Kyung-Ah Shim

From MaRDI portal
(Redirected from Person:425536)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Forgery attacks on two provably secure certificateless signature schemes
Information Sciences
2021-04-19Paper
Security analysis of improved cubic UOV signature schemes2018-06-15Paper
An existential unforgeable signature scheme based on multivariate quadratic equations2018-04-06Paper
Cryptanalysis of RGB, a mixed multivariate signature scheme
Finite Fields and their Applications
2017-05-24Paper
Security models for certificateless signature schemes revisited
Information Sciences
2017-05-16Paper
An efficient ring signature scheme from pairings
Information Sciences
2017-05-16Paper
On delegatability of designated verifier signature schemes
Information Sciences
2017-02-07Paper
Lite-Rainbow: lightweight signature schemes based on multivariate quadratic equations and their secure implementations
Progress in Cryptology -- INDOCRYPT 2015
2016-01-12Paper
A strong designated verifier signature scheme tightly related to the LRSW assumption
International Journal of Computer Mathematics
2013-12-23Paper
Security analysis of three password authentication schemes
Journal of Universal Computer Science
2012-09-27Paper
Security pitfalls of the certificateless signature and multi-receiver signcryption schemes
Fundamenta Informaticae
2012-06-19Paper
A round-optimal three-party ID-based authenticated key agreement protocol
Information Sciences
2012-06-08Paper
Short designated verifier proxy signatures
Computers and Electrical Engineering
2011-07-28Paper
Rogue-key attacks on the multi-designated verifiers signature scheme
Information Processing Letters
2010-04-19Paper
Breaking the short certificateless signature scheme
Information Sciences
2009-03-24Paper
Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper)
Information and Communications Security
2008-11-11Paper
Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
Information Sciences
2007-02-16Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
Security flaws in authentication and key establishment protocols for mobile communications
Applied Mathematics and Computation
2005-11-16Paper
Off-line password-guessing attacks on the generalized key agreement and password authentication protocol
Applied Mathematics and Computation
2005-11-16Paper
Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings
Applied Mathematics and Computation
2005-08-05Paper
scientific article; zbMATH DE number 1980954 (Why is no real title available?)2003-09-15Paper
scientific article; zbMATH DE number 1950602 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1808284 (Why is no real title available?)2002-09-26Paper
\(p\)-adic heights
Communications of the Korean Mathematical Society
2001-03-19Paper
scientific article; zbMATH DE number 1558385 (Why is no real title available?)2001-01-29Paper


Research outcomes over time


This page was built for person: Kyung-Ah Shim