BibTeX records: Kwangjo Kim

download as .bib file

@inproceedings{DBLP:conf/icisc/Kim23,
  author       = {Kwangjo Kim},
  editor       = {Hwajeong Seo and
                  Suhri Kim},
  title        = {Theoretical and Empirical Analysis of {FALCON} and {SOLMAE} Using
                  Their Python Implementation},
  booktitle    = {Information Security and Cryptology - {ICISC} 2023 - 26th International
                  Conference on Information Security and Cryptology, {ICISC} 2023, Seoul,
                  South Korea, November 29 - December 1, 2023, Revised Selected Papers,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14562},
  pages        = {235--260},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-1238-0\_13},
  doi          = {10.1007/978-981-97-1238-0\_13},
  timestamp    = {Wed, 13 Mar 2024 19:10:54 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/Kim23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/AminantoWATYK22,
  author       = {Muhamad Erza Aminanto and
                  R. Satrio Hariomurti Wicaksono and
                  Achmad Eriza Aminanto and
                  Harry Chandra Tanuwidjaja and
                  Lin Yola and
                  Kwangjo Kim},
  title        = {Multi-Class Intrusion Detection Using Two-Channel Color Mapping in
                  {IEEE} 802.11 Wireless Network},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {36791--36801},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3164104},
  doi          = {10.1109/ACCESS.2022.3164104},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/AminantoWATYK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/KimT21,
  author       = {Kwangjo Kim and
                  Harry Chandra Tanuwidjaja},
  title        = {Privacy-Preserving Deep Learning - {A} Comprehensive Survey},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-16-3764-3},
  doi          = {10.1007/978-981-16-3764-3},
  isbn         = {978-981-16-3763-6},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/KimT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChoiHHBKK20,
  author       = {Rakyong Choi and
                  Dongyeon Hong and
                  Seongho Han and
                  Seunggeun Baek and
                  Wooseok Kang and
                  Kwangjo Kim},
  title        = {Design and Implementation of Constant-Round Dynamic Group Key Exchange
                  from {RLWE}},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {94610--94630},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2993296},
  doi          = {10.1109/ACCESS.2020.2993296},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ChoiHHBKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/OpareK20,
  author       = {Edwin Ayisi Opare and
                  Kwangjo Kim},
  title        = {A Compendium of Practices for Central Bank Digital Currencies for
                  Multinational Financial Infrastructures},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {110810--110847},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3001970},
  doi          = {10.1109/ACCESS.2020.3001970},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/OpareK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TanuwidjajaCBK20,
  author       = {Harry Chandra Tanuwidjaja and
                  Rakyong Choi and
                  Seunggeun Baek and
                  Kwangjo Kim},
  title        = {Privacy-Preserving Deep Learning on Machine Learning as a Service
                  - a Comprehensive Survey},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {167425--167447},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3023084},
  doi          = {10.1109/ACCESS.2020.3023084},
  timestamp    = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/TanuwidjajaCBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/PhanABCDGGHKLLM20,
  author       = {Raphael C.{-}W. Phan and
                  Masayuki Abe and
                  Lynn Batten and
                  Jung Hee Cheon and
                  Ed Dawson and
                  Steven D. Galbraith and
                  Jian Guo and
                  Lucas C. K. Hui and
                  Kwangjo Kim and
                  Xuejia Lai and
                  Dong Hoon Lee and
                  Mitsuru Matsui and
                  Tsutomu Matsumoto and
                  Shiho Moriai and
                  Phong Q. Nguyen and
                  Dingyi Pei and
                  Duong Hieu Phan and
                  Josef Pieprzyk and
                  Huaxiong Wang and
                  Hank Wolfe and
                  Duncan S. Wong and
                  Tzong{-}Chen Wu and
                  Bo{-}Yin Yang and
                  Siu{-}Ming Yiu and
                  Yu Yu and
                  Jianying Zhou},
  title        = {Advances in security research in the Asiacrypt region},
  journal      = {Commun. {ACM}},
  volume       = {63},
  number       = {4},
  pages        = {76--81},
  year         = {2020},
  url          = {https://doi.org/10.1145/3378428},
  doi          = {10.1145/3378428},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/PhanABCDGGHKLLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/Kim20a,
  author       = {Kwangjo Kim},
  title        = {Intrusion Detection System Using Deep Learning and Its Application
                  to Wi-Fi Network},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {103-D},
  number       = {7},
  pages        = {1433--1447},
  year         = {2020},
  url          = {https://doi.org/10.1587/transinf.2019ICI0001},
  doi          = {10.1587/TRANSINF.2019ICI0001},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicetd/Kim20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoiHK20,
  author       = {Rakyong Choi and
                  Dongyeon Hong and
                  Kwangjo Kim},
  title        = {Constant-round Dynamic Group Key Exchange from {RLWE} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoiHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ParkPKK19,
  author       = {Jaemin Park and
                  Sungjin Park and
                  Brent ByungHoon Kang and
                  Kwangjo Kim},
  title        = {eMotion: An {SGX} extension for migrating enclaves},
  journal      = {Comput. Secur.},
  volume       = {80},
  pages        = {173--185},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2018.09.008},
  doi          = {10.1016/J.COSE.2018.09.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ParkPKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LeeKLK19,
  author       = {Jeeun Lee and
                  Sungsook Kim and
                  Seunghyun Lee and
                  Kwangjo Kim},
  title        = {Post-Quantum Security of {IGE} Mode Encryption in Telegram},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {102-A},
  number       = {1},
  pages        = {148--151},
  year         = {2019},
  url          = {https://doi.org/10.1587/transfun.E102.A.148},
  doi          = {10.1587/TRANSFUN.E102.A.148},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LeeKLK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/TanuwidjajaCK19,
  author       = {Harry Chandra Tanuwidjaja and
                  Rakyong Choi and
                  Kwangjo Kim},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {A Survey on Deep Learning Techniques for Privacy-Preserving},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {29--46},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_4},
  doi          = {10.1007/978-3-030-30619-9\_4},
  timestamp    = {Tue, 27 Sep 2022 14:19:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/TanuwidjajaCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/KimAT18,
  author       = {Kwangjo Kim and
                  Muhamad Erza Aminanto and
                  Harry Chandra Tanuwidjaja},
  title        = {Network Intrusion Detection using Deep Learning - {A} Feature Learning
                  Approach},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-981-13-1444-5},
  doi          = {10.1007/978-981-13-1444-5},
  isbn         = {978-981-13-1443-8},
  timestamp    = {Fri, 28 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/KimAT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AminantoCTYK18,
  author       = {Muhamad Erza Aminanto and
                  Rakyong Choi and
                  Harry Chandra Tanuwidjaja and
                  Paul D. Yoo and
                  Kwangjo Kim},
  title        = {Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {3},
  pages        = {621--636},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2762828},
  doi          = {10.1109/TIFS.2017.2762828},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AminantoCTYK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AnCK18,
  author       = {Hyeongcheol An and
                  Rakyong Choi and
                  Kwangjo Kim},
  editor       = {Brent ByungHoon Kang and
                  Jin Soo Jang},
  title        = {Blockchain-Based Decentralized Key Management System with Quantum
                  Resistance},
  booktitle    = {Information Security Applications - 19th International Conference,
                  {WISA} 2018, Jeju Island, Korea, August 23-25, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11402},
  pages        = {229--240},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-17982-3\_18},
  doi          = {10.1007/978-3-030-17982-3\_18},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AnCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/Kim17,
  author       = {Kwangjo Kim},
  title        = {\emph{Cryptography}: {A} New Open Access Journal},
  journal      = {Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {1},
  year         = {2017},
  url          = {https://doi.org/10.3390/cryptography1010001},
  doi          = {10.3390/CRYPTOGRAPHY1010001},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/Kim17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/AminantoKKK17,
  author       = {Muhamad Erza Aminanto and
                  Hakju Kim and
                  Kyung{-}Min Kim and
                  Kwangjo Kim},
  title        = {Another Fuzzy Anomaly Detection System Based on Ant Clustering Algorithm},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {1},
  pages        = {176--183},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.176},
  doi          = {10.1587/TRANSFUN.E100.A.176},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/AminantoKKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KobayashiYYNHKO17,
  author       = {Yukou Kobayashi and
                  Naoto Yanai and
                  Kazuki Yoneyama and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Kwangjo Kim and
                  Eiji Okamoto},
  title        = {Provably Secure Gateway Threshold Password-Based Authenticated Key
                  Exchange Secure against Undetectable On-Line Dictionary Attack},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {12},
  pages        = {2991--3006},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.2991},
  doi          = {10.1587/TRANSFUN.E100.A.2991},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/KobayashiYYNHKO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwbis/KimA17,
  author       = {Kwangjo Kim and
                  Muhamad Erza Aminanto},
  title        = {Deep learning in intrusion detection perspective: Overview and further
                  challenges},
  booktitle    = {International Workshop on Big Data and Information Security, {IWBIS}
                  2017, Jakarta, Indonesia, September 23-24, 2017},
  pages        = {5--10},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IWBIS.2017.8275095},
  doi          = {10.1109/IWBIS.2017.8275095},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwbis/KimA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwbis/AminantoTYK17,
  author       = {Muhamad Erza Aminanto and
                  Harry Chandra Tanuwidjaja and
                  Paul D. Yoo and
                  Kwangjo Kim},
  title        = {Wi-Fi intrusion detection using weighted-feature selection for neural
                  networks classifier},
  booktitle    = {International Workshop on Big Data and Information Security, {IWBIS}
                  2017, Jakarta, Indonesia, September 23-24, 2017},
  pages        = {99--104},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/IWBIS.2017.8275109},
  doi          = {10.1109/IWBIS.2017.8275109},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwbis/AminantoTYK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/ParkK17,
  author       = {Jaemin Park and
                  Kwangjo Kim},
  title        = {TM-Coin: Trustworthy management of {TCB} measurements in IoT},
  booktitle    = {2017 {IEEE} International Conference on Pervasive Computing and Communications
                  Workshops, PerCom Workshops 2017, Kona, Big Island, HI, USA, March
                  13-17, 2017},
  pages        = {654--659},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/PERCOMW.2017.7917640},
  doi          = {10.1109/PERCOMW.2017.7917640},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/percom/ParkK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AminantoK17,
  author       = {Muhamad Erza Aminanto and
                  Kwangjo Kim},
  editor       = {Brent ByungHoon Kang and
                  Taesoo Kim},
  title        = {Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep
                  Learning},
  booktitle    = {Information Security Applications - 18th International Conference,
                  {WISA} 2017, Jeju Island, Korea, August 24-26, 2017, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10763},
  pages        = {212--223},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-93563-8\_18},
  doi          = {10.1007/978-3-319-93563-8\_18},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AminantoK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/peerjpre/LiuK17,
  author       = {Yi Liu and
                  Kwangjo Kim},
  title        = {Understanding Web 2.0 service models, applications, reflections, perspectives,
                  and beyond},
  journal      = {PeerJ Prepr.},
  volume       = {5},
  pages        = {e2811},
  year         = {2017},
  url          = {https://doi.org/10.7287/peerj.preprints.2811v1},
  doi          = {10.7287/PEERJ.PREPRINTS.2811V1},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/peerjpre/LiuK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/Al-JarrahAYMTK16,
  author       = {Omar Y. Al{-}Jarrah and
                  Omar Alhussein and
                  Paul D. Yoo and
                  Sami Muhaidat and
                  Kamal Taha and
                  Kwangjo Kim},
  title        = {Data Randomization and Cluster-Based Partitioning for Botnet Intrusion
                  Detection},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {46},
  number       = {8},
  pages        = {1796--1806},
  year         = {2016},
  url          = {https://doi.org/10.1109/TCYB.2015.2490802},
  doi          = {10.1109/TCYB.2015.2490802},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/Al-JarrahAYMTK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigcomp/KimKK16,
  author       = {Jong Myoung Kim and
                  Zae Myung Kim and
                  Kwangjo Kim},
  title        = {An approach to spam comment detection through domain-independent features},
  booktitle    = {2016 International Conference on Big Data and Smart Computing, BigComp
                  2016, Hong Kong, China, January 18-20, 2016},
  pages        = {273--276},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/BIGCOMP.2016.7425926},
  doi          = {10.1109/BIGCOMP.2016.7425926},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigcomp/KimKK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigcomp/DoJCK16,
  author       = {Hyo Jin Do and
                  Young{-}Seob Jeong and
                  Ho{-}Jin Choi and
                  Kwangjo Kim},
  title        = {Another dummy generation technique in location-based services},
  booktitle    = {2016 International Conference on Big Data and Smart Computing, BigComp
                  2016, Hong Kong, China, January 18-20, 2016},
  pages        = {532--538},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/BIGCOMP.2016.7425987},
  doi          = {10.1109/BIGCOMP.2016.7425987},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigcomp/DoJCK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/TsuchidaNOK16,
  author       = {Hikaru Tsuchida and
                  Takashi Nishide and
                  Eiji Okamoto and
                  Kwangjo Kim},
  editor       = {Orr Dunkelman and
                  Somitra Kumar Sanadhya},
  title        = {Revocable Decentralized Multi-Authority Functional Encryption},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference
                  on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10095},
  pages        = {248--265},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49890-4\_14},
  doi          = {10.1007/978-3-319-49890-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/TsuchidaNOK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/AminantoK16,
  author       = {Muhamad Erza Aminanto and
                  Kwangjo Kim},
  editor       = {Dooho Choi and
                  Sylvain Guilley},
  title        = {Detecting Impersonation Attack in WiFi Networks Using Deep Learning
                  Approach},
  booktitle    = {Information Security Applications - 17th International Workshop, {WISA}
                  2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10144},
  pages        = {136--147},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-56549-1\_12},
  doi          = {10.1007/978-3-319-56549-1\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/AminantoK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icics/2015,
  editor       = {Sihan Qing and
                  Eiji Okamoto and
                  Kwangjo Kim and
                  Dongmei Liu},
  title        = {Information and Communications Security - 17th International Conference,
                  {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9543},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29814-6},
  doi          = {10.1007/978-3-319-29814-6},
  isbn         = {978-3-319-29813-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShinK15,
  author       = {Young{-}joo Shin and
                  Kwangjo Kim},
  title        = {Differentially private client-side data deduplication protocol for
                  cloud storage services},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {12},
  pages        = {2114--2123},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1159},
  doi          = {10.1002/SEC.1159},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShinK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/KimK15,
  author       = {Hakju Kim and
                  Kwangjo Kim},
  title        = {Preliminary Design of a Novel Lightweight Authenticated Encryption
                  Scheme Based on the Sponge Function},
  booktitle    = {10th Asia Joint Conference on Information Security, AsiaJCIS 2015,
                  Kaohsiung City, Taiwan, May 24-26, 2015},
  pages        = {110--111},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/AsiaJCIS.2015.24},
  doi          = {10.1109/ASIAJCIS.2015.24},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/KimK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KobayashiYYNHKO15,
  author       = {Yukou Kobayashi and
                  Naoto Yanai and
                  Kazuki Yoneyama and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Kwangjo Kim and
                  Eiji Okamoto},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Gateway Threshold Password-based Authenticated Key Exchange Secure
                  against Undetectable On-line Dictionary Attack},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {39--52},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005539300390052},
  doi          = {10.5220/0005539300390052},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KobayashiYYNHKO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShinK14a,
  author       = {Young{-}joo Shin and
                  Kwangjo Kim},
  title        = {Efficient and Secure File Deduplication in Cloud Storage},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {97-D},
  number       = {2},
  pages        = {184--197},
  year         = {2014},
  url          = {https://doi.org/10.1587/transinf.E97.D.184},
  doi          = {10.1587/TRANSINF.E97.D.184},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ShinK14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/0001ZSTLK14,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Willy Susilo and
                  Haibo Tian and
                  Jin Li and
                  Kwangjo Kim},
  title        = {Identity-based chameleon hashing and signatures without key exposure},
  journal      = {Inf. Sci.},
  volume       = {265},
  pages        = {198--210},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2013.12.020},
  doi          = {10.1016/J.INS.2013.12.020},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/0001ZSTLK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/Al-JarrahSEYMK14,
  author       = {O. Y. Al{-}Jarrah and
                  Amna Siddiqui and
                  M. Elsalamouny and
                  Paul D. Yoo and
                  Sami Muhaidat and
                  Kwangjo Kim},
  title        = {Machine-Learning-Based Feature Selection Techniques for Large-Scale
                  Network Intrusion Detection},
  booktitle    = {34th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2014 Workshops), Madrid, Spain, June 30 - July 3, 2014},
  pages        = {177--181},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICDCSW.2014.14},
  doi          = {10.1109/ICDCSW.2014.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/Al-JarrahSEYMK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/KimK13,
  author       = {Jangseong Kim and
                  Kwangjo Kim},
  title        = {A scalable and robust hierarchical key establishment for mission-critical
                  applications over sensor networks},
  journal      = {Telecommun. Syst.},
  volume       = {52},
  number       = {2},
  pages        = {1377--1388},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11235-011-9650-x},
  doi          = {10.1007/S11235-011-9650-X},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/KimK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/TakahashiYMKY13,
  author       = {Hiroya Takahashi and
                  Kenji Yasunaga and
                  Masahiro Mambo and
                  Kwangjo Kim and
                  Heung Youl Youm},
  title        = {Preventing Abuse of Cookies Stolen by {XSS}},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {85--89},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.20},
  doi          = {10.1109/ASIAJCIS.2013.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/TakahashiYMKY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/HanKCCSS12,
  author       = {Kyusuk Han and
                  Kwangjo Kim and
                  Wook Choi and
                  Hyo Hyun Choi and
                  Jung{-}Taek Seo and
                  Taeshik Shon},
  title        = {Efficient Authenticated Key Agreement Protocols for Dynamic Wireless
                  Sensor Networks},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {14},
  number       = {3-4},
  pages        = {251--269},
  year         = {2012},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-14-number-3-4-2012/ahswn-14-3-4-p-251-269/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/HanKCCSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiZCKW12,
  author       = {Jin Li and
                  Fangguo Zhang and
                  Xiaofeng Chen and
                  Kwangjo Kim and
                  Duncan S. Wong},
  title        = {Generic security-amplifying methods of ordinary digital signatures},
  journal      = {Inf. Sci.},
  volume       = {201},
  pages        = {128--139},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ins.2012.03.006},
  doi          = {10.1016/J.INS.2012.03.006},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/LiZCKW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/KimKPS12,
  author       = {Jangseong Kim and
                  Kwangjo Kim and
                  Jong Hyuk Park and
                  Taeshik Shon},
  title        = {A scalable and privacy-preserving child-care and safety service in
                  a ubiquitous computing environment},
  journal      = {Math. Comput. Model.},
  volume       = {55},
  number       = {1-2},
  pages        = {45--57},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.mcm.2011.01.012},
  doi          = {10.1016/J.MCM.2011.01.012},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/KimKPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/KonidalaDKLLKK12,
  author       = {Divyan Munirathnam Konidala and
                  Made Harta Dwijaksara and
                  Kwangjo Kim and
                  Dongman Lee and
                  Byoungcheon Lee and
                  Daeyoung Kim and
                  Soontae Kim},
  title        = {Resuscitating privacy-preserving mobile payment with customer in complete
                  control},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {16},
  number       = {6},
  pages        = {643--654},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00779-011-0436-7},
  doi          = {10.1007/S00779-011-0436-7},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/puc/KonidalaDKLLKK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShinHK12,
  author       = {Young{-}joo Shin and
                  Junbeom Hur and
                  Kwangjo Kim},
  title        = {Security weakness in the Proof of Storage with Deduplication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {554},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/554},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShinHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/ChenZTWK11,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Haibo Tian and
                  Baodian Wei and
                  Kwangjo Kim},
  title        = {Discrete logarithm based chameleon hashing and signatures without
                  key exposure},
  journal      = {Comput. Electr. Eng.},
  volume       = {37},
  number       = {4},
  pages        = {614--623},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.compeleceng.2011.03.011},
  doi          = {10.1016/J.COMPELECENG.2011.03.011},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/ChenZTWK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/DucK11,
  author       = {Dang Nguyen Duc and
                  Kwangjo Kim},
  title        = {Defending {RFID} authentication protocols against DoS attacks},
  journal      = {Comput. Commun.},
  volume       = {34},
  number       = {3},
  pages        = {384--390},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comcom.2010.06.014},
  doi          = {10.1016/J.COMCOM.2010.06.014},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/DucK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KimSK11,
  author       = {Jangseong Kim and
                  Taeshik Shon and
                  Kwangjo Kim},
  title        = {Location-Aware and Privacy-Preserving Approach for Child Safety in
                  Ubiquitous Computing Environment},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {94-B},
  number       = {3},
  pages        = {686--689},
  year         = {2011},
  url          = {https://doi.org/10.1587/transcom.E94.B.686},
  doi          = {10.1587/TRANSCOM.E94.B.686},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KimSK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HanKS11,
  author       = {Kyusuk Han and
                  Kwangjo Kim and
                  Taeshik Shon},
  title        = {Enhancing Credibility of Location Based Service Using Multiple Sensing
                  Technologies},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {94-D},
  number       = {6},
  pages        = {1181--1184},
  year         = {2011},
  url          = {https://doi.org/10.1587/transinf.E94.D.1181},
  doi          = {10.1587/TRANSINF.E94.D.1181},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HanKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HanSK11,
  author       = {Kyusuk Han and
                  Taeshik Shon and
                  Kwangjo Kim},
  title        = {Design and Implementation of One-Way Key Agreement Model for Enhancing
                  VoIP Internet Phone Security},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {94-B},
  number       = {8},
  pages        = {2235--2238},
  year         = {2011},
  url          = {https://doi.org/10.1587/transcom.E94.B.2235},
  doi          = {10.1587/TRANSCOM.E94.B.2235},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HanSK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/HanKPS11,
  author       = {Kyusuk Han and
                  Kwangjo Kim and
                  Jong Hyuk Park and
                  Taeshik Shon},
  title        = {Efficient sensor node authentication in third generation-wireless
                  sensor networks integrated networks},
  journal      = {{IET} Commun.},
  volume       = {5},
  number       = {12},
  pages        = {1744--1754},
  year         = {2011},
  url          = {https://doi.org/10.1049/iet-com.2010.0539},
  doi          = {10.1049/IET-COM.2010.0539},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/HanKPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/HanYSPK11,
  author       = {Kyusuk Han and
                  Chan Yeob Yeun and
                  Taeshik Shon and
                  Jong Hyuk Park and
                  Kwangjo Kim},
  title        = {A scalable and efficient key escrow model for lawful interception
                  of IDBC-based secure communication},
  journal      = {Int. J. Commun. Syst.},
  volume       = {24},
  number       = {4},
  pages        = {461--472},
  year         = {2011},
  url          = {https://doi.org/10.1002/dac.1165},
  doi          = {10.1002/DAC.1165},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/HanYSPK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChenWZTWLLK11,
  author       = {Xiaofeng Chen and
                  Qianhong Wu and
                  Fangguo Zhang and
                  Haibo Tian and
                  Baodian Wei and
                  Byoungcheon Lee and
                  Hyunrok Lee and
                  Kwangjo Kim},
  title        = {New receipt-free voting scheme using double-trapdoor commitment},
  journal      = {Inf. Sci.},
  volume       = {181},
  number       = {8},
  pages        = {1493--1502},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ins.2010.12.012},
  doi          = {10.1016/J.INS.2010.12.012},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ChenWZTWLLK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WangSRK11,
  author       = {Qian Wang and
                  Hai Su and
                  Kui Ren and
                  Kwangjo Kim},
  title        = {Fast and scalable secret key generation exploiting channel phase randomness
                  in wireless networks},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {1422--1430},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5934929},
  doi          = {10.1109/INFCOM.2011.5934929},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/WangSRK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/VoLYK10,
  author       = {Duc{-}Liem Vo and
                  Hyunrok Lee and
                  Chan Yeob Yeun and
                  Kwangjo Kim},
  title        = {Enhancements of authenticated multiple key exchange protocol based
                  on bilinear pairings},
  journal      = {Comput. Electr. Eng.},
  volume       = {36},
  number       = {1},
  pages        = {155--159},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.compeleceng.2009.08.001},
  doi          = {10.1016/J.COMPELECENG.2009.08.001},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/VoLYK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/DucK10,
  author       = {Dang Nguyen Duc and
                  Kwangjo Kim},
  title        = {On the Security of {RFID} Group Scanning Protocols},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {93-D},
  number       = {3},
  pages        = {528--530},
  year         = {2010},
  url          = {https://doi.org/10.1587/transinf.E93.D.528},
  doi          = {10.1587/TRANSINF.E93.D.528},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/DucK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiK10,
  author       = {Jin Li and
                  Kwangjo Kim},
  title        = {Hidden attribute-based signatures without anonymity revocation},
  journal      = {Inf. Sci.},
  volume       = {180},
  number       = {9},
  pages        = {1681--1689},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ins.2010.01.008},
  doi          = {10.1016/J.INS.2010.01.008},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HanKS10,
  author       = {Kyusuk Han and
                  Kwangjo Kim and
                  Taeshik Shon},
  title        = {Untraceable Mobile Node Authentication in {WSN}},
  journal      = {Sensors},
  volume       = {10},
  number       = {5},
  pages        = {4410--4429},
  year         = {2010},
  url          = {https://doi.org/10.3390/s100504410},
  doi          = {10.3390/S100504410},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/HanKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/HanSK10,
  author       = {Kyusuk Han and
                  Taeshik Shon and
                  Kwangjo Kim},
  title        = {Efficient mobile sensor authentication in smart home and {WPAN}},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {56},
  number       = {2},
  pages        = {591--596},
  year         = {2010},
  url          = {https://doi.org/10.1109/TCE.2010.5505975},
  doi          = {10.1109/TCE.2010.5505975},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/HanSK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenZSTLK10,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Willy Susilo and
                  Haibo Tian and
                  Jin Li and
                  Kwangjo Kim},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Identity-Based Chameleon Hash Scheme without Key Exposure},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {200--215},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_13},
  doi          = {10.1007/978-3-642-14081-5\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenZSTLK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HanKKS10,
  author       = {Kyusuk Han and
                  Jangseong Kim and
                  Kwangjo Kim and
                  Taeshik Shon},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Efficient sensor node authentication via 3GPP mobile communication
                  networks},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {687--689},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866398},
  doi          = {10.1145/1866307.1866398},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HanKKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/KimBKZ10,
  author       = {Jangseong Kim and
                  Joonsang Baek and
                  Kwangjo Kim and
                  Jianying Zhou},
  editor       = {Jan Camenisch and
                  Costas Lambrinoudakis},
  title        = {A Privacy-Preserving Secure Service Discovery Protocol for Ubiquitous
                  Computing Environments},
  booktitle    = {Public Key Infrastructures, Services and Applications - 7th European
                  Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6711},
  pages        = {45--60},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-22633-5\_4},
  doi          = {10.1007/978-3-642-22633-5\_4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/KimBKZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ChenZTWMKK10,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Haibo Tian and
                  Qianhong Wu and
                  Yi Mu and
                  Jangseong Kim and
                  Kwangjo Kim},
  editor       = {Radu Sion},
  title        = {Three-Round Abuse-Free Optimistic Contract Signing with Everlasting
                  Secrecy},
  booktitle    = {Financial Cryptography and Data Security, 14th International Conference,
                  {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6052},
  pages        = {304--311},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14577-3\_23},
  doi          = {10.1007/978-3-642-14577-3\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/ChenZTWMKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DucKY10,
  author       = {Dang Nguyen Duc and
                  Kwangjo Kim and
                  Chan Yeob Yeun},
  title        = {Reconsidering Ryu-Takagi {RFID} authentication protocol},
  booktitle    = {5th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2010, London, United Kingdom, November 8-10, 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5678044/},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DucKY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LvRCK09,
  author       = {Jiqiang Lv and
                  Kui Ren and
                  Xiaofeng Chen and
                  Kwangjo Kim},
  title        = {The ring authenticated encryption scheme - How to provide a clue wisely},
  journal      = {Inf. Sci.},
  volume       = {179},
  number       = {1-2},
  pages        = {161--168},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.ins.2008.09.014},
  doi          = {10.1016/J.INS.2008.09.014},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LvRCK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciss/ZaidiHKMGK09,
  author       = {Syed Ali Raza Zaidi and
                  Maryam Hafeez and
                  Syed A. Khayam and
                  Desmond C. McLernon and
                  Mounir Ghogho and
                  Kwangjo Kim},
  title        = {On minimum cost coverage in wireless sensor networks},
  booktitle    = {43rd Annual Conference on Information Sciences and Systems, {CISS}
                  2009, The John Hopkins University, Baltimore, MD, USA, 18-20 March
                  2009},
  pages        = {213--218},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/CISS.2009.5054719},
  doi          = {10.1109/CISS.2009.5054719},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ciss/ZaidiHKMGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/DucLKK09,
  author       = {Dang Nguyen Duc and
                  Hyunrok Lee and
                  Divyan M. Konidala and
                  Kwangjo Kim},
  title        = {Open issues in {RFID} security},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402510},
  doi          = {10.1109/ICITST.2009.5402510},
  timestamp    = {Mon, 09 Aug 2021 17:01:45 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/DucLKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securware/ParkKK09,
  author       = {Hyewon Park and
                  Zeen Kim and
                  Kwangjo Kim},
  editor       = {Rainer Falk and
                  Wilson Goudalo and
                  Eric Y. Chen and
                  Reijo Savola and
                  Manuela Popescu},
  title        = {Forward Secure ID-Based Group Key Agreement Protocol with Anonymity},
  booktitle    = {The Third International Conference on Emerging Security Information,
                  Systems and Technologies, {SECURWARE} 2009, 18-23 June 2009, Athens/Glyfada,
                  Greece},
  pages        = {274--279},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SECURWARE.2009.49},
  doi          = {10.1109/SECURWARE.2009.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securware/ParkKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wts/MunHK09,
  author       = {Hyeran Mun and
                  Kyusuk Han and
                  Kwangjo Kim},
  title        = {3G-WLAN interworking: security analysis and new authentication and
                  key agreement based on {EAP-AKA}},
  booktitle    = {2009 Wireless Telecommunications Symposium, {WTS} 2009, Prague, Czech
                  Republic, April 22-24, 2009},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/WTS.2009.5068983},
  doi          = {10.1109/WTS.2009.5068983},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/wts/MunHK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZTWK09,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Haibo Tian and
                  Baodian Wei and
                  Kwangjo Kim},
  title        = {Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete
                  Logarithm Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZTWK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiRK09,
  author       = {Jin Li and
                  Kui Ren and
                  Kwangjo Kim},
  title        = {{A2BE:} Accountable Attribute-Based Encryption for Abuse Free Access
                  Control},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {118},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiRK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZTK09,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Haibo Tian and
                  Kwangjo Kim},
  title        = {Identity-Based Chameleon Hash Scheme Without Key Exposure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {400},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/400},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZTK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucK09,
  author       = {Dang Nguyen Duc and
                  Kwangjo Kim},
  title        = {Grouping-Proof Protocol for {RFID} Tags: Security Definition and Scalable
                  Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {609},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/609},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucK09a,
  author       = {Dang Nguyen Duc and
                  Kwangjo Kim},
  title        = {Security Analysis of {A} Remote User Authentication Protocol by Liao
                  and Wang},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {610},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/610},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DucK09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/VoK08,
  author       = {Duc{-}Liem Vo and
                  Kwangjo Kim},
  title        = {A secure mutual authentication scheme with key agreement using smart
                  card from bilinear pairings},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {23},
  number       = {3},
  year         = {2008},
  timestamp    = {Thu, 23 Aug 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/VoK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChenZTWSMLK08,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Haibo Tian and
                  Baodian Wei and
                  Willy Susilo and
                  Yi Mu and
                  Hyunrok Lee and
                  Kwangjo Kim},
  title        = {Efficient generic on-line/off-line (threshold) signatures without
                  key exposure},
  journal      = {Inf. Sci.},
  volume       = {178},
  number       = {21},
  pages        = {4192--4203},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.ins.2008.06.022},
  doi          = {10.1016/J.INS.2008.06.022},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ChenZTWSMLK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/YeunHVK08,
  author       = {Chan Yeob Yeun and
                  Kyusuk Han and
                  Duc{-}Liem Vo and
                  Kwangjo Kim},
  title        = {Secure authenticated group key agreement protocol in the {MANET} environment},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {13},
  number       = {3},
  pages        = {158--164},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.istr.2008.10.002},
  doi          = {10.1016/J.ISTR.2008.10.002},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/YeunHVK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiKZW08,
  author       = {Jin Li and
                  Kwangjo Kim and
                  Fangguo Zhang and
                  Duncan S. Wong},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Generic Security-Amplifying Methods of Ordinary Digital Signatures},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {224--241},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_14},
  doi          = {10.1007/978-3-540-68914-0\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/LiKZW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiK08,
  author       = {Jin Li and
                  Kwangjo Kim},
  title        = {Attribute-Based Ring Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/VoK07,
  author       = {Duc{-}Liem Vo and
                  Kwangjo Kim},
  title        = {Security Analysis of an ID-Based Key Agreement for Peer Group Communication},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {11},
  pages        = {2624--2625},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.11.2624},
  doi          = {10.1093/IETFEC/E90-A.11.2624},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/VoK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/HeoKK07,
  author       = {Sungchul Heo and
                  Zeen Kim and
                  Kwangjo Kim},
  title        = {Certificateless Authenticated Group Key Agreement Protocol for Dynamic
                  Groups},
  booktitle    = {Proceedings of the Global Communications Conference, 2007. {GLOBECOM}
                  '07, Washington, DC, USA, 26-30 November 2007},
  pages        = {464--468},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/GLOCOM.2007.93},
  doi          = {10.1109/GLOCOM.2007.93},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/HeoKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimKK07,
  author       = {Jangseong Kim and
                  Zeen Kim and
                  Kwangjo Kim},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {A Lightweight Privacy Preserving Authentication and Access Control
                  Scheme for Ubiquitous Computing Environment},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {37--48},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_4},
  doi          = {10.1007/978-3-540-76788-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KimKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiYK07,
  author       = {Jin Li and
                  Tsz Hon Yuen and
                  Kwangjo Kim},
  editor       = {Willy Susilo and
                  Joseph K. Liu and
                  Yi Mu},
  title        = {Practical Threshold Signatures Without Random Oracles},
  booktitle    = {Provable Security, First International Conference, ProvSec 2007, Wollongong,
                  Australia, November 1-2, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4784},
  pages        = {198--207},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75670-5\_14},
  doi          = {10.1007/978-3-540-75670-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LiYK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiKZC07,
  author       = {Jin Li and
                  Kwangjo Kim and
                  Fangguo Zhang and
                  Xiaofeng Chen},
  editor       = {Willy Susilo and
                  Joseph K. Liu and
                  Yi Mu},
  title        = {Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature},
  booktitle    = {Provable Security, First International Conference, ProvSec 2007, Wollongong,
                  Australia, November 1-2, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4784},
  pages        = {208--217},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75670-5\_15},
  doi          = {10.1007/978-3-540-75670-5\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/LiKZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/RenLKD06,
  author       = {Kui Ren and
                  Wenjing Lou and
                  Kwangjo Kim and
                  Robert H. Deng},
  title        = {A novel privacy preserving authentication and access control scheme
                  for pervasive computing environments},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {55},
  number       = {4},
  pages        = {1373--1384},
  year         = {2006},
  url          = {https://doi.org/10.1109/TVT.2006.877704},
  doi          = {10.1109/TVT.2006.877704},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/RenLKD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/SeoLK06,
  author       = {Youngjoon Seo and
                  Hyunrok Lee and
                  Kwangjo Kim},
  editor       = {Xiaobo Zhou and
                  Oleg Sokolsky and
                  Lu Yan and
                  Eun{-}Sun Jung and
                  Zili Shao and
                  Yi Mu and
                  Dong Chun Lee and
                  Daeyoung Kim and
                  Young{-}Sik Jeong and
                  Cheng{-}Zhong Xu},
  title        = {A Scalable and Untraceable Authentication Protocol for {RFID}},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006
                  Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea,
                  August 1-4, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4097},
  pages        = {252--261},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11807964\_26},
  doi          = {10.1007/11807964\_26},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/SeoLK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KonidalaK06,
  author       = {Divyan M. Konidala and
                  Kwangjo Kim},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Mobile {RFID} Applications and Security Challenges},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {194--205},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_17},
  doi          = {10.1007/11927587\_17},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KonidalaK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/ZhangK05,
  author       = {Fangguo Zhang and
                  Kwangjo Kim},
  title        = {Cryptanalysis of Lee-Hwang-Li's key authentication scheme},
  journal      = {Appl. Math. Comput.},
  volume       = {161},
  number       = {1},
  pages        = {101--107},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.amc.2003.12.012},
  doi          = {10.1016/J.AMC.2003.12.012},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/ZhangK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LvWK05,
  author       = {Jiqiang Lv and
                  Xinmei Wang and
                  Kwangjo Kim},
  title        = {Security of a multisignature scheme for specified group of verifiers},
  journal      = {Appl. Math. Comput.},
  volume       = {166},
  number       = {1},
  pages        = {58--63},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.amc.2004.04.108},
  doi          = {10.1016/J.AMC.2004.04.108},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/LvWK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amc/LvWK05a,
  author       = {Jiqiang Lv and
                  Xinmei Wang and
                  Kwangjo Kim},
  title        = {Practical convertible authenticated encryption schemes using self-certified
                  public keys},
  journal      = {Appl. Math. Comput.},
  volume       = {169},
  number       = {2},
  pages        = {1285--1297},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.amc.2004.10.057},
  doi          = {10.1016/J.AMC.2004.10.057},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amc/LvWK05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/VoK05,
  author       = {Duc{-}Liem Vo and
                  Kwangjo Kim},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Yet Another Forward Secure Signature from Bilinear Pairings},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {441--455},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_34},
  doi          = {10.1007/11734727\_34},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/VoK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/ParkKK05,
  author       = {Jaemin Park and
                  Zeen Kim and
                  Kwangjo Kim},
  title        = {State-based key management scheme for wireless sensor networks},
  booktitle    = {{IEEE} 2nd International Conference on Mobile Adhoc and Sensor Systems,
                  {MASS} 2005, November 7-10, 2005, The City Center Hotel, Washington,
                  {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/MAHSS.2005.1542877},
  doi          = {10.1109/MAHSS.2005.1542877},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/ParkKK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/KonidalaDLK05,
  author       = {Divyan M. Konidala and
                  Dang Nguyen Duc and
                  Dongman Lee and
                  Kwangjo Kim},
  title        = {A Capability-Based Privacy-Preserving Scheme for Pervasive Computing
                  Environments},
  booktitle    = {3rd {IEEE} Conference on Pervasive Computing and Communications Workshops
                  (PerCom 2005 Workshops), 8-12 March 2005, Kauai Island, HI, {USA}},
  pages        = {136--140},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/PERCOMW.2005.3},
  doi          = {10.1109/PERCOMW.2005.3},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/KonidalaDLK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/RenLWBDK04,
  author       = {Kui Ren and
                  Tieyan Li and
                  Zhiguo Wan and
                  Feng Bao and
                  Robert H. Deng and
                  Kwangjo Kim},
  title        = {Highly reliable trust establishment scheme in ad hoc networks},
  journal      = {Comput. Networks},
  volume       = {45},
  number       = {6},
  pages        = {687--699},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.comnet.2004.01.008},
  doi          = {10.1016/J.COMNET.2004.01.008},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/RenLWBDK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MinYK04,
  author       = {SungJun Min and
                  Go Yamamoto and
                  Kwangjo Kim},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Weak Property of Malleability in NTRUSign},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {379--390},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_33},
  doi          = {10.1007/978-3-540-27800-9\_33},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MinYK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChenZK04,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Kwangjo Kim},
  editor       = {Markus Jakobsson and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Limited Verifier Signature from Bilinear Pairings},
  booktitle    = {Applied Cryptography and Network Security, Second International Conference,
                  {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3089},
  pages        = {135--148},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24852-1\_10},
  doi          = {10.1007/978-3-540-24852-1\_10},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/ChenZK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/LeeBDKYY04,
  author       = {Byoungcheon Lee and
                  Colin Boyd and
                  Ed Dawson and
                  Kwangjo Kim and
                  Jeongmo Yang and
                  Seungjae Yoo},
  editor       = {James M. Hogan and
                  Paul Montague and
                  Martin K. Purvis and
                  Chris Steketee},
  title        = {Secure Key Issuing in ID-based Cryptography},
  booktitle    = {{ACSW} Frontiers 2004, 2004 {ACSW} Workshops - the Australasian Information
                  Security Workshop (AISW2004), the Australasian Workshop on Data Mining
                  and Web Intelligence (DMWI2004), and the Australasian Workshop on
                  Software Internationalisation {(AWSI2004)} . Dunedin, New Zealand,
                  January 2004},
  series       = {{CRPIT}},
  volume       = {32},
  pages        = {69--74},
  publisher    = {Australian Computer Society},
  year         = {2004},
  url          = {http://crpit.scem.westernsydney.edu.au/abstracts/CRPITV32Lee.html},
  timestamp    = {Thu, 25 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsw/LeeBDKYY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/LeeHKKI04,
  author       = {Songwon Lee and
                  Kyusuk Han and
                  Seok{-}kyu Kang and
                  Kwangjo Kim and
                  So Ran Ine},
  editor       = {Sokratis K. Katsikas and
                  Stefanos Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {Threshold Password-Based Authentication Using Bilinear Pairings},
  booktitle    = {Public Key Infrastructure, First European PKIWorkshop: Research and
                  Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3093},
  pages        = {350--363},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25980-0\_29},
  doi          = {10.1007/978-3-540-25980-0\_29},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/LeeHKKI04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/KonidalaYK04,
  author       = {Divyan M. Konidala and
                  Chan Yeob Yeun and
                  Kwangjo Kim},
  title        = {A secure and privacy enhanced protocol for location-based services
                  in ubiquitous society},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM}
                  '04, Dallas, Texas, USA, 29 November - 3 December 2004},
  pages        = {2164--2168},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/GLOCOM.2004.1378393},
  doi          = {10.1109/GLOCOM.2004.1378393},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/KonidalaYK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/RenLHPK04,
  author       = {Kui Ren and
                  Hyunrok Lee and
                  Kyusuk Han and
                  Jaemin Park and
                  Kwangjo Kim},
  editor       = {Hung Keng Pung and
                  Francis Bu{-}Sung Lee and
                  Chen{-}Kong Tham and
                  Saira Kuttan},
  title        = {An enhanced lightweight authentication protocol for access control
                  in wireless LANs},
  booktitle    = {12th {IEEE} International Conference on Networks, {ICON} 2004, Singapore,
                  November 16-19 2004},
  pages        = {444--450},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICON.2004.1409206},
  doi          = {10.1109/ICON.2004.1409206},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icon/RenLHPK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ChenZKK04,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Divyan M. Konidala and
                  Kwangjo Kim},
  editor       = {Anne Canteaut and
                  Kapalee Viswanathan},
  title        = {New ID-Based Threshold Signature Scheme from Bilinear Pairings},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
                  on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3348},
  pages        = {371--383},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30556-9\_29},
  doi          = {10.1007/978-3-540-30556-9\_29},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ChenZKK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ChenZK04,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Kwangjo Kim},
  editor       = {Kan Zhang and
                  Yuliang Zheng},
  title        = {Chameleon Hashing Without Key Exposure},
  booktitle    = {Information Security, 7th International Conference, {ISC} 2004, Palo
                  Alto, CA, USA, September 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3225},
  pages        = {87--98},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30144-8\_8},
  doi          = {10.1007/978-3-540-30144-8\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/ChenZK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/RenLKY04,
  author       = {Kui Ren and
                  Hyunrok Lee and
                  Kwangjo Kim and
                  Taewhan Yoo},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Efficient Authenticated Key Agreement Protocol for Dynamic Groups},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {144--159},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_13},
  doi          = {10.1007/978-3-540-31815-6\_13},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/RenLKY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZK04,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Kwangjo Kim},
  title        = {Chameleon Hashing without Key Exposure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {38},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/038},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/ZhangK03,
  author       = {Fangguo Zhang and
                  Kwangjo Kim},
  title        = {A Universal Forgery on Araki et al.'s Convertible Limited Verifier
                  Signature Scheme},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {86-A},
  number       = {2},
  pages        = {515--516},
  year         = {2003},
  url          = {http://search.ieice.org/bin/summary.php?id=e86-a\_2\_515},
  timestamp    = {Tue, 08 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/ZhangK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NarayananRK03,
  author       = {Arvind Narayanan and
                  C. Pandu Rangan and
                  Kwangjo Kim},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Practical Pay {TV} Schemes},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {192--203},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_17},
  doi          = {10.1007/3-540-45067-X\_17},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NarayananRK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangK03,
  author       = {Fangguo Zhang and
                  Kwangjo Kim},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Efficient ID-Based Blind Signature and Proxy Signature from Bilinear
                  Pairings},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {312--323},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_27},
  doi          = {10.1007/3-540-45067-X\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LeeKKR03,
  author       = {Sangwon Lee and
                  Yongdae Kim and
                  Kwangjo Kim and
                  DaeHyun Ryu},
  editor       = {Jianying Zhou and
                  Moti Yung and
                  Yongfei Han},
  title        = {An Efficient Tree-Based Group Key Agreement Using Bilinear Map},
  booktitle    = {Applied Cryptography and Network Security, First International Conference,
                  {ACNS} 2003. Kunming, China, October 16-19, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2846},
  pages        = {357--371},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45203-4\_28},
  doi          = {10.1007/978-3-540-45203-4\_28},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/LeeKKR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ChoiK03,
  author       = {SuGil Choi and
                  Kwangjo Kim},
  title        = {Authentication and payment protocol preserving location privacy in
                  mobile {IP}},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2003. {GLOBECOM}
                  '03, San Francisco, CA, USA, 1-5 December 2003},
  pages        = {1410--1414},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/GLOCOM.2003.1258470},
  doi          = {10.1109/GLOCOM.2003.1258470},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ChoiK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/DucCK03,
  author       = {Dang Nguyen Duc and
                  Jung Hee Cheon and
                  Kwangjo Kim},
  editor       = {Sihan Qing and
                  Dieter Gollmann and
                  Jianying Zhou},
  title        = {A Forward-Secure Blind Signature Scheme Based on the Strong {RSA}
                  Assumption},
  booktitle    = {Information and Communications Security, 5th International Conference,
                  {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2836},
  pages        = {11--21},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39927-8\_2},
  doi          = {10.1007/978-3-540-39927-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/DucCK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/XieZCK03,
  author       = {Yan Xie and
                  Fangguo Zhang and
                  Xiaofeng Chen and
                  Kwangjo Kim},
  editor       = {Sihan Qing and
                  Dieter Gollmann and
                  Jianying Zhou},
  title        = {ID-Based Distributed "Magic Ink" Signature from Pairings},
  booktitle    = {Information and Communications Security, 5th International Conference,
                  {ICICS} 2003, Huhehaote, China, October 10-13, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2836},
  pages        = {249--259},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39927-8\_23},
  doi          = {10.1007/978-3-540-39927-8\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/XieZCK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LeeBDKYY03,
  author       = {Byoungcheon Lee and
                  Colin Boyd and
                  Ed Dawson and
                  Kwangjo Kim and
                  Jeongmo Yang and
                  Seungjae Yoo},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Providing Receipt-Freeness in Mixnet-Based Voting Protocols},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {245--258},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_19},
  doi          = {10.1007/978-3-540-24691-6\_19},
  timestamp    = {Thu, 17 Nov 2022 14:05:51 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/LeeBDKYY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChenLK03,
  author       = {Xiaofeng Chen and
                  Byoungcheon Lee and
                  Kwangjo Kim},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {259--273},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_20},
  doi          = {10.1007/978-3-540-24691-6\_20},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChenLK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/VinodNSRK03,
  author       = {Vinod Vaikuntanathan and
                  Arvind Narayanan and
                  K. Srinathan and
                  C. Pandu Rangan and
                  Kwangjo Kim},
  editor       = {Thomas Johansson and
                  Subhamoy Maitra},
  title        = {On the Power of Computational Secret Sharing},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference
                  on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2904},
  pages        = {162--176},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24582-7\_12},
  doi          = {10.1007/978-3-540-24582-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/VinodNSRK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ChoiKK03,
  author       = {SuGil Choi and
                  Kwangjo Kim and
                  ByeongGon Kim},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {Practical Solution for Location Privacy in Mobile IPv6},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {69--83},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_6},
  doi          = {10.1007/978-3-540-24591-9\_6},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ChoiKK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangK03,
  author       = {Fangguo Zhang and
                  Kwangjo Kim},
  title        = {Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/011},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenZK03,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Kwangjo Kim},
  title        = {A New ID-based Group Signature Scheme from Bilinear Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {116},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenZK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcn/LeeAKPLKL02,
  author       = {Manho Lee and
                  Gookwhan Ahn and
                  Jinho Kim and
                  Jaegwan Park and
                  Byoungcheon Lee and
                  Kwangjo Kim and
                  Hyuckjae Lee},
  title        = {Design and implementation of an efficient fair off-line e-cash system
                  based on elliptic curve discrete logarithm problem},
  journal      = {J. Commun. Networks},
  volume       = {4},
  number       = {2},
  pages        = {81--89},
  year         = {2002},
  url          = {https://doi.org/10.1109/JCN.2002.6596898},
  doi          = {10.1109/JCN.2002.6596898},
  timestamp    = {Fri, 03 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcn/LeeAKPLKL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangLK02,
  author       = {Fangguo Zhang and
                  Shengli Liu and
                  Kwangjo Kim},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Compact Representation of Domain Parameters of Hyperelliptic Curve
                  Cryptosystems},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {203--213},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_17},
  doi          = {10.1007/3-540-45450-0\_17},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangLK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimK02,
  author       = {Myungsun Kim and
                  Kwangjo Kim},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {362--378},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_28},
  doi          = {10.1007/3-540-45450-0\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KimK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ZhangK02,
  author       = {Fangguo Zhang and
                  Kwangjo Kim},
  editor       = {Yuliang Zheng},
  title        = {ID-Based Blind Signature and Ring Signature from Pairings},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {533--547},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_33},
  doi          = {10.1007/3-540-36178-2\_33},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ZhangK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/KimKK02,
  author       = {Myungsun Kim and
                  Jongseong Kim and
                  Kwangjo Kim},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman
                  Assumption},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {97--108},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_9},
  doi          = {10.1007/3-540-36159-6\_9},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/KimKK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LeeK02,
  author       = {Byoungcheon Lee and
                  Kwangjo Kim},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {389--406},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_27},
  doi          = {10.1007/3-540-36552-4\_27},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LeeK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/LeeK02,
  author       = {Byoungcheon Lee and
                  Kwangjo Kim},
  editor       = {Alfred Menezes and
                  Palash Sarkar},
  title        = {Self-certified Signatures},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
                  on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  series       = {Lecture Notes in Computer Science},
  volume       = {2551},
  pages        = {199--214},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36231-2\_17},
  doi          = {10.1007/3-540-36231-2\_17},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/LeeK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2001,
  editor       = {Kwangjo Kim},
  title        = {Information Security and Cryptology - {ICISC} 2001, 4th International
                  Conference Seoul, Korea, December 6-7, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2288},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45861-1},
  doi          = {10.1007/3-540-45861-1},
  isbn         = {3-540-43319-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangLK02,
  author       = {Fangguo Zhang and
                  Shengli Liu and
                  Kwangjo Kim},
  title        = {ID-Based One Round Authenticated Tripartite Key Agreement Protocol
                  with Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/122},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangLK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangK02,
  author       = {Fangguo Zhang and
                  Kwangjo Kim},
  title        = {Cryptanalysis of Two New Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangLK02a,
  author       = {Fangguo Zhang and
                  Shengli Liu and
                  Kwangjo Kim},
  title        = {Attack on {A} New Public Key Cryptosystem from ISC'02 {(LNCS} 2433)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {178},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/178},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangLK02a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/AhnK01,
  author       = {Gail{-}Joon Ahn and
                  Kwangjo Kim},
  title        = {{CONUGA:} Constrained User-Group Assignment},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {24},
  number       = {2},
  pages        = {87--100},
  year         = {2001},
  url          = {https://doi.org/10.1006/jnca.2000.0125},
  doi          = {10.1006/JNCA.2000.0125},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/AhnK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeKK01,
  author       = {Byoungcheon Lee and
                  Heesun Kim and
                  Kwangjo Kim},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Secure Mobile Agent Using Strong Non-designated Proxy Signature},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {474},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_37},
  doi          = {10.1007/3-540-47719-5\_37},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LeeKK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/CheonKKLK01,
  author       = {Jung Hee Cheon and
                  MunJu Kim and
                  Kwangjo Kim and
                  Jung{-}Yeun Lee and
                  SungWoo Kang},
  editor       = {Kwangjo Kim},
  title        = {Improved Impossible Differential Cryptanalysis of Rijndael and Crypton},
  booktitle    = {Information Security and Cryptology - {ICISC} 2001, 4th International
                  Conference Seoul, Korea, December 6-7, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2288},
  pages        = {39--49},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45861-1\_4},
  doi          = {10.1007/3-540-45861-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/CheonKKLK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimKL01,
  author       = {Jinho Kim and
                  Kwangjo Kim and
                  Chulsoo Lee},
  editor       = {Kwangjo Kim},
  title        = {An Efficient and Provably Secure Threshold Blind Signature},
  booktitle    = {Information Security and Cryptology - {ICISC} 2001, 4th International
                  Conference Seoul, Korea, December 6-7, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2288},
  pages        = {318--327},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45861-1\_24},
  doi          = {10.1007/3-540-45861-1\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KimKL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/LeeKM01,
  author       = {Byoungcheon Lee and
                  Kwangjo Kim and
                  Joongsoo Ma},
  editor       = {C. Pandu Rangan and
                  Cunsheng Ding},
  title        = {Efficient Public Auction with One-Time Registration and Public Verifiability},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2001, Second International Conference
                  on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2247},
  pages        = {162--174},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45311-3\_16},
  doi          = {10.1007/3-540-45311-3\_16},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/LeeKM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2001,
  editor       = {Kwangjo Kim},
  title        = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2},
  doi          = {10.1007/3-540-44586-2},
  isbn         = {3-540-41658-7},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaekLK00,
  author       = {Joonsang Baek and
                  Byoungcheon Lee and
                  Kwangjo Kim},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman
                  Assumption},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {49--58},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_5},
  doi          = {10.1007/10718964\_5},
  timestamp    = {Sat, 19 Oct 2019 20:34:19 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BaekLK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LeeK00,
  author       = {Byoungcheon Lee and
                  Kwangjo Kim},
  editor       = {Dongho Won},
  title        = {Secure Matchmaking Protocol},
  booktitle    = {Information Security and Cryptology - {ICISC} 2000, Third International
                  Conference, Seoul, Korea, December 8-9, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2015},
  pages        = {123--134},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45247-8\_10},
  doi          = {10.1007/3-540-45247-8\_10},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LeeK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/SongK00,
  author       = {Boyeon Song and
                  Kwangjo Kim},
  editor       = {Bimal K. Roy and
                  Eiji Okamoto},
  title        = {Two-Pass Authenticated Key Arrangement Protocol with Key Confirmation},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2000, First International Conference
                  in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1977},
  pages        = {237--249},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44495-5\_21},
  doi          = {10.1007/3-540-44495-5\_21},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/SongK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wetice/AhnKY00,
  author       = {Gookwhan Ahn and
                  Kwangjo Kim and
                  Hee Yong Youn},
  title        = {Tapping Alert Protocol},
  booktitle    = {9th {IEEE} International Workshops on Enabling Technologies: Infrastructure
                  for Collaborative Enterprises {(WETICE} 2000), 4-16 June 2000, Gaithersburg,
                  MD, {USA}},
  pages        = {159--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ENABL.2000.883721},
  doi          = {10.1109/ENABL.2000.883721},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wetice/AhnKY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SeoK99,
  author       = {Moonseog Seo and
                  Kwangjo Kim},
  editor       = {JooSeok Song},
  title        = {Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption
                  Scheme},
  booktitle    = {Information Security and Cryptology - ICISC'99, Second International
                  Conference, Seoul, Korea, December 9-10, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1787},
  pages        = {269--277},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10719994\_21},
  doi          = {10.1007/10719994\_21},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SeoK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icppw/KimPB99,
  author       = {Kwangjo Kim and
                  Sangjoon Park and
                  Joonsang Baek},
  title        = {Improving Fairness and Privacy of Zhou-Gollmann's Fair Non-Repudiation
                  Protocol},
  booktitle    = {Proceedings of the 1999 International Conference on Parallel Processing
                  Workshops, {ICPPW} 1999, Wakamatsu, Japan, September 21-24, 1999},
  pages        = {140--145},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/ICPPW.1999.800053},
  doi          = {10.1109/ICPPW.1999.800053},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icppw/KimPB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ParkLSK97,
  author       = {Sung{-}Mo Park and
                  Sangjin Lee and
                  Soo Hak Sung and
                  Kwangjo Kim},
  title        = {Improving Bounds for the Number of Correlation Immune Boolean Functions},
  journal      = {Inf. Process. Lett.},
  volume       = {61},
  number       = {4},
  pages        = {209--212},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0020-0190(97)00010-0},
  doi          = {10.1016/S0020-0190(97)00010-0},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/ParkLSK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ParkPKW97,
  author       = {Sangjoon Park and
                  Sangwoo Park and
                  Kwangjo Kim and
                  Dongho Won},
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {Two efficient {RSA} multisignature schemes},
  booktitle    = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  pages        = {217--222},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028477},
  doi          = {10.1007/BFB0028477},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ParkPKW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/1996,
  editor       = {Kwangjo Kim and
                  Tsutomu Matsumoto},
  title        = {Advances in Cryptology - {ASIACRYPT} '96, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Kyongju, Korea, November 3-7, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1163},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0034829},
  doi          = {10.1007/BFB0034829},
  isbn         = {3-540-61872-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/1996.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CheeLK94,
  author       = {Seongtaek Chee and
                  Sangjin Lee and
                  Kwangjo Kim},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini},
  title        = {Semi-bent Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference
                  on the Theory and Applications of Cryptology, Wollongong, Australia,
                  November 28 - December 1, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {917},
  pages        = {107--118},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0000428},
  doi          = {10.1007/BFB0000428},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CheeLK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Kim91,
  author       = {Kwangjo Kim},
  editor       = {Hideki Imai and
                  Ronald L. Rivest and
                  Tsutomu Matsumoto},
  title        = {Construction of DES-like S-boxes Based on Boolean Functions Satisfyieng
                  the {SAC}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
                  on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
                  November 11-14, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {739},
  pages        = {59--72},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57332-1\_5},
  doi          = {10.1007/3-540-57332-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Kim91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KimMI90,
  author       = {Kwangjo Kim and
                  Tsutomu Matsumoto and
                  Hideki Imai},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {A Recursive Construction Method of S-boxes Satisfying Strict Avalanche
                  Criterion},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {564--574},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_39},
  doi          = {10.1007/3-540-38424-3\_39},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KimMI90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics