Results 31-40 of 55 (Search time: 0.004 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Fault injection, simple power analysis, and power glitch attacks against FPGA-implemented Xoroshiro128+ Choi, Nakjun; Lee, Jeeun; Kim, Kwangjo, 2019 Symposium on Cryptography and Information Security (SCIS 2019), IEICE Technical Committee on Information Security, 2019-01-23 | |
Limitations of privacy-preserving for confidential data training by deep learning Tanuwidjaja, Harry; Choi, Rakyong; Kim, Kwangjo, 2019 Symposium on Cryptography and Information Security (SCIS 2019), IEICE Technical Committee on Information Security, 2019-01-23 | |
Adding authenticity into tree-based group key agreement by public ledger Han, Seongho; Choi, Rakyong; Kim, Kwangjo, 2019 Symposium on Cryptography and Information Security (SCIS 2019), IEICE Technical Committee on Information Security, 2019-01-23 | |
Generic analysis of E-voting protocols by simplified blockchain Baek, Seunggeun; Lee, Nabi; Kim, Kwangjo, 2019 Symposium on Cryptography and Information Security (SCIS 2019), IEICE Technical Committee on Information Security, 2019-01-23 | |
On the power of security reduction in the quantum-accessible random oracle model Lee, Jeeun; Kim, Kwangjo, 2019 Symposium on Cryptography and Information Security (SCIS 2019), IEICE Technical Committee on Information Security, 2019-01-24 | |
DHL: Dynamic key exchange from homomorphic encryption based on lattice Choi, Rakyong; Kim, Kwangjo, 2019 Symposium on Cryptography and Information Security (SCIS 2019), IEICE Technical Committee on Information Security, 2019-01-24 | |
Decentralizing the role of root authority in CP-ABE by the help of blockchain Hong, Dongyeon; Kim, Kwangjo, 2019 Symposium on Cryptography and Information Security (SCIS 2019), IEICE Technical Committee on Information Security, 2019-01-23 | |
A novel non-interactive multi-party key exchange from homomorphic encryption Choi, Rakyong; Kim, Kwangjo, ProvSec Workshop 2018, Institute of Cybersecurity and Cryptology at the University of Wollongong and the Laboratory of Mobile Internet Security at Soonchunhyang University, 2018-10-25 | |
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack Kobayashi, Yukou; Yanai, Naoto; Yoneyaman, Kazuki; Nishide, Takashi; Hanaoka, Goichiro; Kim, Kwangjo; Okamoto, Eiji, 12th International Conference on Security and Cryptography, SECRYPT 2015, pp.39 - 52, SciTePress, 2015-07-20 | |
Identity-based chameleon hash scheme without key exposure Chen, X.; Zhang, F.; Susilo, W.; Tian, H.; Li, J.; Kim, Kwangjo, 15th Australasian Conference on Information Security and Privacy, ACISP 2010, pp.200 - 215, ACISP 2010, 2010-07-05 |