Publications

International

2018

2017

2016

2015

2014

2011

  • Yi Jae Park, Doyoung Chung, Made Harta Dwijaksara, Jangseong Kim, and Kwangjo Kim, “An Enhanced Security Policy Framework for Android”, 2011 Symposium on Cryptography and Information Security (SCIS 2011), Jan., 25-28, 2011, Kokura, Japan. Citation=NA (17/02/02)
  • Doyoung Chung, Made Harta Dwijaksara, Yi Jae Park, Jangseong Kim, and Kwangjo Kim, “An Efficient and Privacy Preserving Authentication Protocol for HAN”, 2011 Symposium on Cryptography and Information Security (SCIS 2011), Jan., 25-28, 2011, Kokura, Japan. Citation=NA (17/02/02)

2010

  • Dang Nguyen Duc, Jangseong Kim, and Kwangjo Kim, “Scalable Grouping-proof Protocol for RFID Tags“, Symposium on Cryptography and Information Security 2010 (SCIS 2010), Jan., 19-22, 2009, Takamatsu, Japan. Citation=Google scholar: 5 (17/02/02)

2009

2008

  • Dang Nguyen Duc, and Kwangjo Kim, “How to Exchange Secret on Low-cost Devices“, Triangle Symposium on Advanced ICT 2008 (TriSAI 2008), Oct. 6-9, 2008, Daejeon, Korea. Citation=Google scholar: 0 (12/02/06)
  • Hanyoung Noh, Jangseong Kim, Chanyeob Yeun, and Kwangjo Kim, “New Polymorphic Worm Detection based on Instruction Distribution and Signature”, Proc. Of SCIS 2008, Jan. 22-25, 2008, Miyajaki, Japan. Citation=Google scholar: 0 (12/02/06)

2007

2006

  • Dang Nguyen Duc, Jaemin Park, Hyunrok Lee, and Kwangjo Kim, “Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning” (Paper, Presentation), Proc. of SCIS 2006, Abstracts pp.97, Jan. 17-20, 2006, Hiroshima, Japan. Citation=Google scholar: 169 (12/02/06)
  • Divyan M. Konidala and Kwangjo Kim “Mobile RFID Security Issues”(Paper, Presentation), Proc. of SCIS 2006, Abstracts pp.166, Jan. 17-20, 2006, Hiroshima, Japan. Citation=Google scholar: 18 (12/02/06)
  • Sangshin Lee, Tomoyuki Asano, and Kwangjo Kim, “RFID mutual Authentication Scheme based on Synchronized Secret Information” (Paper, Presentation), Proc. of SCIS 2006, Abstracts pp.98, Jan. 17-20, 2006, Hiroshima, Japan. Citation=Google scholar: 67 (12/02/06)

2005

2004

2003

  • Kyusuk Han, Fangguo Zhang, and Kwangjo Kim, “A Secure Testment Revealing Protocol“, Proc. of SCIS 2003, vol 1/2, pp.399-404, Jan. 26-29, 2003, Itaya, Japan. Citation=Google scholar: 1  (12/02/06) 
  • Wooseok Ham, Kwangjo Kim, and Hideki Imai, “Yet Another Strong Sealed-Bid Auctions“, Proc. of SCIS 2003, vol 1/2, pp.11-16, Jan. 26-29, 2003, Itaya, Japan. Citation=Google scholar: 11  (12/02/06) 

2002

  • Kwangjo Kim, “Votopia will be Coming Soon“, Night Session of SCI S2002, Jan. 31, 2002, Shirahama, Japan. Citation=Google scholar: 0 (12/02/06)
  • Kwangjo Kim et. al, “Votopia is Ready to Serve“, Rump Session of Eurocrypt 2002, April 30, Amsterdam, Netherlands. Citation=Google scholar: 0 (12/02/06)
  • Kwangjo Kim, “Votopia will be Continued” Rump session of Crypto2002, Aug. 20, 2002, UCSB. Citation=Google scholar: 0 (12/02/06)

2001

2000

  • Moonseog Seo and Kwangjo Kim, “Another Improved SET : Slim SET“, Proc. of SCIS2000, Jan. 26-28, 2000, Okinawa, Japan. Citation=Google scholar: 2 (12/02/06)
  • Weonkeun Huh and Kwangjo Kim, “t Mixes by User`s Selection“, Proc. of SCIS2000, Jan. 26-28, 2000, Okinawa, Japan. Citation=Google scholar: 0 (12/02/06)

1999

1998

  • Mi-Ra Kim, Ji-Hwan Park, Sang-Woo Park, and Kwangjo Kim, “A study on Secret Sharing Scheme Using Visual Cryoptography”, Proc. of SCIS97, SCIS97-25B, Jan. 29 – Feb. 1, 1997, Fukuoka, Japan. Citation=Google scholar: 0 (12/02/06)

1997

  • Sang Woo Park, Seongtaek Chee, and Kwangjo Kim, “Semi-bent Functions and Strict Uncorrelated Criterion Revisited”, Proc. of International Conference on Cryptology and Information Security, pp.104-109, Dec. 19-21, 1996, Kaoshiung, Taowan. Citation=Google scholar: 0 (12/02/06)(12/02/06)
  • Sang Woo Park, Sangjin Lee, and Kwangjo Kim, “How to Use Exponent Permutations in Cryptography-classification and Applications”, Proc. of International Conference on Cryptology and Information Security, pp.110-116, Dec. 19-21, 1996, Kaoshiung, Taowan. Citation=Google scholar: 0 (12/02/06)

1996

  • Kwangjo Kim, Sangjin Lee, Sangjun Park, and Daiki Lee, “How to Strengthen DES against Two Robust Attacks”, Proc. of 1995 Japan-Korea Joint Workshop on Information Security and Cryptology (JW-ISC’95), pp.173-182, Jan. 24-27, 1995, Inuyama, Japan. Citation=Google scholar: 4 (12/02/06)
  • Sangjin Lee, Soo Hak Sung, and Kwangjo Kim, “An Efficient Method to Find the Linear Expressions for Linear Cryptanalysis”, Proc. of 1995 Japan-Korea Joint Workshop on Information Security and Cryptology (JW-ISC’95), pp.183-190, Jan. 24-27, 1995, Inuyama, Japan.Citation=Google scholar: 0 (12/02/06)
  • Sangjin Lee, Seung-Cheol Goh, Kwangjo Kim, and Daiki Lee, “BRM Sequence Generators based on the field GF(2^n) for DSP Implementations”, Proc. of 1995 IEEE International Symposium on Information Theory, pp.48, Sep. 17-22, 1995, Whistler, Canada. Citation=Google scholar: 0 (12/02/06)
  • Sangjoon Park, Yongdae Kim, Sangjin Lee, and Kwangjo Kim, “An Attack on Tanaka’s Non Interactive Key Sharing Scheme”, Proc. of 1995 IEEE International Symposium on Information Theory, pp.356, Sep. 17-22, 1995, Whistler, Canada. Citation=Google scholar: 0 (12/02/06)
  • Sangjoon Park, Yongdae Kim, Sangjin Lee, and Kwangjo Kim, “Attacks on Tanaka’s Non-interactive Key Distribution Scheme”, Proc. of SCIS’95 (Symposium on Cryptography and Information Security), Jan. 26-27, 1995, Inuyama, Japan. Citation=Google scholar: 0 (12/02/06)
  • Kwangjo Kim, Sangjin Lee, Sangjoon Park, and Daiki Lee, “Securing DES S-boxes against Three Robust Cryptanalysis”, Workshop Record of SAC’95 (Selected Areas in Cryptology), pp.145-157, May 18-19, 1995, Carleton Univ, Canada.Citation=Google scholar: 14 (12/02/06)
  • Seongtaek Chee, Sangjin Lee, and Kwangjo Kim, “Integer Addition over GF(2) and its Cryptographic Properties”, Proc. of Third International Conference on Finite Fields and Applications, pp.7, June 11-14, 1995, Univ. of Glasgow, Scotland. Citation=Google scholar: 0 (12/02/06)

1994

  • Kwangjo Kim, Sangjun Park, and Sangjin Lee, “Reconstruction of s2DES S-boxes and their Immunity to Differential Cryptanalysis”, Proc. of JW-ISC’93, pp.32.01-32.10, Oct. 24-26, 1993.Seoul, Korea. Citation=Google scholar: 29 (12/02/06)