Showing results 1 to 5 of 5
IMPERSONATION ATTACK ON THE STRONG IDENTIFICATION BASED ON A HARD-ON-AVERAGE PROBLEM Koo, Bonwook; Kwon, Daesung; Lee, Jooyoung; Song, Jung Hwan, BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, v.47, no.1, pp.63 - 71, 2010-01 |
Security of permutation-based compression function lp231 Lee, Jooyoung; Kwon, Daesung, INFORMATION PROCESSING LETTERS, v.114, no.7, pp.372 - 381, 2014-07 |
The Security of Abreast-DM in the Ideal Cipher Model Lee, Jooyoung; Kwon, Daesung, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E94A, no.1, pp.104 - 109, 2011-01 |
Tree-based key predistribution for wireless sensor networks Lee, Jooyoung; Kwon, Daesung, WIRELESS NETWORKS, v.15, no.8, pp.1140 - 1151, 2009-11 |
Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005 Kwon, Daesung; Han, Daewan; Lee, Jooyoung; Yeom, Yongjin, LECTURE NOTES IN COMPUTER SCIENCE, v.4097, pp.262 - 270, 2006 |
Discover