!-->!-->!-->
Contents
Publication
2011
- Yi Jae Park, Doyoung Chung, Made Harta Dwijaksara, Jangseong Kim and Kwangjo Kim, ¡°An Enhanced Security Policy Framework for Android¡±, 2011 Symposium on Cryptography and Information Security (SCIS 2011), Jan. 25-28, 2011, Kokura, Japan. Citation=NA(11/02/01)
- Doyoung Chung, Made Harta Dwijaksara, Yi Jae Park, Jangseong Kim and Kwangjo Kim, ¡°An Efficient and Privacy Preserving Authentication Protocol for HAN¡±, 2011 Symposium on Cryptography and Information Security (SCIS 2011), Jan. 25-28, 2011, Kokura, Japan. Citation=NA(11/02/01)
- Made Harta Dwijaksara, Doyoung Chung, Yi Jae Park, Jangseong Kim and Kwangjo Kim, ¡°Secure, Fast Rebuilding and Energy Efficient Routing Protocol for Mission Critical Application over Wireless Sensor Networks¡±, 2011 Symposium on Cryptography and Information Security (SCIS 2011), Jan. 25-28, 2011, Kokura, Japan. Citation=NA(11/02/01)
- Dang Nguyen Duc, Chan Yeob Yeun and Kwangjo Kim, ¡°Reconsidering Ryu-Takagi RFID Authentication Protocol¡±, International Journal of Intelligent Computing Research (IJICR), Vol. 1, Issue 4, ISSN: 2042 4655
2010
- Dang Nguyen Duc, Divyan M. Konidala, Hyunrok Lee and Kwangjo Kim, "A Survey on RFID Security and Provably Secure RFID Grouping-proof Protocols", Int. Journal of Internet Technology and Secured Transactions, Vol. 2, pp. 222-249, 2010. Citation=NA(10/12/20)
- Kwangjo Kim, Keynote Address On ¡°Asian Academic Activities in Information Security and Cryptography¡±, IEEE ICITIS2010 (2010 International Conference on Information Theory and Information Security), Dec. 17-19, Beijing, China
- Sungmok Shin, Junhyun Yim, and Kwangjo Kim, "Authenticated and DoS-resilient channel assignment mechanism for wireless mesh networks", Symposium on Cryptography and Information Security 2010 (SCIS 2010), Jan. 19-22, 2009, Takamatsu, Japan. Citation=Google scholar: 0 (12/02/06)
- Jangseong Kim, Myunghan Yoo, and Kwangjo Kim, "A privacy-preserving kid's safety care service based on sensor network in u-City", Symposium on Cryptography and Information Security 2010 (SCIS 2010), Jan. 19-22, 2009, Takamatsu, Japan. Citation=Google scholar: 0 (12/02/06)
- Dang Nguyen Duc, Jangseong Kim, and Kwangjo Kim, "Scalable Grouping-proof Protocol for RFID Tags", Symposium on Cryptography and Information Security 2010 (SCIS 2010), Jan. 19-22, 2009, Takamatsu, Japan. Citation=Google scholar: 0 (12/02/06)
2009
- Imsung Choi, Zeen Kim, and Kwangjo Kim, "DoS-Resilient Authenticated Key Agreement Scheme between Actor and Sensor nodes in Wireless Sensor and Actor Network", Joint Workshop on Information Security 2009, Aug. 6-7, 2009, Kaohsiung, Taiwan. Citation=NA(09/10/26)
- Hyewon Park, Tomoyuki Asano, and Kwangjo Kim, "Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider", 2009 Symposium on Cryptography and Information Security (SCIS 2009), Jan. 20-23, 2009, Otsu, Japan. Citation=NA(09/10/26)
- Myunghan Yoo, Jangseong Kim, and Kwangjo Kim, "A Secure Clustering Scheme over an Energy-aware Routing Protocol for Monitoring Critical Conditions", 2009 Symposium on Cryptography and Information Security (SCIS 2009), Jan. 20-23, 2009, Otsu, Japan. Citation=Google scholar: 0 (12/02/06)
- Minhea Kwak, Jangseong Kim, and Kwangjo Kim, "Desynchronization and Cloning resistant light-weight RFID authentication protocol using integer arithmetic for low-cost tags", 2009 Symposium on Cryptography and Information Security (SCIS 2009), Jan. 20-23, 2009, Otsu, Japan. Citation=Google scholar: 2 (12/02/06)
2008
- Kyusuk Han, Chanyeob Yoon, and Kwangjo Kim, "New Design of Generic Authentication Architecture Using ID-based Cryptosystem in 3GPP", Triangle Symposium on Advanced ICT 2008 (TriSAI 2008), Oct. 6-9, 2008, Daejeon, Korea. Citation=Google scholar: 0 (12/02/06)
- Divyan M. Konidala, Hyunrok Lee, Dang Nguyen Duc, and Kwangjo Kim, "Security and User Privacy for Mobile-RFID Applications in Public Zone", Triangle Symposium on Advanced ICT 2008 (TriSAI 2008), Oct. 6-9, 2008, Daejeon, Korea. Citation=Google scholar: 0 (12/02/06)
- Zeen Kim and Kwangjo Kim, "Mutually Authenticated Key Exchange Protocol For Computationally Limited Devices", Triangle Symposium on Advanced ICT 2008 (TriSAI 2008), Oct. 6-9, 2008, Daejeon, Korea. Citation=Google scholar: 0 (12/02/06)
- Dang Nguyen Duc, and Kwangjo Kim, "How to Exchange Secret on Low-cost Devices", Triangle Symposium on Advanced ICT 2008 (TriSAI 2008), Oct. 6-9, 2008, Daejeon, Korea. Citation=Google scholar: 0 (12/02/06)
- Jin Li and Kwangjo Kim, "Digital Signatures: Status and Challenge", Triangle Symposium on Advanced ICT 2008 (TriSAI 2008), Oct. 6-9, 2008, Daejeon, Korea. Citation=Google scholar: 0 (12/02/06)
- Jin Li and Kwangjo Kim, "Fuzzy Identity-Based Key-Insulated Cryptosystem", The 3rd Joint Workshop on Information Security, pp.414-424, July 10-11, 2008, Seoul, Korea. Citation=Google scholar: 0 (12/02/06)
- Sungbae Ji, Zeen Kim, and Kwangjo Kim, "Design of an RFID-embedded e-ID System for Privacy Protection", Proc. Of SCIS 2008, Jan. 22-25, 2008, Miyajaki, Japan. Citation=Google scholar: 0 (12/02/06)
- Kyusuk Han, Chanyeob Yeun, and and Kwangjo Kim, "Design of secure VoIP using ID-Based Cryptosystem", Proc. Of SCIS 2008, Jan. 22-25, 2008, Miyajaki, Japan. Citation=Google scholar: 0 (12/02/06)
- Sungjune Yoon, Tomoyuki Asano, Masafumi Kusakawa, Hyunrok Lee, and Kwangjo Kim, "Hybrid Multi-user Broadcast Authentication for Wireless Sensor Networks", Proc. Of SCIS 2008, Jan. 22-25, 2008, Miyajaki, Japan. Citation=Google scholar: 3 (12/02/06)
- Hanyoung Noh, Jangseong Kim, Chanyeob Yeun, and Kwangjo Kim, "New Polymorphic Worm Detection based on Instruction Distribution and Signature", Proc. Of SCIS 2008, Jan. 22-25, 2008, Miyajaki, Japan. Citation=Google scholar: 0 (12/02/06)
- Hyewon Park, Kyusuk Han, Chanyeob Yeun and, and Kwangjo Kim, "Improving Choi et al.'s ID-based Authenticated Group Key Agreement Scheme at PKC2004", Proc. Of SCIS 2008, Jan. 22-25, 2008, Miyajaki, Japan. Citation=Google scholar: 1 (12/02/06)
- Hyeran Mun, Kyusuk Han, Chanyeob Yeun and, and Kwangjo Kim, "Yet Another Intrusion Detection System against Insider Attacks", Proc. Of SCIS 2008, Jan. 22-25, 2008, Miyajaki, Japan. Citation=Google scholar: 2 (12/02/06)
2007
- Chunhui Wu, Xiaofeng Chen, Fangguo Zhang, Hyunrok Lee, and Kwangjo Kim, "Remarks on Receipt-free Auction/Voting Schemes Using Commitment", Chinacrypt '07, 272-282, Science Press, 2007. Citation=Google scholar: 0 (12/02/06)
- Chanyeob Yeun, Kyusuk Han, and Kwangjo Kim, "New Novel Approaches for Securing VoIP Applications", The Sixth International Workshop for Applied PKC IWAP, Dec 3-4, 2007, Perth, Australia. Citation=Google scholar: 2 (12/02/06)
- Sungjune Yoon, Hyunrok Lee, Sungbae Ji, and Kwangjo Kim, "A User Authentication Scheme with Privacy Protection for Wireless Sensor Networks", The 2nd Joint Workshop on Information Security, pp.233-244, Aug. 6-7, 2007, Tokyo, Japan. Citation=Google scholar: 5 (12/02/06)
- Kyusuk Han and Kwangjo Kim, "Enhancing Privacy and Authentication for Location Based Service using Trusted Authority", The 2nd Joint Workshop on Information Security, pp.219 - 232, Aug. 6-7, 2007, Tokyo, Japan. Citation=Google scholar: 8 (12/02/06)
- Zeen Kim, Jangseong Kim, and Kwangjo Kim, "Key Predistribution Scheme for Wireless Sensor Networks with Higher Connectivity", Proc. Of SCIS 2007, Abstracts pp.235, Jan. 23-26, 2007, Sasebo, Japan. Citation=Google scholar: 0 (12/02/06)
- Youngjoon Seo, Tomoyuki Asano, Hyunrok Lee, and Kwangjo Kim, "A Lightweight Protocol Enabling Ownership Transfer and Granular Data Access of RFID Tags", Proc. Of SCIS 2007, Abstracts pp.122, Jan. 23-26, 2007, Sasebo, Japan. Citation=Google scholar: 14 (12/02/06)
- Duc-Liem Vo and Kwangjo Kim, "Cryptanalysis of ID-Based Remote Authentication with Smart Cards on Open Distributed System from Elliptic Curve Cryptography", Proc. Of SCIS 2007, Abstracts pp.307, Jan. 23-26, 2007, Sasebo, Japan. Citation=Google scholar: 1 (12/02/06)
- Dang Nguyen Duc and Kwangjo Kim, "Securing HB+ against GRS Man-in-the-Middle Attack", Proc. Of SCIS 2007, Abstracts pp.123, Jan. 23-26, 2007, Sasebo, Japan. Citation=Google scholar: 38 (12/02/06)
- Hyunrok Lee and Kwangjo Kim, "A Secure RFID Reader Protocol based on SLRRP", Proc. of SCIS 2007, Abstracts pp.339, Jan. 23-26, 2007, Sasebo, Japan. Citation=Google scholar: 1 (12/02/06)
- Divyan M. Konidala and Kwangjo Kim, "Security for RFID-based Applications in Smart Home Environment", Proc. of SCIS 2007, Abstracts pp.120, Jan. 23-26, 2007, Sasebo, Japan. Citation=Google scholar: 2 (12/02/06)
2006
- Dang Nguyen Duc, Jaemin Park, Hyunrok Lee, and Kwangjo Kim, "Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning" (Paper, Presentation), Proc. of SCIS 2006, Abstracts pp.97, Jan. 17-20, 2006, Hiroshima, Japan. Citation=Google scholar: 169 (12/02/06)
- Divyan M. Konidala and Kwangjo Kim "Mobile RFID Security Issues"(Paper, Presentation), Proc. of SCIS 2006, Abstracts pp.166, Jan. 17-20, 2006, Hiroshima, Japan. Citation=Google scholar: 18 (12/02/06)
- Sangshin Lee, Tomoyuki Asano, and Kwangjo Kim, "RFID mutual Authentication Scheme based on Synchronized Secret Information" (Paper, Presentation), Proc. of SCIS 2006, Abstracts pp.98, Jan. 17-20, 2006, Hiroshima, Japan. Citation=Google scholar: 67 (12/02/06)
2005
- Seok-kyu Kang, Tomoyuki Asano, and Kwangjo Kim, "A Protocol of Unlinkable Transaction for Preserving Customer Privacy", Proc. of SCIS 2005, Jan. 25-28 Maiko Kobe, Japan. Citation=Google scholar: 2 (12/02/06)
- Ping Wang, Seok-kyu Kang, and Kwangjo Kim, "Tamper Resistant Software Through Dynamic Integrity Checking", Proc. of SCIS 2005, Jan. 25-28 Maiko Kobe, Japan. Citation=Google scholar: 8 (12/02/06)
- Jeongkyu Yang and Kwangjo Kim, "Security and Privacy on Authentication for Low-cost RFID", Proc. of SCIS 2005, Jan. 25-28 Maiko Kobe, Japan. Citation=Google scholar: 23 (12/02/06)
- Dang Nguyen Duc, Zeen Kim, and Kwangjo Kim, "A New Provably Secure Transitive Signature Scheme", Proc. of SCIS 2005, Jan. 25-28 Maiko Kobe, Japan. Citation=Google scholar: 0 (12/02/06)
2004
- SungJun Min, Go Yamamoto, and Kwangjo Kim, "On the Security of NTRUSign Signature Scheme", Proc. of SCIS 2004, vol 1/2, pp.625-630, Jan. 27-30, 2004, Sendai, Japan. Citation=Google scholar: 0 (12/02/06)
- Zeen Kim and Kwangjo Kim, "Provably-Secure Identification Scheme based on Braid Group", Proc. of SCIS 2004, vol. 1/2, pp.29-34, Jan. 27-30, 2004, Sendai, Japan. Citation=Google scholar: 7 (12/02/06)
- Jiqiang Lv, Kui Ren, Xiaofeng Chen, and Kwangjo Kim, "Ring Authenticated Encryption: A New Type of Authenticated Encryption", Proc. of SCIS 2004, vol. 1/2, pp.1179-1184, Jan. 27-30, Sendi, Japan. Citation=Google scholar: 12 (12/02/06)
- Konidala M. Divyan, Robert H. Deng, Jianying Zhou, and Kwangjo Kim, "A Secure and Privacy Enhanced Location-based Service Transaction Protocol in Ubiquitous Computing Environment", Proc. of SCIS 2004, vol. 1/2, pp.931-936, Jan. 27-30, 2004, Sendai, Japan. Citation=Google scholar: 3 (12/02/06)
2003
- Hyunrok Lee and Kwangjo Kim, "An Adaptive Authentication Protocol based on Reputation for Peer-to-Peer System", Proc. of SCIS 2003, vol 1/2, pp.661-666, Jan. 26-29, 2003, Itaya, Japan. Citation=Google scholar: 19 (12/02/06)
- Jeongsung Kim, Soogil Choi, Kwangjo Kim, and Colin Boyd, "Anonymous Authentication Protocol for Dynamic Groups with Power-Limited Devices", Proc. of SCIS 2003, vol 1/2, pp.405-410, Jan. 26-29, 2003, Itaya, Japan. Citation=Google scholar: 8 (12/02/06)
- Kyusuk Han, Fangguo Zhang, and Kwangjo Kim, "A Secure Testment Revealing Protocol", Proc. of SCIS 2003, vol 1/2, pp.399-404, Jan. 26-29, 2003, Itaya, Japan. Citation=Google scholar: 1 (12/02/06)
- Fangguo Zhang, Byoungcheon Lee, and Kwangjo Kim, "Exploring Signature Schemes with Subliminal Channel", Proc. of SCIS 2003, vol 1/2, pp.245-250, Jan. 26-29, 2003, Itaya, Japan. Citation=Google scholar: 23 (12/02/06)
- Duc Liem Vo, Fangguo Zhang, and Kwangjo Kim, "A New Threshold Blind Signature Scheme from Pairings", Proc. of SCIS 2003, vol 1/2, pp.233-238, Jan. 26-29, 2003, Itaya, Japan. Citation=Google scholar: 33 (12/02/06)
- Wooseok Ham, Kwangjo Kim, and Hideki Imai, "Yet Another Strong Sealed-Bid Auctions", Proc. of SCIS 2003, vol 1/2, pp.11-16, Jan. 26-29, 2003, Itaya, Japan. Citation=Google scholar: 11 (12/02/06)
- Songwon Lee, Jeongkyu Yang, and Kwangjo Kim, "Threshold Password-Based Authentication Using Bilinear Pairings", Proc. of CSS 2003, pp.19-24, Oct. 29-31, 2003 Kitakyushu, Japan, IPSJ. Citation=Google scholar: 3 (12/02/06)
- Chul-Joon Choi, Zeen Kim, and Kwangjo Kim, "Schnorr Signature Scheme with Restricted Signing Capability", Proc. of CSS 2003, pp.385-390, Oct. 29-31,2003 Kitakyushu, Japan, IPSJ. Citation=Google scholar: 4 (12/02/06)
- Hwasun Chang and Kwangjo Kim, "Securing AES against Second-Order DPA by Simple Fixed-Value Masking", Proc. of CSS 2003, pp.145-150, Oct. 29-31, 2003 Kitakyushu, Japan, IPSJ. Citation=Google scholar: 8 (12/02/06)
- ByeongGon Kim, SungJun Min, and Kwangjo Kim, "Fair Tracing based on VSS and Blind Signature without Trustees", Proc. of CSS 2003, pp.37-42, Oct. 29-31,2003 Kitakyushu, Japan, IPSJ. Citation=Google scholar: 2 (12/02/06)
- Jaehyrk Park, Sukkyu Gang, and Kwangjo Kim, "Group Mutual Exclusion based Secure Distributed Protocol", Proc. of CSS 2003, pp.445-450, Oct.29-31,2003 Kitakyushu, Japan, IPSJ. Citation=Google scholar: 2 (12/02/06)
- JoongMan Kim and Kwangjo Kim, "Intrusion-Resilient Key-Evolving Schnorr Signature", Proc. of CSS2003, pp.379-384, Oct. 29-31,2003 Kitakyushu, Japan, IPSJ. Citation=Google scholar: 0 (12/02/06)
2002
- Byoungcheon Lee and Kwangjo Kim, "Fair Exchange of Digital Signature Using Conditional Signature", Proc. of SCIS 2002, vol 1/2, pp.179-184, Jan. 29 - Feb. 1, 2002, Shirahama, Japan. Citation=Google scholar: 9 (12/02/06)
- Manho Lee, Hyunrok Lee, and Kwangjo Kim, "A Micro-payment System for Multiple-Shopping", Proc. of SCIS 2002, vol 1/2, pp.229-234, Jan. 29 - Feb. 1, 2002, Shirahama, Japan. Citation=Google scholar: 18 (12/02/06)
- Myungsun Kim, Heesun Kim, and Kwangjo Kim, "A New Identification Scheme based on the Gap Diffie-Hellman Problem", Proc. of SCIS 2002, vol 1/2, pp.349-352, Jan. 29 - Feb. 1, 2002, Shirahama, Japan. Citation=Google scholar: 11 (12/02/06)
- Jaegwan Park and Kwangjo Kim, "A New Approach of X.509v3 Certificate for Full Path Validation", Proc. of SCIS 2002, vol 2/2, pp.1155-1160, Jan. 29 - Feb. 1, 2002, Shirahama, Japan. Citation=Google scholar: 0 (12/02/06)
- Kwangjo Kim, "Votopia will be Coming Soon", Night Session of SCI S2002, Jan. 31, 2002, Shirahama, Japan. Citation=Google scholar: 0 (12/02/06)
- Kwangjo Kim et. al, "Votopia is Ready to Serve", Rump Session of Eurocrypt 2002, April 30, Amsterdam, Netherlands. Citation=Google scholar: 0 (12/02/06)
- Kwangjo Kim, "Votopia will be Continued" Rump session of Crypto2002, Aug. 20, 2002, UCSB. Citation=Google scholar: 0 (12/02/06)
2001
- Hyuncheol Park and Kwangjo Kim, "Visible Watermarking using Verifiable Digital Seal Image", Proc. of SCIS2001, vol 1/2, pp.103-108, Jan. 23-26, 2001, Oiso, Japan. Citation=Google scholar: 6 (12/02/06)
- Jaeseung Go and Kwangjo Kim, "Wireless Authentication Protocols Preserving User Anonymity", Proc. of SCIS2001, vol 1/2, pp.159-164, Jan. 23-26, 2001, Oiso, Japan. Citation=Google scholar: 53 (12/02/06)
- Byoungcheon Lee, Heesun Kim, and Kwangjo Kim, "Strong Proxy Signature and its Applications", Proc. of SCIS2001, vol 2/2, pp.603-608, Jan. 23-26, 2001, Oiso, Japan. Citation=Google scholar: 379 (12/02/06)
- Heesun Kim, Joonsang Baek, Byoungcheon Lee, and Kwangjo Kim, "Computing with Secrets for Mobile Agent using One-time Proxy Signature", Proc. of SCIS2001, vol 2/2, pp.845-850, Jan. 23-26, 2001, Oiso, Japan. Citation=Google scholar: 15 (12/02/06)
- Kwangjo Kim, Jinho Kim and Byoungcheon Lee, "No More Panic in Florida : Reality or Dream?", Rump Session of Crypto2001, Aug. 21, 2001, UCSB. Citation=Google scholar: 0 (12/02/06)
- Kwangjo Kim "Design and Implementation of Internet Voting System to the Worldwide Level", WOTE2001, Aug. 26-28, 2001, Marconi Conference Center, San Francisco. Citation=Google scholar: 0 (12/02/06)
2000
- Byoungcheon Lee and Kwangjo Kim, "Receipt-free Electronic Voting Through Collaboration of Voter and Honest Verifier", Proc. of JWISC2000, pp.101-108, Jan. 25-26, 2000, Okinawa, Japan. Citation=Google scholar: 67 (12/02/06)
- Sunyoung Lee, Kwangjo Kim, and Hideki IMAI, "A New Hash Function Based on SQH and NHa", Proc. of JWISC2000, Jan. 25-26, 2000, Okinawa, Japan. Citation=Google scholar: 0 (12/02/06)
- Joonsang Baek, Kwangjo Kim, and Tsutomu Matsumoto, "On the Significance of Unknown Key Share Attacks Using DSKS Property", Proc. of SCIS2000, Jan. 26-28, 2000, Okinawa, Japan. Citation=Google scholar: 0 (12/02/06)
- Moonseog Seo and Kwangjo Kim, "Another Improved SET : Slim SET", Proc. of SCIS2000, Jan. 26-28, 2000, Okinawa, Japan. Citation=Google scholar: 2 (12/02/06)
- Weonkeun Huh and Kwangjo Kim, "t Mixes by User`s Selection", Proc. of SCIS2000, Jan. 26-28, 2000, Okinawa, Japan. Citation=Google scholar: 0 (12/02/06)
- Kyubeom Hwang, Joonsang Baek, Kwangjo Kim, and Charles Ahn, "Trend of Malicious Codes and their Countermeasures", Proc. of SCIS2000, Jan. 26-28, 2000, Okinawa, Japan. Citation=Google scholar: 0 (12/02/06)
1999
1998
- Mi-Ra Kim, Ji-Hwan Park, Sang-Woo Park, and Kwangjo Kim, "A study on Secret Sharing Scheme Using Visual Cryoptography", Proc. of SCIS97, SCIS97-25B, Jan. 29 - Feb. 1, 1997, Fukuoka, Japan. Citation=Google scholar: 0 (12/02/06)
1997
- Sang Woo Park, Seongtaek Chee, and Kwangjo Kim, "Semi-bent Functions and Strict Uncorrelated Criterion Revisited", Proc. of International Conference on Cryptology and Information Security, pp.104-109, Dec. 19-21, 1996, Kaoshiung, Taowan. Citation=Google scholar: 0 (12/02/06)
- Sang Woo Park, Sangjin Lee, and Kwangjo Kim, "How to Use Exponent Permutations in Cryptography-classification and Applications", Proc. of International Conference on Cryptology and Information Security, pp.110-116, Dec. 19-21, 1996, Kaoshiung, Taowan. Citation=Google scholar: 0 (12/02/06)
1996
- Kwangjo Kim, Sangjin Lee, Sangjun Park, and Daiki Lee, "How to Strengthen DES against Two Robust Attacks", Proc. of 1995 Japan-Korea Joint Workshop on Information Security and Cryptology (JW-ISC'95), pp.173-182, Jan. 24-27, 1995, Inuyama, Japan. (Postscript). Citation=Google scholar: 4 (12/02/06)
- Sangjin Lee, Soo Hak Sung, and Kwangjo Kim, "An Efficient Method to Find the Linear Expressions for Linear Cryptanalysis", Proc. of 1995 Japan-Korea Joint Workshop on Information Security and Cryptology (JW-ISC'95), pp.183-190, Jan. 24-27, 1995, Inuyama, Japan.(Postscript). Citation=Google scholar: 0 (12/02/06)
- Sangjin Lee, Seung-Cheol Goh, Kwangjo Kim, and Daiki Lee, "BRM Sequence Generators based on the field GF(2^n) for DSP Implementations", Proc. of 1995 IEEE International Symposium on Information Theory, pp.48, Sep. 17-22, 1995, Whistler, Canada. Citation=Google scholar: 0 (12/02/06)
- Sangjoon Park, Yongdae Kim, Sangjin Lee, and Kwangjo Kim, "An Attack on Tanaka's Non Interactive Key Sharing Scheme", Proc. of 1995 IEEE International Symposium on Information Theory, pp.356, Sep. 17-22, 1995, Whistler, Canada. Citation=Google scholar: 0 (12/02/06)
- Sangjoon Park, Yongdae Kim, Sangjin Lee, and Kwangjo Kim, "Attacks on Tanaka's Non-interactive Key Distribution Scheme", Proc. of SCIS'95 (Symposium on Cryptography and Information Security), Jan. 26-27, 1995, Inuyama, Japan. Citation=Google scholar: 0 (12/02/06)
- Kwangjo Kim, Sangjin Lee, Sangjoon Park, and Daiki Lee, "Securing DES S-boxes against Three Robust Cryptanalysis", Workshop Record of SAC'95 (Selected Areas in Cryptology), pp.145-157, May 18-19, 1995, Carleton Univ, Canada.(Postscript). Citation=Google scholar: 14 (12/02/06)
- Seongtaek Chee, Sangjin Lee, and Kwangjo Kim, "Integer Addition over GF(2) and its Cryptographic Properties", Proc. of Third International Conference on Finite Fields and Applications, pp.7, June 11-14, 1995, Univ. of Glasgow, Scotland. Citation=Google scholar: 0 (12/02/06)
1994
- Kwangjo Kim, Sangjun Park, and Sangjin Lee, "Reconstruction of s2DES S-boxes and their Immunity to Differential Cryptanalysis", Proc. of JW-ISC'93, pp.32.01-32.10, Oct. 24-26, 1993.(Postscript), Seoul, Korea. Citation=Google scholar: 29 (12/02/06)