A certificate-based signature scheme BG Kang, JH Park, SG Hahn CT-RSA 4, 99-111, 2004 | 194 | 2004 |
Forward secure dynamic searchable symmetric encryption with efficient updates KS Kim, M Kim, D Lee, JH Park, WH Kim Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications ¡¦, 2017 | 156 | 2017 |
A Simple Variant of the Merkle-Damgård Scheme with a Permutation. S Hirose, J Park, A Yun Journal of cryptology 25 (2), 2012 | 98* | 2012 |
Cryptanalysis of the public-key encryption based on braid groups E Lee, JH Park Advances in Cryptology—EUROCRYPT 2003: International Conference on the ¡¦, 2003 | 74 | 2003 |
Security weakness in the smart grid key distribution scheme proposed by Xia and Wang JH Park, M Kim, D Kwon IEEE Transactions on Smart Grid 4 (3), 1613-1614, 2013 | 71 | 2013 |
Efficient and secure authenticated key exchange protocols in the eCK model J Lee, JH Park IEICE transactions on fundamentals of electronics, communications and ¡¦, 2011 | 68* | 2011 |
Security analysis of the certificateless signature scheme proposed at SecUbiq 2006 JH Park, BG Kang Emerging Directions in Embedded and Ubiquitous Computing: EUC 2007 Workshops ¡¦, 2007 | 51* | 2007 |
A new forward secure signature scheme BG Kang, JH Park, SG Hahn Cryptology ePrint Archive, 2004 | 45 | 2004 |
Efficient delegation of pairing computation BG Kang, MS Lee, JH Park Cryptology ePrint Archive, 2005 | 43 | 2005 |
Is it possible to have CBE from CL-PKE? BG Kang, JH Park Cryptology ePrint Archive, 2005 | 43 | 2005 |
Addition of the ARIA cipher suites to Transport Layer Security (TLS) W Kim, J Lee, J Park, D Kwon | 41 | 2011 |
On lai–massey and quasi-feistel ciphers A Yun, JH Park, J Lee Designs, Codes and Cryptography 58, 45-72, 2011 | 36* | 2011 |
Fast elliptic curve point counting using Gaussian normal basis HY Kim, JY Park, JH Cheon, JH Park, JH Kim, SG Hahn Lecture notes in computer science, 292-307, 2002 | 31 | 2002 |
Cryptanalysis of Zhou et al.¡¯s proxy-protected signature schemes JH Park, BG Kang, JW Han Applied Mathematics and Computation 169 (1), 192-197, 2005 | 24 | 2005 |
Improved Impossible Differential Attacks on Large-Block Rijndael. L Zhang, W Wu, JH Park, B Koo, Y Yeom ISC 5222, 298-315, 2008 | 19 | 2008 |
On the relationship between squared pairings and plain pairings BG Kang, JH Park Information processing letters 97 (6), 219-224, 2006 | 10 | 2006 |
Cryptanalysis of some group-oriented proxy signature schemes JH Park, BG Kang, S Park Information Security Applications: 6th International Workshop, WISA 2005 ¡¦, 2006 | 10 | 2006 |
Adaptive preimage resistance and permutation-based hash functions J Lee, JH Park Cryptology ePrint Archive, 2009 | 8 | 2009 |
Complete addition law for Montgomery curves J Kim, JH Park, DC Kim, WH Kim Information Security and Cryptology–ICISC 2019: 22nd International ¡¦, 2020 | 5 | 2020 |
Preimage resistance of LPmkr with r= m− 1 J Lee, JH Park Information processing letters 110 (14-15), 602-608, 2010 | 5 | 2010 |