Generic construction of certificateless signature DH Yum, PJ Lee Australasian Conference on Information Security and Privacy, 200-211, 2004 | 315 | 2004 |
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing A Boldyreva, C Gentry, A O'Neill, DH Yum Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 241 | 2007 |
Generic construction of certificateless encryption DH Yum, PJ Lee International Conference on Computational Science and Its Applications, 802-811, 2004 | 136 | 2004 |
New signcryption schemes based on KCDSA DH Yum, PJ Lee Information Security and Cryptology—ICISC 2001: 4th International …, 2002 | 105 | 2002 |
Optimistic fair exchange in a multi-user setting Y Dodis, PJ Lee, DH Yum International Workshop on Public Key Cryptography, 118-133, 2007 | 89 | 2007 |
Identity-based cryptography in public key management DH Yum, PJ Lee European Public Key Infrastructure Workshop, 71-84, 2004 | 83 | 2004 |
Timed-release encryption with pre-open capability and its application to certified e-mail system YH Hwang, DH Yum, PJ Lee International Conference on Information Security, 344-358, 2005 | 67 | 2005 |
Order-preserving encryption for non-uniformly distributed plaintexts DH Yum, DS Kim, JS Kim, PJ Lee, SJ Hong Information Security Applications: 12th International Workshop, WISA 2011 …, 2012 | 49 | 2012 |
Distance bounding protocol for mutual authentication DH Yum, JS Kim, SJ Hong, PJ Lee IEEE Transactions on Wireless Communications 10 (2), 592-601, 2010 | 36 | 2010 |
Exact formulae for resilience in random key predistribution schemes DH Yum, PJ Lee IEEE Transactions on Wireless Communications 11 (5), 1638-1642, 2012 | 30 | 2012 |
EPA: An efficient password-based protocol for authenticated key exchange YH Hwang, DH Yum, PJ Lee Australasian Conference on Information Security and Privacy, 452-463, 2003 | 30 | 2003 |
Time capsule signature Y Dodis, DH Yum Financial Cryptography and Data Security: 9th International Conference, FC …, 2005 | 29 | 2005 |
Efficient key updating signature schemes based on IBS DH Yum, PJ Lee IMA International Conference on Cryptography and Coding, 167-182, 2003 | 26 | 2003 |
Trapdoor sanitizable signatures made easy DH Yum, JW Seo, PJ Lee Applied Cryptography and Network Security: 8th International Conference …, 2010 | 25 | 2010 |
Single-layer fractal hash chain traversal with almost optimal complexity DH Yum, JW Seo, S Eom, PJ Lee Cryptographers’ Track at the RSA Conference, 325-339, 2009 | 25 | 2009 |
Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles JW Seo, DH Yum, PJ Lee Theoretical Computer Science 491, 83-93, 2013 | 21 | 2013 |
Distance bounding protocol with adjustable false acceptance rate DH Yum, JS Kim, SJ Hong, PJ Lee IEEE Communications Letters 15 (4), 434-436, 2011 | 19 | 2011 |
New multiparty signature schemes for network routing applications A Boldyreva, C Gentry, A O'Neill, DH Yum ACM Transactions on Information and System Security (TISSEC) 12 (1), 1-39, 2008 | 15 | 2008 |
Finding the key length of a Vigenère cipher: How to improve the twist algorithm S Park, J Kim, K Cho, DH Yum Cryptologia 44 (3), 197-204, 2020 | 14 | 2020 |
Cryptanalysis of Yeh-Shen-Hwang's one-time password authentication scheme DH Yum, PJ Lee IEICE transactions on communications 88 (4), 1647-1648, 2005 | 13 | 2005 |