Suivre
Dae Hyun Yum
Dae Hyun Yum
Adresse e-mail validée de mju.ac.kr
Titre
Citée par
Citée par
Année
Generic construction of certificateless signature
DH Yum, PJ Lee
Australasian Conference on Information Security and Privacy, 200-211, 2004
3152004
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
A Boldyreva, C Gentry, A O'Neill, DH Yum
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2412007
Generic construction of certificateless encryption
DH Yum, PJ Lee
International Conference on Computational Science and Its Applications, 802-811, 2004
1362004
New signcryption schemes based on KCDSA
DH Yum, PJ Lee
Information Security and Cryptology—ICISC 2001: 4th International …, 2002
1052002
Optimistic fair exchange in a multi-user setting
Y Dodis, PJ Lee, DH Yum
International Workshop on Public Key Cryptography, 118-133, 2007
892007
Identity-based cryptography in public key management
DH Yum, PJ Lee
European Public Key Infrastructure Workshop, 71-84, 2004
832004
Timed-release encryption with pre-open capability and its application to certified e-mail system
YH Hwang, DH Yum, PJ Lee
International Conference on Information Security, 344-358, 2005
672005
Order-preserving encryption for non-uniformly distributed plaintexts
DH Yum, DS Kim, JS Kim, PJ Lee, SJ Hong
Information Security Applications: 12th International Workshop, WISA 2011 …, 2012
492012
Distance bounding protocol for mutual authentication
DH Yum, JS Kim, SJ Hong, PJ Lee
IEEE Transactions on Wireless Communications 10 (2), 592-601, 2010
362010
Exact formulae for resilience in random key predistribution schemes
DH Yum, PJ Lee
IEEE Transactions on Wireless Communications 11 (5), 1638-1642, 2012
302012
EPA: An efficient password-based protocol for authenticated key exchange
YH Hwang, DH Yum, PJ Lee
Australasian Conference on Information Security and Privacy, 452-463, 2003
302003
Time capsule signature
Y Dodis, DH Yum
Financial Cryptography and Data Security: 9th International Conference, FC …, 2005
292005
Efficient key updating signature schemes based on IBS
DH Yum, PJ Lee
IMA International Conference on Cryptography and Coding, 167-182, 2003
262003
Trapdoor sanitizable signatures made easy
DH Yum, JW Seo, PJ Lee
Applied Cryptography and Network Security: 8th International Conference …, 2010
252010
Single-layer fractal hash chain traversal with almost optimal complexity
DH Yum, JW Seo, S Eom, PJ Lee
Cryptographers’ Track at the RSA Conference, 325-339, 2009
252009
Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles
JW Seo, DH Yum, PJ Lee
Theoretical Computer Science 491, 83-93, 2013
212013
Distance bounding protocol with adjustable false acceptance rate
DH Yum, JS Kim, SJ Hong, PJ Lee
IEEE Communications Letters 15 (4), 434-436, 2011
192011
New multiparty signature schemes for network routing applications
A Boldyreva, C Gentry, A O'Neill, DH Yum
ACM Transactions on Information and System Security (TISSEC) 12 (1), 1-39, 2008
152008
Finding the key length of a Vigenère cipher: How to improve the twist algorithm
S Park, J Kim, K Cho, DH Yum
Cryptologia 44 (3), 197-204, 2020
142020
Cryptanalysis of Yeh-Shen-Hwang's one-time password authentication scheme
DH Yum, PJ Lee
IEICE transactions on communications 88 (4), 1647-1648, 2005
132005
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20