The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Okyeon Yi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ju-Sung Kang, Okyeon Yi, Dowon Hong, Hyunsook Cho
    Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:60-73 [Conf]
  2. Heajoung Yoo, Seokhie Hong, Sangjin Lee, Jong In Lim, Okyeon Yi, Maenghee Sung
    A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:41-48 [Conf]
  3. Ju-Sung Kang, Sang Uk Shin, Dowon Hong, Okyeon Yi
    Provable Security of KASUMI and 3GPP Encryption Mode f8. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:255-271 [Conf]
  4. Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi
    Known-IV Attacks on Triple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:208-221 [Conf]
  5. Jaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi
    Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:103-113 [Conf]
  6. Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi
    Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2006, v:19, n:4, pp:441-462 [Journal]
  7. Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Miae Park, Okyeon Yi
    Fingerprint Template Protection Using Fuzzy Vault. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2007, pp:1141-1151 [Conf]
  8. Daesung Moon, Sungju Lee, Seunghwan Jung, Yongwha Chung, Okyeon Yi, Namil Lee, Kiyoung Moon
    Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords. [Citation Graph (0, 0)][DBLP]
    WISA, 2006, pp:100-109 [Conf]
  9. Sun-Hee Lim, Ki-Seok Bang, Okyeon Yi, Jongin Lim
    A Secure Handover Protocol Design in Wireless Networks with Formal Verification. [Citation Graph (0, 0)][DBLP]
    WWIC, 2007, pp:67-78 [Conf]

  10. A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002