Cryptology and Information Security Laboratory
background image

Contents

Publication

Referred International Journal

2012

  • Jin Li, Fangguo Zhang,Xiaofeng Chen,Kwangjo Kim, Duncan S. Wong, "Generic security-amplifying methods of ordinary digital signatures", Information Sciences, Vol. 201, pp. 128-139, 2012, Elsevier. [SCI, IF=2.147], Citation=Web of Science: 0 Google Scholar: 0(12/02/06)
  • Divyan M. Konidala, Made H. Dwijaksara, Kwangjo Kim, Dongman Lee, Daeyoung Kim, Byoungcheon Lee, and Soontae Kim, Resuscitating Privacy-Preserving Mobile Payment with Customer in Complete Control, Journal of Personal and Ubiquitous Computing (PUC). Vol.16, pp.643-654, 2012. Springer [SCIE, IF=0.938], Citation=Web of Science: 0 Google Scholar: 0(12/02/06)
  • Jangseong Kim, Kwangjo Kim ,  Jonghyuk Park,  and Taeshik Shon, ¡°A Scalable and Privacy-Preserving Child-Care and Safety Service in a Ubiquitous Computing Environment¡±, Mathematical and Computer Modeling, Vol.55, No 1-2, pp.45-57, Elsevier . [SCIE, IF=1.346] Citation=Web of Science: 0 Google Scholar: 0(12/02/06)
  • Kyusuk Han, Kwangjo Kim, Wook Choi, Hyo Hyun Choi, Jungtaek Seo, and Taeshik Son, ¡°Efficient Authenticated Key Agreement Protocols for Dynamic Sensor Networks¡±, Ad Hoc and Sensor Wireless Network, Vol. 14, No.3-4, pp.251-269, Old City Publishing. [SCIE, IF=0.400] Citation=Web of Science: 0 Google Scholar: 0(12/02/06)
2011 2010 2009 2008 2007 2006 2005 2004
  • Xiaofeng Chen, Fangguo Zhang, and Kwangjo Kim, "Limited Verifier Signature Scheme from Bilinear Pairings", Proc. of ACNS 04, LNCS 3089, pp.135-148, Jun. 8-11, 2004, Springer-Verlag, Yellow Mountain, China. [SCIE, IF=0.513], Citation=Web of Science: 0 Google Scholar: 14 (12/02/06)
  • Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Kim, and So Ran Ine, "Threshold Password-Based Authentication using Bilinear Pairings", Proc. of European PKI, LNCS 3093, pp.350-363, Jun. 25-26, 2004, Springer-Verlag, Samos island, Greece. [SCIE, IF=0.513], Citation=Web of Science: 3 Google Scholar: 3 (12/02/06)
  • SungJun Min, Go Yamamoto, and Kwangjo Kim, "Weak Property of Malleability in NTRUSign", Proc. of ACISP04, LNCS 3108, pp.379-390, July 13-15, 2004, Springer-Verlag, Sydney, Australia. [SCIE, IF=0.513], Citation=Web of Science: 0 Google Scholar: 10 (12/02/06)
  • Xiaofeng Chen, Fangguo Zhang, and Kwangjo Kim, "Chameleon Hashing without Key Exposure", Proc. of the 7th International Information Security Conference (ISC'04), LNCS 3225, pp.87-98, 2004, Springer-Verlag. Palo Alto, USA, [SCIE, IF=0.513], Citation=Web of Science: 15 Google Scholar: 36 (12/02/06)
  • Kui Ren, Hyunrok Lee, and Kwangjo Kim, "Efficient Authenticated Key Agreement Protocol for Dynamic Groups", Proc. of WISA2004, LNCS 3325, pp.233-247, Aug. 23-25, 2004, Jeju, Korea. [SCIE, IF=0.513], Citation=Web of Science: 1 Google Scholar: 7 (12/02/06)
  • Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, and Kwangjo Kim, "New ID-based Threshold Signature Scheme from Bilinear Pairings", Proc. of INDOCRYPT2004, LNCS 3348, pp.371-383, Dec. 20-22, 2004, Springer-Verlag, Chennai(Madras), India. [SCIE, IF=0.513], Citation=Web of Science: 17 Google Scholar: 42 (12/02/06)
  • Kui Ren,Tieyan Li, Zhiguo Wan, Feng Bao, Robert Deng, and Kwangjo Kim, "Highly Reliable Trust Establishment Scheme in Ad Hoc Networks" Computer Networks, Vol.45, pp.687-699, 2004, Elsevier. [SCIE, IF=1.226], Citation=Web of Science: 22 Google Scholar: 74(12/02/06)
2003 2002 2001 2000 1999 ~1997
  • Sungmo Park, Sangjin Lee, Soo Hak Sung, and Kwangjo Kim, "Further Enumerating Correlation Immune Functions", Information Processing Letter, Vol.61, pp.209-212, 1997. [SCIE, IF=0.252] Citation=Web of Science: 0 Google Scholar: 0 (12/02/06)
  • Seongtaek Chee, Sangjin Lee, Kwangjo Kim, and Daeho Kim, "On the Correlation Immune Functions with Controllable Nonlinearity", ETRI Journal, Vol.19, No.4, pp.389-401, Dec. 1997. [SCI, IF=0.936] Citation=Web of Science: 0 Google Scholar: 9 (12/02/06)
  • Sangjoon Park, Sangwoo Park, Kwangjo Kim, and Dongho Won, "Two Efficient RSA Multisignature Schemes", Proc. of ICICS'97, LNCS 1334, pp.217-222, Dec. 11-14,1997. [SCIE, IF=0.515], Citation=Web of Science: 0 Google Scholar: 10 (12/02/06)
  • Seongtaek Chee, Sangjin Lee, and Kwangjo Kim, "Semi-bent Functions", Proc. of ASIACRYPT'94, LNCS 917, pp.107-118, 1995. Springer-Verlag. (Postscript). [SCIE, IF=0.515], Citation=Web of Science: 4 Google Scholar: 36 (12/02/06)
  • Eon-kyong Lee, Kwangjo Kim, and U-Jin Choi, "A Construction of the Simplest Pseudorandom Permutation Generator", Computers and Mathematics with Applications, Vol.29, No.8, pp. 19-25, 1995.[SCI, IF=0.997], Citation=Web of Science: 0 Google Scholar: 0 (12/02/06)
  • Kwangjo Kim, "Construction of DES-like S-boxes based on Boolean Functions Satisfying the SAC", Proc. of ASIACRYPT'91, LNCS 739, pp.59-72, 1991, Springer-Verlag, Japan. (Postscript). [SCIE, IF=0.515], Citation=Web of Science: 0 Google Scholar: 22 (12/02/06)
  • Kwangjo Kim, Tsutomu Matsumoto, and Hideki Imai, "On Generating Cryptographically Desirable Substitutions", Trans. of IEICE, Vol.E.73, No.7, pp.1031-1035, Jul., 1990.(Postscript).[SCIE, IF=0.287] Citation=Web of Science: 0 Google Scholar: 4 (12/02/06)
  • Kwangjo Kim, Tsutomu Matsumoto, and Hideki Imai, "A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion", Proc. of CRYPTO'90, LNCS 537, pp.545-553, 1990, Springer-Verlag, UCSB, USA. (Postscript). [SCIE, IF=0.515], Citation=Web of Science: 1 Google Scholar: 14 (12/02/06)
Cryptology and Information Security Laboratory Korea Advanced Institute of Science and Technology, Computer Science Department N5 Building, 335 Gwahak-ro, Yuseong-gu, Daejeon, 305-701, Republic of Korea Tel: +82-42-350-7850, Fax: +82-42-350-7859