Results 1-10 of 53 (Search time: 0.004 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Anonymous fingerprinting as secure as the bilinear Diffie-Hellman assumption Kim, Myungsun; Kim, Jongseong; Kim, Kwangjo, INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2513, pp.97 - 108, 2002 | |
Self-certified signatures Lee, Byoungcheon; Kim, Kwangjo, PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2551, pp.199 - 214, 2002-12 | |
The ring authenticated encryption scheme - How to provide a clue wisely Lv, Jiqiang; Ren, Kui; Chen, Xiaofeng; Kim, Kwangjo, INFORMATION SCIENCES, v.179, no.1-2, pp.161 - 168, 2009-01 | |
ID-based distributed "magic ink" signature from pairings Xie, Yan; Zhang, Fangguo; Chen, Xiaofeng; Kim, Kwangjo, INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2836, pp.249 - 259, 2003 | |
Weak property of malleability in NTRUSign Min, S; Yamamoto, G; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3108, pp.379 - 390, 2004 | |
Efficient ID-based blind signature and proxy signature from bilinear pairings Zhang, Fangguo; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2727, pp.312 - 323, 2003 | |
Improved Impossible Differential Cryptanaylsis of Rijndael and Crypton Cheon, Jung Hee; Kim, MunJu; Lee, Jung-Yeun; Kim, Kwangjo; Kang, SungWoo, LECTURE NOTES IN COMPUTER SCIENCE, v.2288, no.0, pp.39 - 49, 2002-12 | |
Efficient Public Auction with One-Time Registration and Public Verifiability Byoungcheon Lee; Kim, Kwangjo; Ma, JoongSoo, LECTURE NOTES IN COMPUTER SCIENCE, v.2247, no.0, pp.162 - 174, 2001-12 | |
Providing receipt-freeness in mixnet-based voting protocols Lee, B; Boyd, C; Dawson, E; Kim, Kwangjo; Yang, J; Yoo, S, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2971, pp.245 - 258, 2004 | |
An efficient tree-based group key agreement using bilinear map Lee, Sangwon; Kim, Yongdae; Kim, Kwangjo; Ryu, Dae-Hyun, APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2846, pp.357 - 371, 2003 |
Discover