Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 31-40 of 55 (Search time: 0.006 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
31
Fault injection, simple power analysis, and power glitch attacks against FPGA-implemented Xoroshiro128+

Choi, Nakjun; Lee, Jeeun; Kim, Kwangjo, 2019 Symposium on Cryptography and Information Security (SCIS 2019), IEICE Technical Committee on Information Security, 2019-01-23

32
Limitations of privacy-preserving for confidential data training by deep learning

Tanuwidjaja, Harry; Choi, Rakyong; Kim, Kwangjo, 2019 Symposium on Cryptography and Information Security (SCIS 2019), IEICE Technical Committee on Information Security, 2019-01-23

33
Adding authenticity into tree-based group key agreement by public ledger

Han, Seongho; Choi, Rakyong; Kim, Kwangjo, 2019 Symposium on Cryptography and Information Security (SCIS 2019), IEICE Technical Committee on Information Security, 2019-01-23

34
Generic analysis of E-voting protocols by simplified blockchain

Baek, Seunggeun; Lee, Nabi; Kim, Kwangjo, 2019 Symposium on Cryptography and Information Security (SCIS 2019), IEICE Technical Committee on Information Security, 2019-01-23

35
On the power of security reduction in the quantum-accessible random oracle model

Lee, Jeeun; Kim, Kwangjo, 2019 Symposium on Cryptography and Information Security (SCIS 2019), IEICE Technical Committee on Information Security, 2019-01-24

36
DHL: Dynamic key exchange from homomorphic encryption based on lattice

Choi, Rakyong; Kim, Kwangjo, 2019 Symposium on Cryptography and Information Security (SCIS 2019), IEICE Technical Committee on Information Security, 2019-01-24

37
Decentralizing the role of root authority in CP-ABE by the help of blockchain

Hong, Dongyeon; Kim, Kwangjo, 2019 Symposium on Cryptography and Information Security (SCIS 2019), IEICE Technical Committee on Information Security, 2019-01-23

38
A novel non-interactive multi-party key exchange from homomorphic encryption

Choi, Rakyong; Kim, Kwangjo, ProvSec Workshop 2018, Institute of Cybersecurity and Cryptology at the University of Wollongong and the Laboratory of Mobile Internet Security at Soonchunhyang University, 2018-10-25

39
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack

Kobayashi, Yukou; Yanai, Naoto; Yoneyaman, Kazuki; Nishide, Takashi; Hanaoka, Goichiro; Kim, Kwangjo; Okamoto, Eiji, 12th International Conference on Security and Cryptography, SECRYPT 2015, pp.39 - 52, SciTePress, 2015-07-20

40
Identity-based chameleon hash scheme without key exposure

Chen, X.; Zhang, F.; Susilo, W.; Tian, H.; Li, J.; Kim, Kwangjo, 15th Australasian Conference on Information Security and Privacy, ACISP 2010, pp.200 - 215, ACISP 2010, 2010-07-05

rss_1.0 rss_2.0 atom_1.0