The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jung Hee Cheon: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hae Young Kim, Jung Youl Park, Jung Hee Cheon, Je Hong Park, Jae Heon Kim, Sang Geun Hahn
    Fast Elliptic Curve Point Counting Using Gaussian Normal Basis. [Citation Graph (0, 0)][DBLP]
    ANTS, 2002, pp:292-307 [Conf]
  2. Jae Choon Cha, Ki Hyoung Ko, Sangjin Lee, Jae Woo Han, Jung Hee Cheon
    An Efficient Implementation of Braid Groups. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:144-156 [Conf]
  3. Jung Hee Cheon
    Nonlinear Vector Resilient Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:458-469 [Conf]
  4. Jung Hee Cheon, Byungheup Jun
    A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:212-225 [Conf]
  5. Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo Han, Ju-Sung Kang, Choonsik Park
    New Public-Key Cryptosystem Using Braid Groups. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:166-183 [Conf]
  6. Jung-Yeun Lee, Jung Hee Cheon, Seungjoo Kim
    An Analysis of Proxy Signatures: Is a Secure Channel Necessary? [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:68-79 [Conf]
  7. Nam-Su Jho, Eun Sun Yoo, Jung Hee Cheon, Myung-Hwan Kim
    New broadcast encryption scheme using tree-based circle. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2005, pp:37-44 [Conf]
  8. Jung Hee Cheon
    Security Analysis of the Strong Diffie-Hellman Problem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:1-11 [Conf]
  9. Jung Hee Cheon, Seongtaek Chee, Choonsik Park
    S-boxes with Controllable Nonlinearity. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:286-294 [Conf]
  10. Nam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo
    One-Way Chain Based Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:559-574 [Conf]
  11. Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov
    Timed-Release and Key-Insulated Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:191-205 [Conf]
  12. Jung Hee Cheon, Dong Hoon Lee
    Resistance of S-Boxes against Algebraic Attacks. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:83-94 [Conf]
  13. Dang Nguyen Duc, Jung Hee Cheon, Kwangjo Kim
    A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:11-21 [Conf]
  14. Jung Hee Cheon, Seongtaek Chee
    Elliptic Curves and Resilient Functions. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:64-72 [Conf]
  15. Jung Hee Cheon, MunJu Kim, Kwangjo Kim, Jung-Yeun Lee, SungWoo Kang
    Improved Impossible Differential Cryptanalysis of Rijndael and Crypton. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:39-49 [Conf]
  16. Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim
    Efficient Broadcast Encryption Using Multiple Interpolation Methods. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:87-103 [Conf]
  17. HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
    Batch Verifications with ID-Based Signatures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:233-248 [Conf]
  18. Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng
    Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:114-127 [Conf]
  19. Jae Choon Cha, Jung Hee Cheon
    An Identity-Based Signature from Gap Diffie-Hellman Groups. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:18-30 [Conf]
  20. Jung Hee Cheon, Sung-Mo Park, Sangwoo Park, Daeho Kim
    Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:195-202 [Conf]
  21. Jung Hee Cheon, Woo-Hwan Kim, Hyun Soo Nam
    Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2006, v:97, n:3, pp:118-123 [Journal]
  22. Jung Hee Cheon, Seongtaek Chee
    Nonlinearity of Boolean Functions and Hyperelliptic Curves. [Citation Graph (0, 0)][DBLP]
    SIAM J. Discrete Math., 2003, v:16, n:3, pp:354-365 [Journal]
  23. Jung Hee Cheon, Dong Hoon Lee
    Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2006, v:55, n:12, pp:1536-1542 [Journal]
  24. Jung Hee Cheon, Jeong Hyun Yi
    Fast Batch Verification of Multiple Signatures. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:442-457 [Conf]
  25. Taekyoung Kwon, Jung Hee Cheon, Yongdae Kim, Jaeil Lee
    Privacy Protection in PKIs: A Separation-of-Authority Approach. [Citation Graph (0, 0)][DBLP]
    WISA, 2006, pp:297-311 [Conf]

  26. Speeding Up the Pollard Rho Method on Prime Fields. [Citation Graph (, )][DBLP]


  27. Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. [Citation Graph (, )][DBLP]


  28. A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents. [Citation Graph (, )][DBLP]


  29. Subset-Restricted Random Walks for Pollard rho Method on Fpm. [Citation Graph (, )][DBLP]


  30. Analysis of Low Hamming Weight Products. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002