Seungjoo (Gabriel) Kim
Seungjoo (Gabriel) Kim
Professor at the School of Cybersecurity in Korea University
Verified email at - Homepage
Cited by
Cited by
Proxy signatures, revisited
S Kim, S Park, D Won
International Conference on Information and Communications Security, 223-232, 1997
Challenge-response based RFID authentication protocol for distributed database environment
K Rhee, J Kwak, S Kim, D Won
International Conference on Security in Pervasive Computing, 70-84, 2005
WIPI mobile platform with secure service for mobile RFID network environment
N Park, J Kwak, S Kim, D Won, H Kim
Asia-Pacific Web Conference, 741-748, 2006
RSA speedup with Chinese remainder theorem immune against hardware fault cryptanalysis
SM Yen, S Kim, S Lim, SJ Moon
IEEE Transactions on computers 52 (4), 461-472, 2003
A countermeasure against one physical cryptanalysis may benefit another attack
Y Sung-Ming, S Kim, S Lim, S Moon
International Conference on Information Security and Cryptology, 414-427, 2001
An analysis of proxy signatures: Is a secure channel necessary?
JY Lee, JH Cheon, S Kim
Cryptographers’ Track at the RSA Conference, 68-79, 2003
Advanced key-management architecture for secure SCADA communications
D Choi, H Kim, D Won, S Kim
IEEE transactions on Power delivery 24 (3), 1154-1163, 2009
RSA speedup with residue number system immune against hardware fault cryptanalysis
Y Sung-Ming, S Kim, S Lim, S Moon
international conference on information security and cryptology, 397-413, 2001
Efficient secure group communications for SCADA
D Choi, S Lee, D Won, S Kim
IEEE Transactions on power delivery 25 (2), 714-722, 2009
Convertible group signatures
SJ Kim, SJ Park, DH Won
International Conference on the Theory and Application of Cryptology and …, 1996
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
J Nam, Y Lee, S Kim, D Won
Information Sciences 177 (6), 1364-1375, 2007
Zero-knowledge nominative signatures
S Kim
Proc. Ragocrypt'96, International Conference on the Theory and Application …, 1996
Apparatus and method for inputting graphical password using wheel interface in embedded system
D Won, S Park, S Kim
US Patent 7,992,202, 2011
ID-based group signature
S Park, S Kim, D Won
Electronics Letters 33 (19), 1616-1617, 1997
DDH-based group key agreement in a mobile environment
J Nam, J Lee, S Kim, D Won
Journal of Systems and Software 78 (1), 73-83, 2005
Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords
J Kim, S Kim, J Kwak, D Won
International Conference on Computational Science and Its Applications, 895-902, 2004
Forward-secure commercial key escrow systems and escrowing methods thereof
J Kim, S Kim, HJ Kwon, HR Park, H Lee
US Patent App. 09/997,012, 2003
Off-line password-guessing attack to Yang's and Huang's authentication schemes for session initiation protocol
H Jo, Y Lee, M Kim, S Kim, D Won
2009 Fifth International Joint Conference on INC, IMS and IDC, 618-621, 2009
The vulnerabilities analysis of fuzzy vault using password
S Hong, W Jeon, S Kim, D Won, C Park
2008 Second International Conference on Future Generation Communication and …, 2008
A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices
J Nam, S Kim, D Won
IEEE Communications letters 9 (5), 429-431, 2005
The system can't perform the operation now. Try again later.
Articles 1–20