Kwangjo Kim

From MaRDI portal
Person:286998

Available identifiers

zbMath Open kim.kwangjoMaRDI QIDQ286998

List of research outcomes





PublicationDate of PublicationType
Theoretical and empirical analysis of FALCON and SOLMAE using their Python implementation2024-05-31Paper
Revocable Decentralized Multi-Authority Functional Encryption2016-12-21Paper
Improving bounds for the number of correlation immune Boolean functions2016-05-26Paper
Identity-based chameleon hashing and signatures without key exposure2016-01-14Paper
Discrete logarithm based chameleon hashing and signatures without key exposure2013-05-31Paper
Generic security-amplifying methods of ordinary digital signatures2012-10-17Paper
A scalable and privacy-preserving child-care and safety service in a ubiquitous computing environment2012-08-24Paper
New receipt-free voting scheme using double-trapdoor commitment2011-06-17Paper
Hidden attribute-based signatures without anonymity revocation2010-06-11Paper
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings2010-04-07Paper
The ring authenticated encryption scheme-how to provide a clue wisely2009-03-24Paper
Efficient generic on-line/off-line (threshold) signatures without key exposure2008-11-20Paper
Generic Security-Amplifying Methods of Ordinary Digital Signatures2008-06-13Paper
Practical Threshold Signatures Without Random Oracles2008-06-10Paper
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature2008-06-10Paper
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment2008-05-06Paper
Mobile RFID Applications and Security Challenges2008-05-06Paper
Applied Cryptography and Network Security2008-02-19Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Information Security2006-10-16Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Practical convertible authenticated encryption schemes using self-certified public keys2005-11-14Paper
Information Security and Privacy2005-09-07Paper
Security of a multisignature scheme for specified group of verifiers2005-08-05Paper
Applied Cryptography and Network Security2005-06-13Paper
Cryptanalysis of Lee-Hwang-Li's key authentication scheme2005-02-22Paper
Highly reliable trust establishment scheme in ad hoc networks2004-11-12Paper
https://portal.mardi4nfdi.de/entity/Q44525872004-03-01Paper
https://portal.mardi4nfdi.de/entity/Q44507582004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44507452004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44283332003-09-15Paper
https://portal.mardi4nfdi.de/entity/Q44174072003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44133392003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44129932003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44129772003-07-17Paper
ID-Based Blind Signature and Ring Signature from Pairings2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q47885732003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q45366612002-11-23Paper
https://portal.mardi4nfdi.de/entity/Q45366362002-10-10Paper
https://portal.mardi4nfdi.de/entity/Q31497672002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q27628952002-01-13Paper
https://portal.mardi4nfdi.de/entity/Q27076112001-07-08Paper
https://portal.mardi4nfdi.de/entity/Q27211172001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q43736321998-05-03Paper
https://portal.mardi4nfdi.de/entity/Q43417831997-06-18Paper
https://portal.mardi4nfdi.de/entity/Q43140171995-02-19Paper
https://portal.mardi4nfdi.de/entity/Q42796031994-03-07Paper

Research outcomes over time

This page was built for person: Kwangjo Kim