Kwangjo Kim

From MaRDI portal
(Redirected from Person:286998)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Theoretical and empirical analysis of FALCON and SOLMAE using their Python implementation2024-05-31Paper
Revocable decentralized multi-authority functional encryption
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
Improving bounds for the number of correlation immune Boolean functions
Information Processing Letters
2016-05-26Paper
Identity-based chameleon hashing and signatures without key exposure
Information Sciences
2016-01-14Paper
Discrete logarithm based chameleon hashing and signatures without key exposure
Computers and Electrical Engineering
2013-05-31Paper
Generic security-amplifying methods of ordinary digital signatures
Information Sciences
2012-10-17Paper
A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment
Mathematical and Computer Modelling
2012-08-24Paper
New receipt-free voting scheme using double-trapdoor commitment
Information Sciences
2011-06-17Paper
Hidden attribute-based signatures without anonymity revocation
Information Sciences
2010-06-11Paper
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings
Computers and Electrical Engineering
2010-04-07Paper
The ring authenticated encryption scheme-how to provide a clue wisely
Information Sciences
2009-03-24Paper
Efficient generic on-line/off-line (threshold) signatures without key exposure
Information Sciences
2008-11-20Paper
Generic Security-Amplifying Methods of Ordinary Digital Signatures
Applied Cryptography and Network Security
2008-06-13Paper
Practical Threshold Signatures Without Random Oracles
Provable Security
2008-06-10Paper
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature
Provable Security
2008-06-10Paper
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment
Lecture Notes in Computer Science
2008-05-06Paper
Mobile RFID Applications and Security Challenges
Information Security and Cryptology – ICISC 2006
2008-05-06Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2008-02-19Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Information Security
Lecture Notes in Computer Science
2006-10-16Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Practical convertible authenticated encryption schemes using self-certified public keys
Applied Mathematics and Computation
2005-11-14Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Security of a multisignature scheme for specified group of verifiers
Applied Mathematics and Computation
2005-08-05Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
Cryptanalysis of Lee-Hwang-Li's key authentication scheme
Applied Mathematics and Computation
2005-02-22Paper
Highly reliable trust establishment scheme in ad hoc networks
Computer Networks
2004-11-12Paper
scientific article; zbMATH DE number 2048545 (Why is no real title available?)2004-03-01Paper
scientific article; zbMATH DE number 2043331 (Why is no real title available?)2004-02-16Paper
scientific article; zbMATH DE number 2043321 (Why is no real title available?)2004-02-16Paper
scientific article; zbMATH DE number 1980952 (Why is no real title available?)2003-09-15Paper
scientific article; zbMATH DE number 1955793 (Why is no real title available?)2003-07-29Paper
scientific article; zbMATH DE number 1950626 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1950355 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1950344 (Why is no real title available?)2003-07-17Paper
ID-Based Blind Signature and Ring Signature from Pairings
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1857524 (Why is no real title available?)2003-05-19Paper
scientific article; zbMATH DE number 1759662 (Why is no real title available?)2002-11-23Paper
scientific article; zbMATH DE number 1759642 (Why is no real title available?)2002-10-10Paper
scientific article; zbMATH DE number 1808281 (Why is no real title available?)2002-09-26Paper
scientific article; zbMATH DE number 1689600 (Why is no real title available?)2002-01-13Paper
scientific article; zbMATH DE number 1583949 (Why is no real title available?)2001-07-08Paper
scientific article; zbMATH DE number 1612500 (Why is no real title available?)2001-07-01Paper
scientific article; zbMATH DE number 1107689 (Why is no real title available?)1998-05-03Paper
scientific article; zbMATH DE number 1024089 (Why is no real title available?)1997-06-18Paper
scientific article; zbMATH DE number 697801 (Why is no real title available?)1995-02-19Paper
scientific article; zbMATH DE number 503275 (Why is no real title available?)1994-03-07Paper


Research outcomes over time


This page was built for person: Kwangjo Kim