Seungjoo (Gabriel) Kim
Seungjoo (Gabriel) Kim
Professor of Graduate School of Information Security, Korea University
Verified email at korea.ac.kr - Homepage
TitleCited byYear
Proxy signatures, revisited
S Kim, S Park, D Won
International Conference on Information and Communications Security, 223-232, 1997
6891997
Challenge-response based RFID authentication protocol for distributed database environment
K Rhee, J Kwak, S Kim, D Won
International Conference on Security in Pervasive Computing, 70-84, 2005
517*2005
WIPI mobile platform with secure service for mobile RFID network environment
N Park, J Kwak, S Kim, D Won, H Kim
Asia-Pacific Web Conference, 741-748, 2006
1562006
Information Security and Cryptology-ICISC 2004: 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers
C Park, S Chee
Springer, 2005
1452005
RSA speedup with Chinese remainder theorem immune against hardware fault cryptanalysis
SM Yen, S Kim, S Lim, SJ Moon
IEEE Transactions on computers 52 (4), 461-472, 2003
1452003
An analysis of proxy signatures: Is a secure channel necessary?
JY Lee, JH Cheon, S Kim
Cryptographers’ Track at the RSA Conference, 68-79, 2003
1412003
A countermeasure against one physical cryptanalysis may benefit another attack
Y Sung-Ming, S Kim, S Lim, SJ Moon
International Conference on Information Security and Cryptology, 414-427, 2001
1232001
Advanced key-management architecture for secure SCADA communications
D Choi, H Kim, D Won, S Kim
IEEE Transactions on Power Delivery 24 (3), 1154-1163, 2009
932009
RSA speedup with residue number system immune against hardware fault cryptanalysis
Y Sung-Ming, S Kim, S Lim, SJ Moon
International Conference on Information Security and Cryptology, 397-413, 2001
882001
Security weakness in a three-party pairing-based protocol for password authenticated key exchange
J Nam, Y Lee, S Kim, D Won
Information Sciences 177 (6), 1364-1375, 2007
802007
Convertible group signatures
SJ Kim, SJ Park, DH Won
International Conference on the Theory and Application of Cryptology and …, 1996
781996
Efficient secure group communications for SCADA
D Choi, S Lee, D Won, S Kim
IEEE Transactions on power delivery 25 (2), 714-722, 2010
762010
ID-based group signature
S Park, S Kim, D Won
Electronics Letters 33 (19), 1616-1616, 1997
671997
Zero-knowledge nominative signatures
S Kim
Proc. Ragocrypt'96, International Conference on the Theory and Application …, 1996
671996
Apparatus and method for inputting graphical password using wheel interface in embedded system
D Won, S Park, S Kim
US Patent 7,992,202, 2011
642011
DDH-based group key agreement in a mobile environment
J Nam, J Lee, S Kim, D Won
Journal of Systems and Software 78 (1), 73-83, 2005
592005
A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices
J Nam, S Kim, D Won
IEEE Communications Letters 9 (5), 429-431, 2005
592005
Cryptanalysis and improvement of password authenticated key exchange scheme between clients with different passwords
J Kim, S Kim, J Kwak, D Won
International Conference on Computational Science and Its Applications, 895-902, 2004
532004
Forward-secure commercial key escrow systems and escrowing methods thereof
J Kim, S Kim, HJ Kwon, HR Park, H Lee
US Patent App. 09/997,012, 2003
522003
Off-line password-guessing attack to Yang's and Huang's authentication schemes for session initiation protocol
H Jo, Y Lee, M Kim, S Kim, D Won
2009 Fifth International Joint Conference on INC, IMS and IDC, 618-621, 2009
402009
The system can't perform the operation now. Try again later.
Articles 1–20