Contents
Publication
2012
- Jin Li, Fangguo Zhang,Xiaofeng Chen,Kwangjo Kim, Duncan S. Wong, "Generic security-amplifying methods of ordinary digital signatures",
Information Sciences, Vol. 201, pp. 128-139, 2012, Elsevier. [SCI,
IF=2.147], Citation=Web of Science: 0 Google Scholar: 0(12/02/06)
- Divyan M. Konidala, Made
H. Dwijaksara, Kwangjo Kim, Dongman
Lee, Daeyoung Kim, Byoungcheon
Lee, and Soontae Kim, Resuscitating
Privacy-Preserving Mobile Payment with Customer in Complete Control,
Journal of Personal and Ubiquitous Computing (PUC). Vol.16, pp.643-654,
2012. Springer [SCIE, IF=0.938], Citation=Web of Science: 0 Google
Scholar: 0(12/02/06)
- Jangseong Kim, Kwangjo Kim , Jonghyuk
Park, and Taeshik
Shon, ¡°A Scalable and Privacy-Preserving
Child-Care and Safety Service in a Ubiquitous Computing Environment¡±,
Mathematical and Computer Modeling, Vol.55, No 1-2, pp.45-57, Elsevier . [SCIE,
IF=1.346] Citation=Web of Science: 0 Google
Scholar: 0(12/02/06)
- Kyusuk Han, Kwangjo Kim, Wook Choi, Hyo Hyun Choi, Jungtaek Seo, and Taeshik Son, ¡°Efficient Authenticated Key Agreement
Protocols for Dynamic Sensor Networks¡±, Ad Hoc and Sensor Wireless
Network, Vol. 14, No.3-4, pp.251-269, Old City Publishing. [SCIE, IF=0.400]
Citation=Web of Science:
0 Google Scholar: 0(12/02/06)
2011
- Kyusuk Han, Kwangjo Kim, and Taeshik Shon, "Enhancing Credibility of Location Based Service using Multiple Sensing Technologies",
IEICE Trans. on Information and System, Vol.E94-D, No.6, 2011. [SCIE,
IF=0.287], Citation=Web of Science: 0 Google Scholar: 0(12/02/06)
- Xiaofeng Chen, Qianhong Wu, Fangguo Zhang, Haibo Tian, Baodian Wei, Byoungcheon Lee, Hyunrok Lee, and Kwangjo Kim, ¡°New receipt-free voting scheme using double-trapdoor commitment¡±,
Information Sciences, Vol. 181, No. 8, pp. 1493-1502, 2011, Elsevier.
[SCI, IF=2.147], Citation=Web of Science: 0 Google Scholar: 0(12/02/06)
- Dang Nguyen Duc and Kwangjo Kim, "Defending RFID Authentication Protocols against DoS Attacks",
Computer Communications, Vol. 34, No. 2, pp.384-390, 2011. [SCIE,
IF=0.884], Citation=Web of Science: 0 Google Scholar: 9(12/02/06)
- Jangseong Kim, Taeshik Shon, and Kwangjo Kim, ¡°Location-aware and privacy-preserving approach for child-care and safety in ubiquitous computing environment¡±,
IEICE Trans. on Communications, Vol. E94-B, No. 3, pp.686-689, Mar
2011. [SCI, IF=0.359], Citation=Web of Science: 0 Google Scholar:
0(12/02/06)
- Divyan M. Konidala, Kwangjo Kim, Made Harta Dwijaksara, and Daeyoung Kim, "Diffusion-Confusion based Light-Weight Security for Item-RFID Tag-Reader Communication",
Journal of Internet Technology (JIT). Accepted on 08/09/2010, 2011.
[SCIE, IF=0.2334], Citation=Web of Science: 0 Google Scholar: 0
(12/02/06)
- Kyusuk Han, Chan Yeob Yeun, Taeshik Shon, Jonghyuk Park, and
Kwangjo Kim, "A Scalable and Efficient Key Escrow Model for Lawful
Interceptions of IDBC based Secure Communication", Int¡¯l J. of
Communication System, Special Issue on Ubiquitous Computing for
Communications and Broadcasting, Vol.24, No.4, pp.461-472, 2011, John
Wiley & Sons. [SCIE, IF=0.406], Citation=Web of Science: 0 Google
Scholar: 0(12/02/06)
- Kyusuk Han, Taeshik Son, and Kwangjo Kim, "Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security",
IEICE Trans. on Communications, Vol.E94B, No.8, pp.2235-2238, 2011.
[SCI, IF=0.359], Citation=Web of Science: 0 Google Scholar: 0(12/02/06)
- Xiaofeng Chen, Fangguo Zhang, Haibo Tan, Baodian Wei, and Kwangjo Kim, "Discrete logarithm based chameleon hashing and signatures without key exposure"",
Computers & Electrical Engineering, Vol.37, No.4, pp.614-623, 2011,
Elsevier [SCIE, IF=0.284], Citation=Web of Science: 0 Google Scholar:
0(12/02/06)
2010
- Kyusuk Han, Taeshik Shon, and Kwangjo Kim, "Efficient Mobile Sensor Authentication In Smart Home and WPAN",
IEEE Trans. on Consumer Electronics, Vol.56, Issue 2, pp.591-596, May,
2010. [SCI, IF=0.367], Citation=Web of Science: 2 Google Scholar:
1(12/02/06)
- Kyusuk Han, Kwangjo Kim, and Taeshik Shon, "Untraceable Mobile Node Authentication in WSN", Sensors, Vol. 10, No. 5, pp.4410-4429, 2010. [SCIE, IF=1.821], Citation=Web of Science: 0 Google Scholar: 3 (12/02/06)
- Jin Li and Kwangjo Kim, "Hidden attribute-based signatures without anonymity revocation",
Information Sciences, Vol.180, pp.1681-1689, 2010, Elsevier. [SCI,
IF=2.147], Citation=Web of Science: 0 Google Scholar: 6(12/02/06)
- Duc-Liem Vo, Hyunrok Lee, Chan-Yeob Yeun, and Kwangjo Kim, "Enhancements of Authenticated Multiple Key Exchange Protocol based on Bilinear Pairings",
Computers & Electrical Engineering, Vol.36, pp.155-159, 2010,
Elsevier. [SCIE, IF=0.284], Citation=Web of Science: 3 Google Scholar:
10(12/02/06)
- Dang Nguyen Duc and Kwangjo Kim, "On the Security of RFID Group Scanning Protocols",
IEICE Trans. on Information and Systems, Vol.E93-D, No.3, pp.528-530,
Mar. 2010. [SCIE, IF=0.287], Citation=Web of Science: 0 Google Scholar:
4(12/02/06)
2009
- Jiquiang Lv, Kui Ren, Xiaofeng Chen, and Kwangjo Kim, "The Ring Authenticated Encryption Scheme--how to provide a clue wisely",
Information Sciences, Vol.179, pp.161-168, Elsevier, 2009. [SCI,
IF=2.147], Citation=Web of Science: 1 Google Scholar: 1(12/02/06)
2008
- Chanyeob Yoon, Kyusuk Han, Vo Duc Liem, and Kwangjo Kim, "Secure Authenticated Group Key Agreement Protocol in the MANET Environment",
Information Security Technical Report, Vol.13, pp.158-164, 2008,
Elsevier. Citation=Web of Science: 0 Google Scholar: 3(12/02/06)
- Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Baodian Wei, Willy Susilo, Yi Mu, Hyunrok Lee, and Kwangjo Kim, "Efficient Generic On-line/off-line (Threshold) Signatures Without Key Exposure",
Information Sciences, Vol.178, pp.4192-4203, 2008, Elsevier. [SCI,
IF=2.147], Citation=Web of Science: 6 Google Scholar: 11(12/02/06)
- Duc-Liem Vo and Kwangjo Kim, "A Secure Mutual Authentication Scheme with Key Agreement using Smart Card from Bilinear Pairings",
Int'l Journal of Computer Systems Science & Engineering, Vol.23,
No. 3, pp.139-152, May 3, 2008.[SCIE, IF=0.277], Citation=Web of
Science: 0 Google Scholar: 0(12/02/06)
2007
2006
- Divyan M. Konidala and Kwangjo Kim, "Mobile RFID Applications and Security Challenges",
Proc. of ICISC 2006, LNCS 4296, pp.194-205, Nov. 30 - Dec. 1,
Springer-Verlag, Busan, Korea. [SCIE, IF=0.402], Citation=Web of
Science: 0 Google Scholar: 3(12/02/06)
- Youngjoon Seo, Hyunrok Lee, and Kwangjo Kim, "Scalable and Untraceable Authentication Protocol for RFID"
, The 2nd International Workshop on Security Ubiquitous Computing
Systems, LNCS 4097, pp. 252-261, Aug., 2006, Springer-Verlag, Seoul,
Korea. [SCIE, IF=0.402], Citation=Web of Science: 4 Google Scholar: 18
(12/02/06)
- Kui Ren, Wenjing Lou, Robert H. Deng, and Kwangjo Kim, "A Novel Privacy Preserving Authentication and Access Control Scheme in Pervasive Computing Environments",
IEEE Trans. on Vehicular Technology, Vol.55, No.4, Jul., 2006. [SCIE,
IF=1.071], Citation=Web of Science: 0 Google Scholar: 71(12/02/06)
2005
- Fangguo Zhang and Kwangjo Kim, "Cryptanalysis of Lee-Hwang-Li's Key Authentication Schemes",
Applied Mathematics and Computation. Vol.161, Issue 1, pp.101-107, Feb.
4, 2005, Elsevier. [SCIE, IF=0.688], Citation=Web of Science: 2
Google Scholar: 5(12/02/06)
- Jiqiang Lv, Xinmei Wang, and Kwangjo Kim, "Security of a Multi Signature Scheme for Specified Group of Verifiers",
Applied Mathematics and Computation, Vol.166, Issue 1, pp.58-63, July
6, 2005, Elsevier. [SCIE, IF=0.688], Citation=Web of Science: 0 Google
Scholar: 0(12/02/06)
- Jiqiang Lv, Xinmei Wang, and Kwangjo Kim, "Practical Convertible Authenticated Encryption Schemes using Self-certified Public Keys",
Applied Mathematics and Computation, Vol.169, Issue 2, pp.1285-1297,
Oct. 15, 2005, Elsevier. [SCIE, IF=0.688], Citation=Web of Science: 12
Google Scholar: 20(12/02/06)
- Duc-Liem Vo and Kwangjo Kim, "Yet Another Forward Secure Signature from Bilinear Pairings",
Proc. of ICISC2005, LNCS 3935, pp.441-455, Dec., 2005, Springer-Verlag,
Seoul, Korea. [SCIE, IF=0.402], Citation=Web of Science: 3 Google
Scholar: 9(09/10/26)
2004
- Xiaofeng Chen, Fangguo Zhang, and Kwangjo Kim, "Limited Verifier Signature Scheme from Bilinear Pairings",
Proc. of ACNS 04, LNCS 3089, pp.135-148, Jun. 8-11, 2004,
Springer-Verlag, Yellow Mountain, China. [SCIE, IF=0.513], Citation=Web
of Science: 0 Google Scholar: 14 (12/02/06)
- Songwon Lee, Kyusuk Han, Seok-kyu Kang, Kwangjo Kim, and So Ran Ine, "Threshold Password-Based Authentication using Bilinear Pairings",
Proc. of European PKI, LNCS 3093, pp.350-363, Jun. 25-26, 2004,
Springer-Verlag, Samos island, Greece. [SCIE, IF=0.513], Citation=Web
of Science: 3 Google Scholar: 3 (12/02/06)
- SungJun Min, Go Yamamoto, and Kwangjo Kim, "Weak Property of Malleability in NTRUSign",
Proc. of ACISP04, LNCS 3108, pp.379-390, July 13-15, 2004,
Springer-Verlag, Sydney, Australia. [SCIE, IF=0.513], Citation=Web of
Science: 0 Google Scholar: 10 (12/02/06)
- Xiaofeng Chen, Fangguo Zhang, and Kwangjo Kim, "Chameleon Hashing without Key Exposure",
Proc. of the 7th International Information Security Conference
(ISC'04), LNCS 3225, pp.87-98, 2004, Springer-Verlag. Palo Alto, USA,
[SCIE, IF=0.513], Citation=Web of Science: 15 Google Scholar: 36
(12/02/06)
- Kui Ren, Hyunrok Lee, and Kwangjo Kim, "Efficient Authenticated Key Agreement Protocol for Dynamic Groups",
Proc. of WISA2004, LNCS 3325, pp.233-247, Aug. 23-25, 2004, Jeju,
Korea. [SCIE, IF=0.513], Citation=Web of Science: 1 Google Scholar: 7
(12/02/06)
- Xiaofeng Chen, Fangguo Zhang, Divyan M. Konidala, and Kwangjo Kim, "New ID-based Threshold Signature Scheme from Bilinear Pairings",
Proc. of INDOCRYPT2004, LNCS 3348, pp.371-383, Dec. 20-22, 2004,
Springer-Verlag, Chennai(Madras), India. [SCIE, IF=0.513], Citation=Web
of Science: 17 Google Scholar: 42 (12/02/06)
- Kui Ren,Tieyan Li, Zhiguo Wan, Feng Bao, Robert Deng, and Kwangjo Kim, "Highly Reliable Trust Establishment Scheme in Ad Hoc Networks"
Computer Networks, Vol.45, pp.687-699, 2004, Elsevier. [SCIE,
IF=1.226], Citation=Web of Science: 22 Google Scholar: 74(12/02/06)
2003
- Fangguo Zhang and Kwangjo Kim, "A Universal Forgery on Araki et al's Convertible Limited verifier signature scheme",
IEICE Trans. on Fundamentals, Vol. E86-A, No.2, pp.515-516, Feb., 2003.
[SCIE, IF=0.374], Citation=Web of Science: 16 Google Scholar:
21(12/02/06)
- Fangguo Zhang and Kwangjo Kim, "Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Parings",
Proc. of ACISP'03, LNCS 2727, pp.312-323, Jul. 9-11, 2003,
Springer-Verlag,Wollongong, Australia. [SCIE, IF=0.513], Citation=Web
of Science: 0 Google Scholar: 220(12/02/06)
- Arvind Narayanan, C.Pandu Rangan, and Kwangjo Kim, "Practical Pay TV Schemes",
Proc. of ACISP'03, LNCS 2727, pp.192-203, Jul. 9-11, 2003,
Springer-Verlag, Wollongong, Australia. [SCIE, IF=0.513], Citation=Web
of Science: 5 Google Scholar: 14(12/02/06)
- SuGil Choi, Kwangjo Kim, and Byeonggon Kim, "Practical Solution for Location Privacy in Mobile IPv6",
Proc. of WISA2003, LNCS 2908, pp.69-83, Aug. 25-27, 2003,
Springer-Verlag, Jeju, Korea. [SCIE, IF=0.513], Citation=Web of
Science: 3 Google Scholar: 12(12/02/06)
- Xie Yan and Kwangjo Kim, "ID-Based Distributed 'magic ink' Signature from Pairings",
Proc. of ICICS2003, LNCS 2836, pp.249-259, Oct. 10-13, 2003,
Springer-Verlag, Huhehaote city, Inner-Mongolia, China. [SCIE,
IF=0.513], Citation=Web of Science: 0 Google Scholar: 1(12/02/06)
- Dang Nguyen Duc, Jung Hee Cheon, and Kwangjo Kim, "A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption",
Proc. of ICICS03, LNCS 2836, pp.11-21, Oct. 10-13, 2003,
Springer-Verlag, Huhehaote city, Inner-Mongolia, China. [SCIE,
IF=0.513], Citation=Web of Science: 3 Google Scholar: 18(12/02/06)
- Sangwon Lee, Yongdae Kim, Kwangjo Kim, and Dae-Hyun Ryu, "An Efficient Tree-based Group Key Agreement using Bilinear Map",
Proc. of ACNS2003, LNCS 2846, pp.357-371, Oct. 16-19, 2003,
Springer-Verlag, Kumming, China. [SCIE, IF=0.513], Citation=Web of
Science: 14 Google Scholar: 30(12/02/06)
- Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, and Seungjae Yoo, "Providing Receipt-freeness in Mixnet-based Voting Protocols",
Proc. of ICISC03, LNCS 2971, pp.261-274, Nov. 27-28, 2003, Seoul,
Korea. [SCIE, IF=0.513], Citation=Web of Science: 0 Google Scholar:
77(12/02/06)
- Xiaofeng Chen, Byoungcheon Lee, and Kwangjo Kim, "Receipt-free Electronic Auction Schemes Using Homomorphic Encryption",
Proc. of ICISC03, LNCS 2971, pp.275-290, Nov. 27-28, 2003, Seoul,
Korea. [SCIE, IF=0.513], Citation=Web of Science: 4 Google Scholar: 23
(12/02/06)
- V.Vinod, Arvind Narayanan, K,Srinathanm, C.Pandu Rangan, and Kwangjo Kim, "On the Power of Computational Secret Sharing",
Proc. of INDOCRYPT 2003, LNCS 2904, Dec. 8-10, 2003, New Delhi, India.
[SCIE, IF=0.513], Citation=Web of Science: 4 Google Scholar: 18
(12/02/06)
2002
- Myungsun Kim and Kwangjo Kim "A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem",
Proc. of ACISP2002, LNCS 2384, pp.464-481, 2002, Springer Verlag,
Melbourne, Australia. [SCIE, IF=0.515], Citation=Web of Science: 0
Google Scholar: 29 (12/02/06)
- Fangguo Zhang, Shengli Liu, and Kwangjo Kim "Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems",
Proc. of ACISP2002, LNCS 2384, pp.203-213, 2002, Springer Verlag,
Melbourne, Australia. [SCIE, IF=0.515], Citation=Web of Science: 0
Google Scholar: 2 (12/02/06)
- Byoungcheon Lee and Kwangjo Kim, "Self-Certified Signature",
Proc. of INDOCRYPT 2002, LNCS 2251, pp.199-214, 2002, Springer Verlag,
Hyderabad, India. [SCIE, IF=0.515], Citation=Web of Science: 8 Google
Scholar: 33 (12/02/06)
- Fangguo Zhang and Kwangjo Kim "ID-Based Blind Signature and Ring Signature from Pairings",
Proc. of ASIACRYPT 2002, LNCS 2501, pp.533-547, 2002, Springer Verlag,
Queenstown, New Zealand. [SCIE, IF=0.515], Citation=Web of Science: 151
Google Scholar: 424(12/02/06)
- Myungsun Kim, Jongseong Kim, and Kwangjo Kim, "Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption",
Proc. of ICICS 2002, LNCS 2513, pp.97-108, 2002, Springer Verlag,
Seoul, Korea [SCIE, IF=0.515], Citation=Web of Science: 2 Google
Scholar: 15 (12/02/06)
2001
- Gail-Joon
Ahn and Kwangjo Kim, "CONUGA : Constrained User Group Assignment",
Journal of Network and Computer Applications, Vol. 24, No.4, pp.87-100,
Apr. 2001.[SCIE, IF=1.000], Citation=Web of Science: 0 Google Scholar:
1 (12/02/06)
- Byoungcheon Lee, Heesun Kim, and Kwangjo Kim "Secure Mobile Agent using Strong Non-designated Proxy Signature",
Proc. of ACISP2001, LNCS 2119, pp.474-486, 2001, Springer Verlag.
[SCIE, IF=0.515], Citation=Web of Science: 74 Google Scholar: 181
(12/02/06)
- Jung Hee Cheon, MunJu Kim, Kwangjo Kim, Jung-Yeun Lee, and SungWoo Kang, "Improved Impossible Differential Cryptanaylsis of Rijndael and Crypton",
Proc. of ICISC2001, LNCS 2288, pp.39-49, Dec. 5-7, 2001, Seoul, Korea.
[SCIE, IF=0.515], Citation=Web of Science: 0 Google Scholar: 90
(12/02/06)
- Jinho Kim, Kwangjo Kim, and Chulsoo Lee, "An Efficient and Provably Secure Threshold Blind Signature",
Proc. of ICISC2001, LNCS Vol.2288, pp.318-327, Dec. 5-7, 2001,
Seoul, Korea. [SCIE, IF=0.515], Citation=Web of Science: 0 Google
Scholar: 2 (12/02/06)
- Byoungcheon Lee, Kwangjo Kim, and Joongsoo Ma "Efficient Public Auction with One-Time Registration and Public Verifiability",
Proc. of INDOCRYPT2001, LNCS 2247, pp.162-174, Dec. 16-20, 2001 ,
Madras, India. [SCIE, IF=0.515], Citation=Web of Science: 0 Google
Scholar: 32 (12/02/06)
2000
- Joonsang Baek, Byoungcheon Lee, and Kwangjo Kim, "Secure Length-saving ElGamal Encryption under the Computational Diffie-Hellman Assumption",
Proc. of ACISP2000, LNCS Vol.1841, pp.49-58, July, 2000,
Springer-Verlag, Brisbane, Australia. [SCIE, IF=0.515], Citation=Web of
Science: 0 Google Scholar: 25 (12/02/06)
- Joonsang Baek and Kwangjo Kim, "Remarks on the Unknown Key-Share Attacks",
IEICE Trans. on Fundamentals, Vol.E83-A, pp.2766-2769, No.12, Dec.,
2000. [SCIE, IF=0.254], Citation=Web of Science: 7 Google Scholar: 20
(12/02/06)
- Joonsang Baek, Byoungcheon Lee, and Kwangjo Kim, "Provably Secure Length-saving Public Key Encryption Scheme under the Computational Diffie-Hellman Assumption", ETRI J., Vol.22, No.4, pp.25-31, Dec. 2000. [SCI, IF=0.936] Citation=Web of Science: 3 Google Scholar: 18 (12/02/06)
- Boyeon Song and Kwangjo Kim, "Two-Pass Authenticated Key Agreement Protocol with Key Confirmation", Proc. of INDOCRYPT2000, LNCS 1977, pp.237-249, Dec. 10-13, 2000, Calcutta, India. [SCIE, IF=0.515], Citation=28(09/10/26)
- Byoungcheon Lee and Kwangjo Kim,"Secure MatchMaking Protocols",
Proc. of ICISC 2000, LNCS 2015, pp.123-134, Dec. 8-9, 2000, Springer
Verlag, Dongguk Univ. [SCIE, IF=0.515], Citation=NA(09/10/26)
1999
- Moonseog Seo and Kwangjo Kim, "Electronic Funds Transfer Protocol using Domin-verifiable Signcryption Scheme",
Proc. of ICISC'99, LNCS 1787, pp.269-277, Dec. 9-10, 1999, Springer
Verlag, Korea Univ., Seoul, Korea. [SCIE, IF=0.515], Citation=Web of
Science: 1 Google Scholar: 2(12/02/06)
~1997
- Sungmo
Park, Sangjin Lee, Soo Hak Sung, and Kwangjo Kim, "Further Enumerating
Correlation Immune Functions", Information Processing Letter, Vol.61,
pp.209-212, 1997. [SCIE, IF=0.252] Citation=Web of Science: 0 Google
Scholar: 0 (12/02/06)
- Seongtaek Chee, Sangjin Lee,
Kwangjo Kim, and Daeho Kim, "On the Correlation Immune Functions with
Controllable Nonlinearity", ETRI Journal, Vol.19, No.4, pp.389-401,
Dec. 1997. [SCI, IF=0.936] Citation=Web of Science: 0 Google Scholar: 9
(12/02/06)
- Sangjoon Park, Sangwoo Park, Kwangjo Kim, and
Dongho Won, "Two Efficient RSA Multisignature Schemes", Proc. of
ICICS'97, LNCS 1334, pp.217-222, Dec. 11-14,1997. [SCIE, IF=0.515],
Citation=Web of Science: 0 Google Scholar: 10 (12/02/06)
- Seongtaek
Chee, Sangjin Lee, and Kwangjo Kim, "Semi-bent Functions", Proc. of
ASIACRYPT'94, LNCS 917, pp.107-118, 1995. Springer-Verlag. (Postscript). [SCIE, IF=0.515], Citation=Web of Science: 4 Google Scholar: 36 (12/02/06)
- Eon-kyong
Lee, Kwangjo Kim, and U-Jin Choi, "A Construction of the Simplest
Pseudorandom Permutation Generator", Computers and Mathematics with
Applications, Vol.29, No.8, pp. 19-25, 1995.[SCI, IF=0.997],
Citation=Web of Science: 0 Google Scholar: 0 (12/02/06)
- Kwangjo
Kim, "Construction of DES-like S-boxes based on Boolean Functions
Satisfying the SAC", Proc. of ASIACRYPT'91, LNCS 739, pp.59-72, 1991,
Springer-Verlag, Japan. (Postscript). [SCIE, IF=0.515], Citation=Web of Science: 0 Google Scholar: 22 (12/02/06)
- Kwangjo
Kim, Tsutomu Matsumoto, and Hideki Imai, "On Generating
Cryptographically Desirable Substitutions", Trans. of IEICE, Vol.E.73,
No.7, pp.1031-1035, Jul., 1990.(Postscript).[SCIE, IF=0.287] Citation=Web of Science: 0 Google Scholar: 4 (12/02/06)
- Kwangjo
Kim, Tsutomu Matsumoto, and Hideki Imai, "A Recursive Construction
Method of S-boxes Satisfying Strict Avalanche Criterion", Proc. of
CRYPTO'90, LNCS 537, pp.545-553, 1990, Springer-Verlag, UCSB, USA. (Postscript). [SCIE, IF=0.515], Citation=Web of Science: 1 Google Scholar: 14 (12/02/06)