Kwangjo Kim

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Theoretical and empirical analysis of FALCON and SOLMAE using their Python implementation2024-05-31Paper
Revocable decentralized multi-authority functional encryption
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
Improving bounds for the number of correlation immune Boolean functions
Information Processing Letters
2016-05-26Paper
Identity-based chameleon hashing and signatures without key exposure
Information Sciences
2016-01-14Paper
Discrete logarithm based chameleon hashing and signatures without key exposure
Computers and Electrical Engineering
2013-05-31Paper
Generic security-amplifying methods of ordinary digital signatures
Information Sciences
2012-10-17Paper
A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment
Mathematical and Computer Modelling
2012-08-24Paper
New receipt-free voting scheme using double-trapdoor commitment
Information Sciences
2011-06-17Paper
Hidden attribute-based signatures without anonymity revocation
Information Sciences
2010-06-11Paper
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings
Computers and Electrical Engineering
2010-04-07Paper
The ring authenticated encryption scheme-how to provide a clue wisely
Information Sciences
2009-03-24Paper
Efficient generic on-line/off-line (threshold) signatures without key exposure
Information Sciences
2008-11-20Paper
Generic Security-Amplifying Methods of Ordinary Digital Signatures
Applied Cryptography and Network Security
2008-06-13Paper
Practical Threshold Signatures Without Random Oracles
Provable Security
2008-06-10Paper
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature
Provable Security
2008-06-10Paper
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
Lecture Notes in Computer Science
2008-05-06Paper
Mobile RFID Applications and Security Challenges
Information Security and Cryptology – ICISC 2006
2008-05-06Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2008-02-19Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Information Security
Lecture Notes in Computer Science
2006-10-16Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Practical convertible authenticated encryption schemes using self-certified public keys
Applied Mathematics and Computation
2005-11-14Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Security of a multisignature scheme for specified group of verifiers
Applied Mathematics and Computation
2005-08-05Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
Cryptanalysis of Lee-Hwang-Li's key authentication scheme
Applied Mathematics and Computation
2005-02-22Paper
Highly reliable trust establishment scheme in ad hoc networks
Computer Networks
2004-11-12Paper
scientific article; zbMATH DE number 2048545 (Why is no real title available?)2004-03-01Paper
scientific article; zbMATH DE number 2043331 (Why is no real title available?)2004-02-16Paper
scientific article; zbMATH DE number 2043321 (Why is no real title available?)2004-02-16Paper
scientific article; zbMATH DE number 1980952 (Why is no real title available?)2003-09-15Paper
scientific article; zbMATH DE number 1955793 (Why is no real title available?)2003-07-29Paper
scientific article; zbMATH DE number 1950626 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1950355 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1950344 (Why is no real title available?)2003-07-17Paper
ID-Based Blind Signature and Ring Signature from Pairings
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1857524 (Why is no real title available?)2003-05-19Paper
scientific article; zbMATH DE number 1759662 (Why is no real title available?)2002-11-23Paper
scientific article; zbMATH DE number 1759642 (Why is no real title available?)2002-10-10Paper
scientific article; zbMATH DE number 1808281 (Why is no real title available?)2002-09-26Paper
scientific article; zbMATH DE number 1689600 (Why is no real title available?)2002-01-13Paper
scientific article; zbMATH DE number 1583949 (Why is no real title available?)2001-07-08Paper
scientific article; zbMATH DE number 1612500 (Why is no real title available?)2001-07-01Paper
scientific article; zbMATH DE number 1107689 (Why is no real title available?)1998-05-03Paper
scientific article; zbMATH DE number 1024089 (Why is no real title available?)1997-06-18Paper
scientific article; zbMATH DE number 697801 (Why is no real title available?)1995-02-19Paper
scientific article; zbMATH DE number 503275 (Why is no real title available?)1994-03-07Paper


Research outcomes over time


This page was built for person: Kwangjo Kim