팔로우
Je Hong Park
Je Hong Park
Electronics and Telecommunications Research Institute
nsr.re.kr의 이메일 확인됨
제목
인용
인용
연도
A certificate-based signature scheme
BG Kang, JH Park, SG Hahn
CT-RSA 4, 99-111, 2004
1942004
Forward secure dynamic searchable symmetric encryption with efficient updates
KS Kim, M Kim, D Lee, JH Park, WH Kim
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1562017
A Simple Variant of the Merkle-Damgård Scheme with a Permutation.
S Hirose, J Park, A Yun
Journal of cryptology 25 (2), 2012
98*2012
Cryptanalysis of the public-key encryption based on braid groups
E Lee, JH Park
Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003
742003
Security weakness in the smart grid key distribution scheme proposed by Xia and Wang
JH Park, M Kim, D Kwon
IEEE Transactions on Smart Grid 4 (3), 1613-1614, 2013
712013
Efficient and secure authenticated key exchange protocols in the eCK model
J Lee, JH Park
IEICE transactions on fundamentals of electronics, communications and …, 2011
68*2011
Security analysis of the certificateless signature scheme proposed at SecUbiq 2006
JH Park, BG Kang
Emerging Directions in Embedded and Ubiquitous Computing: EUC 2007 Workshops …, 2007
51*2007
A new forward secure signature scheme
BG Kang, JH Park, SG Hahn
Cryptology ePrint Archive, 2004
452004
Efficient delegation of pairing computation
BG Kang, MS Lee, JH Park
Cryptology ePrint Archive, 2005
432005
Is it possible to have CBE from CL-PKE?
BG Kang, JH Park
Cryptology ePrint Archive, 2005
432005
Addition of the ARIA cipher suites to Transport Layer Security (TLS)
W Kim, J Lee, J Park, D Kwon
412011
On lai–massey and quasi-feistel ciphers
A Yun, JH Park, J Lee
Designs, Codes and Cryptography 58, 45-72, 2011
36*2011
Fast elliptic curve point counting using Gaussian normal basis
HY Kim, JY Park, JH Cheon, JH Park, JH Kim, SG Hahn
Lecture notes in computer science, 292-307, 2002
312002
Cryptanalysis of Zhou et al.’s proxy-protected signature schemes
JH Park, BG Kang, JW Han
Applied Mathematics and Computation 169 (1), 192-197, 2005
242005
Improved Impossible Differential Attacks on Large-Block Rijndael.
L Zhang, W Wu, JH Park, B Koo, Y Yeom
ISC 5222, 298-315, 2008
192008
On the relationship between squared pairings and plain pairings
BG Kang, JH Park
Information processing letters 97 (6), 219-224, 2006
102006
Cryptanalysis of some group-oriented proxy signature schemes
JH Park, BG Kang, S Park
Information Security Applications: 6th International Workshop, WISA 2005 …, 2006
102006
Adaptive preimage resistance and permutation-based hash functions
J Lee, JH Park
Cryptology ePrint Archive, 2009
82009
Complete addition law for Montgomery curves
J Kim, JH Park, DC Kim, WH Kim
Information Security and Cryptology–ICISC 2019: 22nd International …, 2020
52020
Preimage resistance of LPmkr with r= m− 1
J Lee, JH Park
Information processing letters 110 (14-15), 602-608, 2010
52010
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20