Seungjoo (Gabriel) Kim
Seungjoo (Gabriel) Kim
Professor of School of Cybersecurity, Korea University
Verified email at korea.ac.kr - Homepage
Title
Cited by
Cited by
Year
Proxy signatures, revisited
S Kim, S Park, D Won
International Conference on Information and Communications Security, 223-232, 1997
7061997
Challenge-response based RFID authentication protocol for distributed database environment
K Rhee, J Kwak, S Kim, D Won
International Conference on Security in Pervasive Computing, 70-84, 2005
541*2005
WIPI mobile platform with secure service for mobile RFID network environment
N Park, J Kwak, S Kim, D Won, H Kim
Asia-Pacific Web Conference, 741-748, 2006
1842006
RSA speedup with Chinese remainder theorem immune against hardware fault cryptanalysis
SM Yen, S Kim, S Lim, SJ Moon
IEEE Transactions on computers 52 (4), 461-472, 2003
1592003
Information Security and Cryptology-ICISC 2004: 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers
C Park, S Chee
Springer, 2005
1492005
An analysis of proxy signatures: Is a secure channel necessary?
JY Lee, JH Cheon, S Kim
Cryptographers’ Track at the RSA Conference, 68-79, 2003
1472003
A countermeasure against one physical cryptanalysis may benefit another attack
Y Sung-Ming, S Kim, S Lim, SJ Moon
International Conference on Information Security and Cryptology, 414-427, 2001
1392001
Advanced key-management architecture for secure SCADA communications
D Choi, H Kim, D Won, S Kim
IEEE transactions on Power delivery 24 (3), 1154-1163, 2009
1142009
RSA speedup with residue number system immune against hardware fault cryptanalysis
Y Sung-Ming, S Kim, S Lim, SJ Moon
International Conference on Information Security and Cryptology, 397-413, 2001
912001
Efficient secure group communications for SCADA
D Choi, S Lee, D Won, S Kim
IEEE Transactions on power delivery 25 (2), 714-722, 2009
862009
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
J Nam, Y Lee, S Kim, D Won
Information Sciences 177 (6), 1364-1375, 2007
802007
Convertible group signatures
SJ Kim, SJ Park, DH Won
International Conference on the Theory and Application of Cryptology and …, 1996
791996
Zero-knowledge nominative signatures
S Kim
Proc. Ragocrypt'96, International Conference on the Theory and Application …, 1996
711996
Apparatus and method for inputting graphical password using wheel interface in embedded system
D Won, S Park, S Kim
US Patent 7,992,202, 2011
702011
ID-based group signature
S Park, S Kim, D Won
Electronics Letters 33 (19), 1616-1616, 1997
701997
DDH-based group key agreement in a mobile environment
J Nam, J Lee, S Kim, D Won
Journal of Systems and Software 78 (1), 73-83, 2005
662005
Improving fairness and privacy of Zhou-Gollmann's fair non-repudiation protocol
K Kim, S Park, J Baek
Proceedings of the 1999 ICPP Workshops on Collaboration and Mobile Computing …, 1999
641999
A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices
J Nam, S Kim, D Won
IEEE Communications letters 9 (5), 429-431, 2005
612005
Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords
J Kim, S Kim, J Kwak, D Won
International Conference on Computational Science and Its Applications, 895-902, 2004
552004
Cryptanalysis of two protocols for RSA with CRT based on fault infection
SM Yen, D Kim, SJ Moon
International Workshop on Fault Diagnosis and Tolerance in Cryptography, 53-61, 2006
542006
The system can't perform the operation now. Try again later.
Articles 1–20