The following pages link to Kwangjo Kim (Q286998):
Displaying 49 items.
- Improving bounds for the number of correlation immune Boolean functions (Q286999) (← links)
- A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment (Q445355) (← links)
- New receipt-free voting scheme using double-trapdoor commitment (Q543836) (← links)
- Generic security-amplifying methods of ordinary digital signatures (Q712706) (← links)
- Identity-based chameleon hashing and signatures without key exposure (Q903661) (← links)
- Efficient generic on-line/off-line (threshold) signatures without key exposure (Q955733) (← links)
- Enhancements of authenticated multiple key exchange protocol based on bilinear pairings (Q962606) (← links)
- Hidden attribute-based signatures without anonymity revocation (Q975862) (← links)
- The ring authenticated encryption scheme-how to provide a clue wisely (Q1007859) (← links)
- Cryptanalysis of Lee-Hwang-Li's key authentication scheme (Q1763223) (← links)
- Highly reliable trust establishment scheme in ad hoc networks (Q1886006) (← links)
- Discrete logarithm based chameleon hashing and signatures without key exposure (Q1952523) (← links)
- Security of a multisignature scheme for specified group of verifiers (Q2485608) (← links)
- Practical convertible authenticated encryption schemes using self-certified public keys (Q2571976) (← links)
- (Q2707611) (← links)
- (Q2721117) (← links)
- (Q2762895) (← links)
- (Q3149767) (← links)
- Revocable Decentralized Multi-Authority Functional Encryption (Q3179488) (← links)
- Practical Threshold Signatures Without Random Oracles (Q3503882) (← links)
- Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature (Q3503883) (← links)
- Generic Security-Amplifying Methods of Ordinary Digital Signatures (Q3506409) (← links)
- (Q4279603) (← links)
- (Q4314017) (← links)
- (Q4341783) (← links)
- (Q4373632) (← links)
- ID-Based Blind Signature and Ring Signature from Pairings (Q4412819) (← links)
- (Q4412977) (← links)
- (Q4412993) (← links)
- (Q4413339) (← links)
- (Q4417407) (← links)
- (Q4428333) (← links)
- (Q4450745) (← links)
- (Q4450758) (← links)
- (Q4452587) (← links)
- (Q4536636) (← links)
- (Q4536661) (← links)
- Applied Cryptography and Network Security (Q4680930) (← links)
- (Q4788573) (← links)
- Information Security and Privacy (Q5315278) (← links)
- A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment (Q5385517) (← links)
- Mobile RFID Applications and Security Challenges (Q5385562) (← links)
- Applied Cryptography and Network Security (Q5443121) (← links)
- Information Security (Q5493622) (← links)
- Progress in Cryptology - INDOCRYPT 2004 (Q5712202) (← links)
- Information Security and Cryptology - ICISC 2003 (Q5714132) (← links)
- Information Security and Cryptology - ICISC 2003 (Q5714134) (← links)
- Information Security and Cryptology - ICISC 2005 (Q5899302) (← links)
- Theoretical and empirical analysis of FALCON and SOLMAE using their Python implementation (Q6547906) (← links)