Publications
International
2020
- Rakyong Choi, Dongyeon Hong, and Kwangjo Kim, “Implementation of Tree-based Dynamic Group Key Exchange with NewHope“, 2020 Symposium on Cryptography and Information Security, Session 3A1-5 (SCIS 2020), Jan., 28-31, 2020, Kochi, Japan.
- Edwin Ayisi Opare, and Kwangjo Kim, “Design Practices for Wholesale Central Bank Digital Currencies from the World“, 2020 Symposium on Cryptography and Information Security, Session 2E1-1 (SCIS 2020), Jan., 28-31, 2020, Kochi, Japan.
- Harry Chandra Tanuwidjaja, and Kwangjo Kim, “Enhancing Malware Detection by Modified Deep Abstraction and Weighted Feature Selection“, 2020 Symposium on Cryptography and Information Security, Session 4F1-1 (SCIS 2020), Jan., 28-31, 2020, Kochi, Japan.
- Seunggeun Baek, and Kwangjo Kim, “Recent Advances of Neural Attacks against Block Ciphers“, 2020 Symposium on Cryptography and Information Security, Session 2B1-5 (SCIS 2020), Jan., 28-31, 2020, Kochi, Japan.
2019
- Harry Chandra Tanuwidjaja, Rakyong Choi, and Kwangjo Kim, “Limitations of Privacy-Preserving for Condential Data Training by Deep Learning“, 2019 Symposium on Cryptography and Information Security, Session 2C1-2 (SCIS 2019), Jan., 22-25, 2019, Otsu, Japan. Citation=NA. (18/01/29)
- Nakjun Choi, Jeeun Lee, and Kwangjo Kim, “Fault Injection, Simple Power Analysis, and Power Glitch Attacks against FPGA-implemented Xoroshiro128+“, 2019 Symposium on Cryptography and Information Security, Session 2D3-2 (SCIS 2019), Jan., 22-25, 2019, Otsu, Japan. Citation=NA. (18/01/29)
- Seongho Han, Rakyong Choi, and Kwangjo Kim, “Adding Authenticity into Tree-based Group Key Agreement by Permissionless Public Ledger“, 2019 Symposium on Cryptography and Information Security, Session 2G3-3 (SCIS 2019), Jan., 22-25, 2019, Otsu, Japan. Citation=NA. (18/01/29)
- Dongyeon Hong, and Kwangjo Kim, “Decentralizing the Role of Root Authority in CP-ABEby the Help of Blockchain“, 2019 Symposium on Cryptography and Information Security, Session 2G3-4 (SCIS 2019), Jan., 22-25, 2019, Otsu, Japan. Citation=NA. (18/01/29)
- Seunggeun Baek, Nabi Lee, and Kwangjo Kim, “Generic Analysis of E-voting Protocols by Simplified Blockchain“, 2019 Symposium on Cryptography and Information Security, Session 2G3-5 (SCIS 2019), Jan., 22-25, 2019, Otsu, Japan. Citation=NA. (18/01/29)
- Rakyong Choi, and Kwangjo Kim, “DHL: Dynamic Key Exchange from Homomorphic Encryption based on Lattice“, 2019 Symposium on Cryptography and Information Security, Session 3A1-2 (SCIS 2019), Jan., 22-25, 2019, Otsu, Japan. Citation=NA. (18/01/29)
- Jeeun Lee, and Kwangjo Kim, “On the Power of Security Reduction in the QaRO Model“, 2019 Symposium on Cryptography and Information Security, Session 3A3-4 (SCIS 2019), Jan., 22-25, 2019, Otsu, Japan. Citation=NA. (18/01/29)
2018
- Hyeongcheol An and Kwangjo Kim, “QChain: Quantum-resistant and Decentralized PKI using Blockchain“, 2018 Symposium on Cryptography and Information Security, Session 3C1-5 (SCIS 2018), Jan., 23-26, 2018, Niigata, Japan. Citation=NA. (18/01/25)
- Hyeongcheol An, Rakyong Choi, Jeeun Lee, and Kwangjo Kim, “Performance Evaluation of liboqs in Open Quantum Safe Project (Part I)“, 2018 Symposium on Cryptography and Information Security, Session 3A4-1 (SCIS 2018), Jan., 23-26, 2018, Niigata, Japan. Citation=NA. (18/01/25)
- Rakyong Choi, Hyeongcheol An, and Kwangjo Kim, “AtLast: Another Three-party Lattice-based PAKE Scheme“, 2018 Symposium on Cryptography and Information Security, Session 2B1-3 (SCIS 2018), Jan., 23-26, 2018, Niigata, Japan. Citation=NA. (18/01/25)
- Rakyong Choi and Kwangjo Kim, “Revisiting CK17 Linearly Homomorphic Ring Signature based on Ring-LWE“, 2018 Symposium on Cryptography and Information Security, Session 2B1-4 (SCIS 2018), Jan., 23-26, 2018, Niigata, Japan. Citation=NA. (18/01/25)
- Sungsook Kim, Jeeun Lee, Rakyong Choi, and Kwangjo Kim, “Validating IGE Mode of Block Cipher from Quantum Adversaries“, 2018 Symposium on Cryptography and Information Security, Session 2C2-5 (SCIS 2018), Jan., 23-26, 2018, Niigata, Japan. Citation=NA. (18/01/25)
- Jeeun Lee, Seunghyun Lee, and Kwangjo Kim, “Security Notions for the Random Oracle Model in Classical and Quantum Settings“, 2018 Symposium on Cryptography and Information Security, Session 3A2-6 (SCIS 2018), Jan., 23-26, 2018, Niigata, Japan. Citation=NA.(18/01/25)
- Seongho Han, Nakjun Choi, Hyeongcheol An, Rakyong Choi, and Kwangjo Kim, “Prey on Lizard : Mining Secret Key on Lattice-based Cryptosystem“, 2018 Symposium on Cryptography and Information Security, Session 3A4-2 (SCIS 2018), Jan., 23-26, 2018, Niigata, Japan. Citation=NA. (18/01/25)
2017
- Rakyong Choi and Kwangjo Kim, “A Classification of Lattice-based Trapdoor Functions“, 2017 Symposium on Cryptography and Information Security, Session 2B3-1 (SCIS 2017), Jan., 24-27, 2017, Naha, Japan. Citation=NA. (17/01/23)
- Rakyong Choi and Kwangjo Kim, “Design of New Linearly Homomorphic Signatures on Lattice“, 2017 Symposium on Cryptography and Information Security, Session 2B3-3 (SCIS 2017), Jan., 24-27, 2017, Naha, Japan. Citation=NA. (17/01/23)
- Jeeun Lee, Rakyong Choi, Sungsook Kim, and Kwangjo Kim, “Security Analysis of End-to-End Encryption in Telegram“, 2017 Symposium on Cryptography and Information Security, Session 3D4-1 (SCIS 2017), Jan., 24-27, 2017, Naha, Japan. Citation=NA. (17/01/19)
- Muhamad Erza Aminanto, Harry Chandra Tanuwidjaja, Paul D. Yoo, and Kwangjo Kim, “Weighted Feature Selection Techniques for Detecting Impersonation Attack in Wi-Fi Networks“, 2017 Symposium on Cryptography and Information Security, Session 2C2-4 (SCIS 2017), Jan., 24-27, 2017, Naha, Japan. Citation=NA. (17/01/18)
- Hyeongcheol An, Sungsook Kim, Jeeun Lee, Rakyong Choi, and Kwangjo Kim, “Timing and Fault Attacks on Lattice-based Cryptographic Libraries“, 2017 Symposium on Cryptography and Information Security, Session 2B3-6 (SCIS 2017), Jan., 24-27, 2017, Naha, Japan. Citation=NA. (17/01/09)
2016
- Rakyong Choi and Kwangjo Kim, “Lattice-based Multi-signature with Linear Homomorphism“, 2016 Symposium on Cryptography and Information Security (SCIS 2016), Jan., 19-22, 2016, Kumamoto, Japan. Citation=NA (17/02/02)
- Kyung-min Kim, Jina Hong, Kwangjo Kim, and Paul D.Yoo, “Evaluation of ACA-based Intrusion Detection Systems for Unknown-attacks“, 2016 Symposium on Cryptography and Information Security (SCIS 2016), Jan., 19-22, 2016, Kumamoto, Japan. Citation=NA (17/02/02)
- Muhamad Erza Aminanto, HakJu Kim, Kyung-min Kim, and Kwangjo Kim, “Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm“, 2016 Symposium on Cryptography and Information Security (SCIS 2016), Jan., 19-22, 2016, Kumamoto, Japan. Citation=NA (17/02/02)
- Soohyun Ahn, HakJu Kim, Jeseong Jeong, and Kwangjo Kim, “A Countermeasure against Spoofing and DoS Attacks based on Message Sequence and Temporary ID in CAN“, 2016 Symposium on Cryptography and Information Security (SCIS 2016), Jan., 19-22, 2016, Kumamoto, Japan. Citation=NA (17/02/02)
- Kwangjo Kim, [Invited talk] “How Cryptography has been advanced in Korea – Know the past well, then understand the present“, International Conference for KMS 70th Anniversary, AM-3-10, Seoul National Univ., Korea, Oct., 20- 23, 2016.(17/02/02)
2015
- Hikaru Tsuchida, Naoki Kanayama, Takashi Nishide, Eiji Okamoto, and Kwangjo Kim “Revocable-Storage Decentralized Multi-Authority Functional Encryption“, 2015 Symposium on Cryptography and Information Security (SCIS 2015), Jan., 20-23, 2015, Fukuoka, Japan. Citation=NA (17/02/02)
- HakJu Kim and Kwangjo Kim, “Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme based on the Sponge Function“, AsiaJCIS – 2015 10th Asia Joint Conference on Information Security, May, 24-26, 2015, Kaohsiung, Taiwan. Citation=NA (17/02/02)
- Kyung-min Kim, HakJu Kim, and Kwangjo Kim, “Design of an Intrusion Detection System for Unknown-attacks based on Bio-inspired Algorithms”, Computer Security Symposium 2015 (CSS 2015), Oct., 21-23, 2015, Citation=NA(17/02/02)
2014
- HakJu Kim and Kwangjo Kim, “Who can survive in CAESAR competition at round-zero?“,2014 Symposium on Cryptography and Information Security (SCIS 2014), Jan., 21-24, 2014, Kagoshima, Japan. Citation=NA (17/02/02)
- Dongsoo Lee, HakJu Kim, Kwangjo Kim, and Paul D. Yoo, “Simulated Attack on DNP3 Protocol in SCADA System“, 2014 Symposium on Cryptography and Information Security (SCIS 2014), Jan., 21-24, 2014, Kagoshima, Japan. Citation=NA (17/02/02)
- Khalid Huseynov, Kwangjo Kim, and Paul D. Yoo, “Semi-supervised Botnet Detection Using Ant Colony Clustering“, 2014 Symposium on Cryptography and Information Security (SCIS 2014), Jan., 21-24, 2014, Kagoshima, Japan. Citation=NA (17/02/02)
- Rakyong Choi and Kwangjo Kim, ““Lattice-based Threshold Signature with Message Block Sharing“, 2014 Symposium on Cryptography and Information Security (SCIS 2014), Jan., 21-24, 2014, Kagoshima, Japan. Citation=NA (17/02/02)
2011
- Yi Jae Park, Doyoung Chung, Made Harta Dwijaksara, Jangseong Kim, and Kwangjo Kim, “An Enhanced Security Policy Framework for Android”, 2011 Symposium on Cryptography and Information Security (SCIS 2011), Jan., 25-28, 2011, Kokura, Japan. Citation=NA (17/02/02)
- Doyoung Chung, Made Harta Dwijaksara, Yi Jae Park, Jangseong Kim, and Kwangjo Kim, “An Efficient and Privacy Preserving Authentication Protocol for HAN”, 2011 Symposium on Cryptography and Information Security (SCIS 2011), Jan., 25-28, 2011, Kokura, Japan. Citation=NA (17/02/02)
- Made Harta Dwijaksara, Doyoung Chung, Yi Jae Park, Jangseong Kim, and Kwangjo Kim, “Secure, Fast Rebuilding and Energy Efficient Routing Protocol for Mission Critical Application over Wireless Sensor Networks”, 2011 Symposium on Cryptography and Information Security (SCIS 2011), Jan., 25-28, 2011, Kokura, Japan. Citation=NA (17/02/02)
- Dang Nguyen Duc, Chan Yeob Yeun, and Kwangjo Kim, “Reconsidering Ryu-Takagi RFID Authentication Protocol”, International Journal of Intelligent Computing Research (IJICR), Vol. 1, Issue 4, ISSN: 2042 4655 (17/02/02)
2010
- Dang Nguyen Duc, Divyan M. Konidala, Hyunrok Lee, and Kwangjo Kim, “A Survey on RFID Security and Provably Secure RFID Grouping-proof Protocols“, International Journal of Internet Technology and Secured Transactions, Vol. 2, pp. 222-249, 2010. Citation=Google scholar: 4 (17/02/02)
- Kwangjo Kim, Keynote Address On “Asian Academic Activities in Information Security and Cryptography”, IEEE ICITIS2010 (2010 International Conference on Information Theory and Information Security), Dec., 17-19, Beijing, China. (17/02/02)
- Sungmok Shin, Junhyun Yim, and Kwangjo Kim, “Authenticated and DoS-resilient Channel Assignment Mechanism for Wireless Mesh Networks“, Symposium on Cryptography and Information Security 2010 (SCIS 2010), Jan., 19-22, 2009, Takamatsu, Japan. Citation=Google scholar: 0 (17/02/02)
- Jangseong Kim, Myunghan Yoo, and Kwangjo Kim, “A Privacy-preserving Kid’s Safety Care Service Based on Sensor Network in u-City“, Symposium on Cryptography and Information Security 2010 (SCIS 2010), Jan., 19-22, 2009, Takamatsu, Japan. Citation=Google scholar: 5 (17/02/02)
- Dang Nguyen Duc, Jangseong Kim, and Kwangjo Kim, “Scalable Grouping-proof Protocol for RFID Tags“, Symposium on Cryptography and Information Security 2010 (SCIS 2010), Jan., 19-22, 2009, Takamatsu, Japan. Citation=Google scholar: 5 (17/02/02)
2009
- Imsung Choi, Zeen Kim, and Kwangjo Kim, “DoS-Resilient Authenticated Key Agreement Scheme between Actor and Sensor nodes in Wireless Sensor and Actor Network“, Joint Workshop on Information Security 2009, Aug., 6-7, 2009, Kaohsiung, Taiwan. Citation=NA (17/02/02)
- Myunghan Yoo, Jangseong Kim, and Kwangjo Kim, “A Secure Clustering Scheme over an Energy-aware Routing Protocol for Monitoring Critical Conditions“, 2009 Symposium on Cryptography and Information Security (SCIS 2009), Jan., 20-23, 2009, Otsu, Japan. Citation=Google scholar: 0 (17/02/02)
- Hyewon Park, Tomoyuki Asano, and Kwangjo Kim, “Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider“, 2009 Symposium on Cryptography and Information Security (SCIS 2009), Jan., 20-23, 2009, Otsu, Japan. Citation=Google scholar: 4 (17/02/02)
- Minhea Kwak, Jangseong Kim, and Kwangjo Kim, “Desynchronization and Cloning Resistant Light-weight RFID Authentication Protocol using Integer Arithmetic for Low-cost Tags“, 2009 Symposium on Cryptography and Information Security (SCIS 2009), Jan., 20-23, 2009, Otsu, Japan. Citation=Google scholar: 3 (17/02/02)
2008
- Kyusuk Han, Chanyeob Yoon, and Kwangjo Kim, “New Design of Generic Authentication Architecture Using ID-based Cryptosystem in 3GPP“, Triangle Symposium on Advanced ICT 2008 (TriSAI 2008), Oct. 6-9, 2008, Daejeon, Korea. Citation=Google scholar: 0 (12/02/06)
- Divyan M. Konidala, Hyunrok Lee, Dang Nguyen Duc, and Kwangjo Kim, “Security and User Privacy for Mobile-RFID Applications in Public Zone“, Triangle Symposium on Advanced ICT 2008 (TriSAI 2008), Oct. 6-9, 2008, Daejeon, Korea. Citation=Google scholar: 0 (12/02/06)
- Zeen Kim and Kwangjo Kim, “Mutually Authenticated Key Exchange Protocol For Computationally Limited Devices“, Triangle Symposium on Advanced ICT 2008 (TriSAI 2008), Oct. 6-9, 2008, Daejeon, Korea. Citation=Google scholar: 0 (12/02/06)
- Dang Nguyen Duc, and Kwangjo Kim, “How to Exchange Secret on Low-cost Devices“, Triangle Symposium on Advanced ICT 2008 (TriSAI 2008), Oct. 6-9, 2008, Daejeon, Korea. Citation=Google scholar: 0 (12/02/06)
- Jin Li and Kwangjo Kim, “Digital Signatures: Status and Challenge“, Triangle Symposium on Advanced ICT 2008 (TriSAI 2008), Oct. 6-9, 2008, Daejeon, Korea. Citation=Google scholar: 0 (12/02/06)
- Jin Li and Kwangjo Kim, “Fuzzy Identity-Based Key-Insulated Cryptosystem“, The 3rd Joint Workshop on Information Security, pp.414-424, July 10-11, 2008, Seoul, Korea. Citation=Google scholar: 0 (12/02/06)
- Sungbae Ji, Zeen Kim, and Kwangjo Kim, “Design of an RFID-embedded e-ID System for Privacy Protection“, Proc. Of SCIS 2008, Jan. 22-25, 2008, Miyajaki, Japan. Citation=Google scholar: 0 (12/02/06) (12/02/06)
- Kyusuk Han, Chanyeob Yeun, and and Kwangjo Kim, “Design of secure VoIP using ID-Based Cryptosystem“, Proc. Of SCIS 2008, Jan. 22-25, 2008, Miyajaki, Japan. Citation=Google scholar: 0 (12/02/06)
- Sungjune Yoon, Tomoyuki Asano, Masafumi Kusakawa, Hyunrok Lee, and Kwangjo Kim, “Hybrid Multi-user Broadcast Authentication for Wireless Sensor Networks“, Proc. Of SCIS 2008, Jan. 22-25, 2008, Miyajaki, Japan. Citation=Google scholar: 3 (12/02/06)
- Hanyoung Noh, Jangseong Kim, Chanyeob Yeun, and Kwangjo Kim, “New Polymorphic Worm Detection based on Instruction Distribution and Signature”, Proc. Of SCIS 2008, Jan. 22-25, 2008, Miyajaki, Japan. Citation=Google scholar: 0 (12/02/06)
- Hyewon Park, Kyusuk Han, Chanyeob Yeun and, and Kwangjo Kim, “Improving Choi et al.’s ID-based Authenticated Group Key Agreement Scheme at PKC2004“, Proc. Of SCIS 2008, Jan. 22-25, 2008, Miyajaki, Japan. Citation=Google scholar: 1 (12/02/06)
- Hyeran Mun, Kyusuk Han, Chanyeob Yeun and, and Kwangjo Kim, “Yet Another Intrusion Detection System against Insider Attacks“, Proc. Of SCIS 2008, Jan. 22-25, 2008, Miyajaki, Japan. Citation=Google scholar: 2 (12/02/06)
2007
- Chunhui Wu, Xiaofeng Chen, Fangguo Zhang, Hyunrok Lee, and Kwangjo Kim, “Remarks on Receipt-free Auction/Voting Schemes Using Commitment“, Chinacrypt ’07, 272-282, Science Press, 2007. Citation=Google scholar: 0 (12/02/06)
- Chanyeob Yeun, Kyusuk Han, and Kwangjo Kim, “New Novel Approaches for Securing VoIP Applications“, The Sixth International Workshop for Applied PKC IWAP, Dec 3-4, 2007, Perth, Australia. Citation=Google scholar: 2 (12/02/06)
- Sungjune Yoon, Hyunrok Lee, Sungbae Ji, and Kwangjo Kim, “A User Authentication Scheme with Privacy Protection for Wireless Sensor Networks“, The 2nd Joint Workshop on Information Security, pp.233-244, Aug. 6-7, 2007, Tokyo, Japan. Citation=Google scholar: 5 (12/02/06)
- Kyusuk Han and Kwangjo Kim, “Enhancing Privacy and Authentication for Location Based Service using Trusted Authority“, The 2nd Joint Workshop on Information Security, pp.219 – 232, Aug. 6-7, 2007, Tokyo, Japan. Citation=Google scholar: 8 (12/02/06)
- Zeen Kim, Jangseong Kim, and Kwangjo Kim, “Key Predistribution Scheme for Wireless Sensor Networks with Higher Connectivity“, Proc. Of SCIS 2007, Abstracts pp.235, Jan. 23-26, 2007, Sasebo, Japan. Citation=Google scholar: 0 (12/02/06)
- Youngjoon Seo, Tomoyuki Asano, Hyunrok Lee, and Kwangjo Kim, “A Lightweight Protocol Enabling Ownership Transfer and Granular Data Access of RFID Tags“, Proc. Of SCIS 2007, Abstracts pp.122, Jan. 23-26, 2007, Sasebo, Japan. Citation=Google scholar: 14 (12/02/06)
- Duc-Liem Vo and Kwangjo Kim, “Cryptanalysis of ID-Based Remote Authentication with Smart Cards on Open Distributed System from Elliptic Curve Cryptography“, Proc. Of SCIS 2007, Abstracts pp.307, Jan. 23-26, 2007, Sasebo, Japan. Citation=Google scholar: 1 (12/02/06)
- Dang Nguyen Duc and Kwangjo Kim, “Securing HB+ against GRS Man-in-the-Middle Attack“, Proc. Of SCIS 2007, Abstracts pp.123, Jan. 23-26, 2007, Sasebo, Japan. Citation=Google scholar: 38 (12/02/06)
- Hyunrok Lee and Kwangjo Kim, “A Secure RFID Reader Protocol based on SLRRP“, Proc. of SCIS 2007, Abstracts pp.339, Jan. 23-26, 2007, Sasebo, Japan. Citation=Google scholar: 1 (12/02/06)
- Divyan M. Konidala and Kwangjo Kim, “Security for RFID-based Applications in Smart Home Environment“, Proc. of SCIS 2007, Abstracts pp.120, Jan. 23-26, 2007, Sasebo, Japan. Citation=Google scholar: 2 (12/02/06)
2006
- Dang Nguyen Duc, Jaemin Park, Hyunrok Lee, and Kwangjo Kim, “Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning” (Paper, Presentation), Proc. of SCIS 2006, Abstracts pp.97, Jan. 17-20, 2006, Hiroshima, Japan. Citation=Google scholar: 169 (12/02/06)
- Divyan M. Konidala and Kwangjo Kim “Mobile RFID Security Issues”(Paper, Presentation), Proc. of SCIS 2006, Abstracts pp.166, Jan. 17-20, 2006, Hiroshima, Japan. Citation=Google scholar: 18 (12/02/06)
- Sangshin Lee, Tomoyuki Asano, and Kwangjo Kim, “RFID mutual Authentication Scheme based on Synchronized Secret Information” (Paper, Presentation), Proc. of SCIS 2006, Abstracts pp.98, Jan. 17-20, 2006, Hiroshima, Japan. Citation=Google scholar: 67 (12/02/06)
2005
- Seok-kyu Kang, Tomoyuki Asano, and Kwangjo Kim, “A Protocol of Unlinkable Transaction for Preserving Customer Privacy“, Proc. of SCIS 2005, Jan. 25-28 Maiko Kobe, Japan. Citation=Google scholar: 2 (12/02/06)
- Ping Wang, Seok-kyu Kang, and Kwangjo Kim, “Tamper Resistant Software Through Dynamic Integrity Checking“, Proc. of SCIS 2005, Jan. 25-28 Maiko Kobe, Japan. Citation=Google scholar: 8 (12/02/06)
- Jeongkyu Yang and Kwangjo Kim, “Security and Privacy on Authentication for Low-cost RFID“, Proc. of SCIS 2005, Jan. 25-28 Maiko Kobe, Japan. Citation=Google scholar: 23 (12/02/06)
- Dang Nguyen Duc, Zeen Kim, and Kwangjo Kim, “A New Provably Secure Transitive Signature Scheme“, Proc. of SCIS 2005, Jan. 25-28 Maiko Kobe, Japan. Citation=Google scholar: 0 (12/02/06)
2004
- SungJun Min, Go Yamamoto, and Kwangjo Kim, “On the Security of NTRUSign Signature Scheme“, Proc. of SCIS 2004, vol 1/2, pp.625-630, Jan. 27-30, 2004, Sendai, Japan. Citation=Google scholar: 0 (12/02/06)
- Zeen Kim and Kwangjo Kim, “Provably-Secure Identification Scheme based on Braid Group“, Proc. of SCIS 2004, vol. 1/2, pp.29-34, Jan. 27-30, 2004, Sendai, Japan. Citation=Google scholar: 7 (12/02/06)
- Jiqiang Lv, Kui Ren, Xiaofeng Chen, and Kwangjo Kim, “Ring Authenticated Encryption: A New Type of Authenticated Encryption“, Proc. of SCIS 2004, vol. 1/2, pp.1179-1184, Jan. 27-30, Sendi, Japan. Citation=Google scholar: 12 (12/02/06)
- Konidala M. Divyan, Robert H. Deng, Jianying Zhou, and Kwangjo Kim, “A Secure and Privacy Enhanced Location-based Service Transaction Protocol in Ubiquitous Computing Environment“, Proc. of SCIS 2004, vol. 1/2, pp.931-936, Jan. 27-30, 2004, Sendai, Japan. Citation=Google scholar: 3 (12/02/06)
2003
- Hyunrok Lee and Kwangjo Kim, “An Adaptive Authentication Protocol based on Reputation for Peer-to-Peer System“, Proc. of SCIS 2003, vol 1/2, pp.661-666, Jan. 26-29, 2003, Itaya, Japan. Citation=Google scholar: 19 (12/02/06)
- Jeongsung Kim, Soogil Choi, Kwangjo Kim, and Colin Boyd, “Anonymous Authentication Protocol for Dynamic Groups with Power-Limited Devices“, Proc. of SCIS 2003, vol 1/2, pp.405-410, Jan. 26-29, 2003, Itaya, Japan. Citation=Google scholar: 8 (12/02/06)
- Kyusuk Han, Fangguo Zhang, and Kwangjo Kim, “A Secure Testment Revealing Protocol“, Proc. of SCIS 2003, vol 1/2, pp.399-404, Jan. 26-29, 2003, Itaya, Japan. Citation=Google scholar: 1 (12/02/06)
- Fangguo Zhang, Byoungcheon Lee, and Kwangjo Kim, “Exploring Signature Schemes with Subliminal Channel“, Proc. of SCIS 2003, vol 1/2, pp.245-250, Jan. 26-29, 2003, Itaya, Japan. Citation=Google scholar: 23 (12/02/06)
- Duc Liem Vo, Fangguo Zhang, and Kwangjo Kim, “A New Threshold Blind Signature Scheme from Pairings“, Proc. of SCIS 2003, vol 1/2, pp.233-238, Jan. 26-29, 2003, Itaya, Japan. Citation=Google scholar: 33 (12/02/06)
- Wooseok Ham, Kwangjo Kim, and Hideki Imai, “Yet Another Strong Sealed-Bid Auctions“, Proc. of SCIS 2003, vol 1/2, pp.11-16, Jan. 26-29, 2003, Itaya, Japan. Citation=Google scholar: 11 (12/02/06)
- Songwon Lee, Jeongkyu Yang, and Kwangjo Kim, “Threshold Password-Based Authentication Using Bilinear Pairings“, Proc. of CSS 2003, pp.19-24, Oct. 29-31, 2003 Kitakyushu, Japan, IPSJ. Citation=Google scholar: 3 (12/02/06)
- Chul-Joon Choi, Zeen Kim, and Kwangjo Kim, “Schnorr Signature Scheme with Restricted Signing Capability“, Proc. of CSS 2003, pp.385-390, Oct. 29-31,2003 Kitakyushu, Japan, IPSJ. Citation=Google scholar: 4 (12/02/06)
- Hwasun Chang and Kwangjo Kim, “Securing AES against Second-Order DPA by Simple Fixed-Value Masking“, Proc. of CSS 2003, pp.145-150, Oct. 29-31, 2003 Kitakyushu, Japan, IPSJ. Citation=Google scholar: 8 (12/02/06)
- ByeongGon Kim, SungJun Min, and Kwangjo Kim, “Fair Tracing based on VSS and Blind Signature without Trustees”, Proc. of CSS 2003, pp.37-42, Oct. 29-31,2003 Kitakyushu, Japan, IPSJ. Citation=Google scholar: 2 (12/02/06)
- Jaehyrk Park, Sukkyu Gang, and Kwangjo Kim, “Group Mutual Exclusion based Secure Distributed Protocol“, Proc. of CSS 2003, pp.445-450, Oct.29-31,2003 Kitakyushu, Japan, IPSJ. Citation=Google scholar: 2 (12/02/06)
- JoongMan Kim and Kwangjo Kim, “Intrusion-Resilient Key-Evolving Schnorr Signature“, Proc. of CSS2003, pp.379-384, Oct. 29-31,2003 Kitakyushu, Japan, IPSJ. Citation=Google scholar: 0 (12/02/06)
2002
- Byoungcheon Lee and Kwangjo Kim, “Fair Exchange of Digital Signature Using Conditional Signature“, Proc. of SCIS 2002, vol 1/2, pp.179-184, Jan. 29 – Feb. 1, 2002, Shirahama, Japan. Citation=Google scholar: 9 (12/02/06)
- Manho Lee, Hyunrok Lee, and Kwangjo Kim, “A Micro-payment System for Multiple-Shopping“, Proc. of SCIS 2002, vol 1/2, pp.229-234, Jan. 29 – Feb. 1, 2002, Shirahama, Japan. Citation=Google scholar: 18 (12/02/06)
- Myungsun Kim, Heesun Kim, and Kwangjo Kim, “A New Identification Scheme based on the Gap Diffie-Hellman Problem“, Proc. of SCIS 2002, vol 1/2, pp.349-352, Jan. 29 – Feb. 1, 2002, Shirahama, Japan. Citation=Google scholar: 11 (12/02/06)
- Jaegwan Park and Kwangjo Kim, “A New Approach of X.509v3 Certificate for Full Path Validation“, Proc. of SCIS 2002, vol 2/2, pp.1155-1160, Jan. 29 – Feb. 1, 2002, Shirahama, Japan. Citation=Google scholar: 0(12/02/06)
- Kwangjo Kim, “Votopia will be Coming Soon“, Night Session of SCI S2002, Jan. 31, 2002, Shirahama, Japan. Citation=Google scholar: 0 (12/02/06)
- Kwangjo Kim et. al, “Votopia is Ready to Serve“, Rump Session of Eurocrypt 2002, April 30, Amsterdam, Netherlands. Citation=Google scholar: 0 (12/02/06)
- Kwangjo Kim, “Votopia will be Continued” Rump session of Crypto2002, Aug. 20, 2002, UCSB. Citation=Google scholar: 0 (12/02/06)
2001
- Hyuncheol Park and Kwangjo Kim, “Visible Watermarking using Verifiable Digital Seal Image“, Proc. of SCIS2001, vol 1/2, pp.103-108, Jan. 23-26, 2001, Oiso, Japan. Citation=Google scholar: 6 (12/02/06)
- Jaeseung Go and Kwangjo Kim, “Wireless Authentication Protocols Preserving User Anonymity“, Proc. of SCIS2001, vol 1/2, pp.159-164, Jan. 23-26, 2001, Oiso, Japan. Citation=Google scholar: 53 (12/02/06)
- Byoungcheon Lee, Heesun Kim, and Kwangjo Kim, “Strong Proxy Signature and its Applications“, Proc. of SCIS2001, vol 2/2, pp.603-608, Jan. 23-26, 2001, Oiso, Japan. Citation=Google scholar: 379 (12/02/06)
- Heesun Kim, Joonsang Baek, Byoungcheon Lee, and Kwangjo Kim, “Computing with Secrets for Mobile Agent using One-time Proxy Signature“, Proc. of SCIS2001, vol 2/2, pp.845-850, Jan. 23-26, 2001, Oiso, Japan. Citation=Google scholar: 15(12/02/06)
- Kwangjo Kim, Jinho Kim and Byoungcheon Lee, “No More Panic in Florida : Reality or Dream?“, Rump Session of Crypto2001, Aug. 21, 2001, UCSB. Citation=Google scholar: 0 (12/02/06)
- Kwangjo Kim “Design and Implementation of Internet Voting System to the Worldwide Level“, WOTE2001, Aug. 26-28, 2001, Marconi Conference Center, San Francisco. Citation=Google scholar: 0 (12/02/06)
2000
- Byoungcheon Lee and Kwangjo Kim, “Receipt-free Electronic Voting Through Collaboration of Voter and Honest Verifier“, Proc. of JWISC2000, pp.101-108, Jan. 25-26, 2000, Okinawa, Japan. Citation=Google scholar: 67 (12/02/06)
- Sunyoung Lee, Kwangjo Kim, and Hideki IMAI, “A New Hash Function Based on SQH and NHa“, Proc. of JWISC2000, Jan. 25-26, 2000, Okinawa, Japan. Citation=Google scholar: 0 (12/02/06)
- Joonsang Baek, Kwangjo Kim, and Tsutomu Matsumoto, “On the Significance of Unknown Key Share Attacks Using DSKS Property“, Proc. of SCIS2000, Jan. 26-28, 2000, Okinawa, Japan. Citation=Google scholar: 0 (12/02/06)
- Moonseog Seo and Kwangjo Kim, “Another Improved SET : Slim SET“, Proc. of SCIS2000, Jan. 26-28, 2000, Okinawa, Japan. Citation=Google scholar: 2 (12/02/06)
- Weonkeun Huh and Kwangjo Kim, “t Mixes by User`s Selection“, Proc. of SCIS2000, Jan. 26-28, 2000, Okinawa, Japan. Citation=Google scholar: 0 (12/02/06)
- Kyubeom Hwang, Joonsang Baek, Kwangjo Kim, and Charles Ahn, “Trend of Malicious Codes and their Countermeasures“, Proc. of SCIS2000, Jan. 26-28, 2000, Okinawa, Japan. Citation=Google scholar: 0 (12/02/06)
1999
- Byoungcheon Lee and Kwangjo Kim, “Copyright Protection of Software using Public Key Infrastructure“, Proc. of SCIS99, Jan. 26-29, 1999, Kobe, Japan. Citation=Google scholar: 0 (12/02/06)
1998
- Mi-Ra Kim, Ji-Hwan Park, Sang-Woo Park, and Kwangjo Kim, “A study on Secret Sharing Scheme Using Visual Cryoptography”, Proc. of SCIS97, SCIS97-25B, Jan. 29 – Feb. 1, 1997, Fukuoka, Japan. Citation=Google scholar: 0 (12/02/06)
1997
- Sang Woo Park, Seongtaek Chee, and Kwangjo Kim, “Semi-bent Functions and Strict Uncorrelated Criterion Revisited”, Proc. of International Conference on Cryptology and Information Security, pp.104-109, Dec. 19-21, 1996, Kaoshiung, Taowan. Citation=Google scholar: 0 (12/02/06)(12/02/06)
- Sang Woo Park, Sangjin Lee, and Kwangjo Kim, “How to Use Exponent Permutations in Cryptography-classification and Applications”, Proc. of International Conference on Cryptology and Information Security, pp.110-116, Dec. 19-21, 1996, Kaoshiung, Taowan. Citation=Google scholar: 0 (12/02/06)
1996
- Kwangjo Kim, Sangjin Lee, Sangjun Park, and Daiki Lee, “How to Strengthen DES against Two Robust Attacks“, Proc. of 1995 Japan-Korea Joint Workshop on Information Security and Cryptology (JW-ISC’95), pp.173-182, Jan. 24-27, 1995, Inuyama, Japan. Citation=Google scholar: 4 (12/02/06)
- Sangjin Lee, Soo Hak Sung, and Kwangjo Kim, “An Efficient Method to Find the Linear Expressions for Linear Cryptanalysis”, Proc. of 1995 Japan-Korea Joint Workshop on Information Security and Cryptology (JW-ISC’95), pp.183-190, Jan. 24-27, 1995, Inuyama, Japan.Citation=Google scholar: 0 (12/02/06)
- Sangjin Lee, Seung-Cheol Goh, Kwangjo Kim, and Daiki Lee, “BRM Sequence Generators based on the field GF(2^n) for DSP Implementations”, Proc. of 1995 IEEE International Symposium on Information Theory, pp.48, Sep. 17-22, 1995, Whistler, Canada. Citation=Google scholar: 0 (12/02/06)
- Sangjoon Park, Yongdae Kim, Sangjin Lee, and Kwangjo Kim, “An Attack on Tanaka’s Non Interactive Key Sharing Scheme”, Proc. of 1995 IEEE International Symposium on Information Theory, pp.356, Sep. 17-22, 1995, Whistler, Canada. Citation=Google scholar: 0 (12/02/06)
- Sangjoon Park, Yongdae Kim, Sangjin Lee, and Kwangjo Kim, “Attacks on Tanaka’s Non-interactive Key Distribution Scheme”, Proc. of SCIS’95 (Symposium on Cryptography and Information Security), Jan. 26-27, 1995, Inuyama, Japan. Citation=Google scholar: 0 (12/02/06)
- Kwangjo Kim, Sangjin Lee, Sangjoon Park, and Daiki Lee, “Securing DES S-boxes against Three Robust Cryptanalysis“, Workshop Record of SAC’95 (Selected Areas in Cryptology), pp.145-157, May 18-19, 1995, Carleton Univ, Canada.Citation=Google scholar: 14 (12/02/06)
- Seongtaek Chee, Sangjin Lee, and Kwangjo Kim, “Integer Addition over GF(2) and its Cryptographic Properties”, Proc. of Third International Conference on Finite Fields and Applications, pp.7, June 11-14, 1995, Univ. of Glasgow, Scotland. Citation=Google scholar: 0 (12/02/06)
1994
- Kwangjo Kim, Sangjun Park, and Sangjin Lee, “Reconstruction of s2DES S-boxes and their Immunity to Differential Cryptanalysis”, Proc. of JW-ISC’93, pp.32.01-32.10, Oct. 24-26, 1993.Seoul, Korea. Citation=Google scholar: 29 (12/02/06)