The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Seongan Lim: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun
    Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:1-12 [Conf]
  2. Hoon Jae Lee, ManKi Ahn, Seongan Lim, Sang-Jae Moon
    A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2004, pp:517-526 [Conf]
  3. Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
    RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:397-413 [Conf]
  4. Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
    A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:414-427 [Conf]
  5. Seungjoo Kim, Jung Hee Cheon, Marc Joye, Seongan Lim, Masahiro Mambo, Dongho Won, Yuliang Zheng
    Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation). [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2001, pp:114-127 [Conf]
  6. Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim
    Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:308-315 [Conf]
  7. Seongan Lim, Seungjoo Kim, Ikkwon Yie, Hongsub Lee
    A Generalized Takagi-Cryptosystem with a modulus of the form prqs. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:283-294 [Conf]
  8. Ikkwon Yie, Seongan Lim, Seungjoo Kim, Dongryeol Kim
    Prime Numbers of Diffie-Hellman Groups for IKE-MODP. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:228-234 [Conf]
  9. Haeryong Park, Hyun Kim, Kilsoo Chun, Jaeil Lee, Seongan Lim, Ikkwon Yie
    Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:747-753 [Conf]
  10. Dongryeol Kim, Seongan Lim
    Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:13-20 [Conf]
  11. Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim, Hongsub Lee
    XTR Extended to GF(p6m). [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:301-312 [Conf]
  12. Taekyoung Kwon, Seongan Lim
    Automation-Considered Logic of Authentication and Key Distribution. [Citation Graph (0, 0)][DBLP]
    WISA, 2003, pp:442-457 [Conf]
  13. Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
    RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2003, v:52, n:4, pp:461-472 [Journal]
  14. Haeryong Park, Seongan Lim, Ikkwon Yie, Hyun Kim, Kilsoo Chun, Jaeil Lee
    An Information Aggregation Scheme of Multi-node in Ubiquitous Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ISPA Workshops, 2007, pp:60-68 [Conf]

Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002