Seongan Lim

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On Insecure Uses of BGN for Privacy Preserving Data Aggregation Protocols
Fundamenta Informaticae
2023-05-19Paper
On pairwise Gaussian bases and LLL algorithm for three dimensional lattices2022-11-29Paper
On pairing inversion of the self-bilinear map on unknown order groups
Lecture Notes in Computer Science
2022-06-15Paper
Algorithms for the Generalized NTRU Equations and their Storage Analysis
Fundamenta Informaticae
2021-05-20Paper
Analysis on Yu et al.'s dynamic algorithm for canonic DBC
Discrete Applied Mathematics
2021-03-17Paper
Storage efficient algorithm for Hermite normal form using LLL
Linear Algebra and its Applications
2021-02-17Paper
A lattice attack on homomorphic NTRU with non-invertible public keys
Information and Communications Security
2020-07-20Paper
New orthogonality criterion for shortest vector of lattices and its applications
Discrete Applied Mathematics
2020-06-29Paper
Minimal condition for shortest vectors in lattices of low dimension2019-04-29Paper
Duplication free public keys based on SIS-type problems
Finite Fields and their Applications
2017-10-05Paper
An efficient lattice reduction using reuse technique blockwisely on NTRU
Discrete Applied Mathematics
2016-09-30Paper
An efficient decoding of Goppa codes for the McEliece cryptosystem
Fundamenta Informaticae
2015-06-26Paper
A method of finding bad signatures in an RSA-type batch verification2013-04-30Paper
CRYPTANALYSIS OF A DYNAMIC THRESHOLD DECRYPTION SCHEME
Communications of the Korean Mathematical Society
2009-08-30Paper
ANALYSIS OF PRIVACY-PRESERVING ELEMENT REDUCTION OF A MULTISET
Journal of the Korean Mathematical Society
2009-05-05Paper
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC ’05
Information Security and Cryptology
2009-01-15Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
scientific article; zbMATH DE number 2085213 (Why is no real title available?)2004-08-09Paper
scientific article; zbMATH DE number 1951601 (Why is no real title available?)2003-07-21Paper
scientific article; zbMATH DE number 1857537 (Why is no real title available?)2003-05-19Paper
scientific article; zbMATH DE number 1759668 (Why is no real title available?)2002-11-23Paper
scientific article; zbMATH DE number 1759669 (Why is no real title available?)2002-11-23Paper
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)
Cryptography and Coding
2002-11-12Paper
scientific article; zbMATH DE number 1583953 (Why is no real title available?)2001-04-03Paper


Research outcomes over time


This page was built for person: Seongan Lim