|
Search the dblp DataBase
Seongan Lim:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. [Citation Graph (0, 0)][DBLP] Inscrypt, 2006, pp:1-12 [Conf]
- Hoon Jae Lee, ManKi Ahn, Seongan Lim, Sang-Jae Moon
A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2004, pp:517-526 [Conf]
- Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:397-413 [Conf]
- Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:414-427 [Conf]
- Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). [Citation Graph (0, 0)][DBLP] IMA Int. Conf., 2001, pp:114-127 [Conf]
- Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2001, pp:308-315 [Conf]
- Seongan Lim, Seungjoo Kim, Ikkwon Yie, Hongsub Lee
A Generalized Takagi-Cryptosystem with a modulus of the form prqs. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2000, pp:283-294 [Conf]
- Ikkwon Yie, Seongan Lim, Seungjoo Kim, Dongryeol Kim
Prime Numbers of Diffie-Hellman Groups for IKE-MODP. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2003, pp:228-234 [Conf]
- Haeryong Park, Hyun Kim, Kilsoo Chun, Jaeil Lee, Seongan Lim, Ikkwon Yie
Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement. [Citation Graph (0, 0)][DBLP] ITNG, 2007, pp:747-753 [Conf]
- Dongryeol Kim, Seongan Lim
Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2002, pp:13-20 [Conf]
- Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim, Hongsub Lee
XTR Extended to GF(p6m). [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2001, pp:301-312 [Conf]
- Taekyoung Kwon, Seongan Lim
Automation-Considered Logic of Authentication and Key Distribution. [Citation Graph (0, 0)][DBLP] WISA, 2003, pp:442-457 [Conf]
- Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. [Citation Graph (0, 0)][DBLP] IEEE Trans. Computers, 2003, v:52, n:4, pp:461-472 [Journal]
- Haeryong Park, Seongan Lim, Ikkwon Yie, Hyun Kim, Kilsoo Chun, Jaeil Lee
An Information Aggregation Scheme of Multi-node in Ubiquitous Sensor Networks. [Citation Graph (0, 0)][DBLP] ISPA Workshops, 2007, pp:60-68 [Conf]
Search in 0.001secs, Finished in 0.002secs
|