpm for elliptic curve cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:81-91 [Conf]
  26. Dae Hyun Yum, Pil Joong Lee
    New Signcryption Schemes Based on KCDSA. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:305-317 [Conf]
  27. Dae Hyun Yum, Pil Joong Lee
    Separable Implicit Certificate Revocation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:121-136 [Conf]
  28. Dae Hyun Yum, Pil Joong Lee
    Efficient Key Updating Signature Schemes Based on IBS. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:167-182 [Conf]
  29. Nam Yul Yu, Young Kim, Pil Joong Lee
    Iterative Decoding of Product Codes Composed of Extended Hamming Codes. [Citation Graph (0, 0)][DBLP]
    ISCC, 2000, pp:732-737 [Conf]
  30. Jung Wook Lee, Yong Ho Hwang, Pil Joong Lee
    Efficient Public Key Broadcast Encryption Using Identifier of Receivers. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:153-164 [Conf]
  31. Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee
    Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System. [Citation Graph (0, 0)][DBLP]
    ISC, 2005, pp:344-358 [Conf]
  32. Dae Hyun Yum, Jae Eun Kang, Pil Joong Lee
    Advanced Certificate Status Protocol. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:229-240 [Conf]
  33. Chong Hee Kim, Pil Joong Lee
    New Key Recovery in WAKE Protocol. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:325-338 [Conf]
  34. Nan Kyoung Park, Joon Ho Hwang, Pil Joong Lee
    HAS-V: A New Hash Function with Variable Output Length. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:202-216 [Conf]
  35. Chae Hoon Lim, Pil Joong Lee
    Directed Signatures and Application to Threshold Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:131-138 [Conf]
  36. Dong Jin Park, Sang Gyoo Sim, Pil Joong Lee
    Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:474-488 [Conf]
  37. Jong Hoon Shin, Dong Jin Park, Pil Joong Lee
    DPA Attack on the Improved Ha-Moon Algorithm. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:283-291 [Conf]
  38. Dong Jin Park, Kihyun Kim, Pil Joong Lee
    Public Key Encryption with Conjunctive Field Keyword Search. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:73-86 [Conf]
  39. Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee
    Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:264-277 [Conf]
  40. Chae Hoon Lim, Pil Joong Lee
    Several Practical Protocols for Authentication and Key Exchange. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1995, v:53, n:2, pp:91-96 [Journal]
  41. Hyuck M. Kwon, Pil Joong Lee
    Combined Tone and Noise Jamming Against Coded FH/MFSK ECCM Radios. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1990, v:8, n:5, pp:871-883 [Journal]
  42. Pil Joong Lee
    There are many good periodically time-varying convolutional codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1989, v:35, n:2, pp:460-463 [Journal]
  43. Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee
    Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:273-281 [Conf]
  44. Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
    Optimistic Fair Exchange in a Multi-user Setting. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:118-133 [Conf]
  45. Yong Ho Hwang, Pil Joong Lee
    Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System. [Citation Graph (0, 0)][DBLP]
    Pairing, 2007, pp:2-22 [Conf]

  46. Trapdoor Sanitizable Signatures Made Easy. [Citation Graph (, )][DBLP]


  47. On Fast Verification of Hash Chains. [Citation Graph (, )][DBLP]


  48. Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity. [Citation Graph (, )][DBLP]


  49. Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers. [Citation Graph (, )][DBLP]


Search in 0.008secs, Finished in 0.010secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002