default search action
Haeryong Park
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j11]Taehwan Park, Hwajeong Seo, Junsub Kim, Haeryong Park, Howon Kim:
Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor. Secur. Commun. Networks 2018: 7012056:1-7012056:10 (2018) - 2015
- [j10]TaeJin Lee, Hesun Cho, Haeryong Park, Jin Kwak:
Detection of Malware Propagation in Sensor Node and Botnet Group Clustering Based on E-mail Spam Analysis. Int. J. Distributed Sens. Networks 11: 530250:1-530250:12 (2015) - 2014
- [j9]Seokung Yoon, Haeryong Park, Hyeong Seon Yoo:
Development of Indicators for Information Security Level Assessment of VoIP Service Providers. KSII Trans. Internet Inf. Syst. 8(2): 634-645 (2014) - [j8]In Kyeom Cho, TaeGuen Kim, Yu Jin Shim, Haeryong Park, Bomin Choi, Eul Gyu Im:
Malware Similarity Analysis using API Sequence Alignments. J. Internet Serv. Inf. Secur. 4(4): 103-114 (2014) - 2011
- [j7]Kitae Kim, Ikkwon Yie, Seongan Lim, Haeryong Park:
A Method of Finding Bad Signatures in an RSA-Type Batch Verification. Informatica 22(2): 189-201 (2011) - 2010
- [j6]Haeryong Park:
Security Analysis of the Lee-Lee-Kim-Jeong Hybrid Authentication and Key Distribution Scheme. IEICE Trans. Commun. 93-B(4): 1013-1015 (2010) - [i2]Seokung Yoon, Joongman Kim, Haeryong Park, Hyuncheol Jeong, Yoojae Won:
The SEED Cipher Algorithm and Its Use with the Secure Real-Time Transport Protocol (SRTP). RFC 5669: 1-13 (2010)
2000 – 2009
- 2009
- [j5]Haeryong Park, Seongan Lim, Ikkwon Yie:
A privacy problem on Hu-Huang's proxy key generation protocol. Comput. Stand. Interfaces 31(2): 480-483 (2009) - [j4]Haeryong Park, Seongan Lim, Ikkwon Yie, Kitae Kim, Junghwan Song:
Strong unforgeability in group signature schemes. Comput. Stand. Interfaces 31(4): 856-862 (2009) - [j3]Haeryong Park:
Cryptanalysis of the Kiyomoto-Fukushima-Tanaka Anonymous Attribute Authentication Scheme. IEICE Trans. Commun. 92-B(9): 2946-2947 (2009) - [c10]Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park, Yeonjung Kang:
Update on SEED: SEED-192/256. ISA 2009: 1-10 - [c9]Jesang Lee, Seokhie Hong, Jaechul Sung, Haeryong Park:
A New Double-Block-Length Hash Function Using Feistel Structure. ISA 2009: 11-20 - [i1]Sang Hwan Park, Haeryong Park, Yoojae Won, Jaeil Lee, Stephen T. Kent:
Traceable Anonymous Certificate. RFC 5636: 1-31 (2009) - 2008
- [j2]Haeryong Park, Kilsoo Chun, Seungho Ahn:
Cryptanalysis of the Hwang-Lo-Lin Scheme Based on an ID-Based Cryptosystem and Its Improvement. IEICE Trans. Commun. 91-B(3): 900-903 (2008) - [j1]Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong, Jongin Lim, Haeryong Park, Kilsoo Chun:
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9): 2607-2614 (2008) - [c8]Yeonjung Kang, Haeryong Park, Kilsoo Chun, Junghwan Song:
A Digital Identity Management Service Model. ITNG 2008: 599-602 - 2007
- [c7]Haeryong Park, Seongan Lim, Ikkwon Yie, Hyun Kim, Kilsoo Chun, Jaeil Lee:
An Information Aggregation Scheme of Multi-node in Ubiquitous Sensor Networks. ISPA Workshops 2007: 60-68 - [c6]Haeryong Park, Hyun Kim, Kilsoo Chun, Jaeil Lee, Seongan Lim, Ikkwon Yie:
Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement. ITNG 2007: 747-753 - 2006
- [c5]Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Haeryong Park, Kilsoo Chun:
Modified ID-Based Threshold Decryption and Its Application to Mediated ID-Based Encryption. APWeb 2006: 720-725 - [c4]Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun:
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. Inscrypt 2006: 1-12 - [c3]Haeryong Park, Hak Soo Ju, Kilsoo Chun, Jaeil Lee, Seungho Ahn, Bongnam Noh:
The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment. ICPADS (2) 2006: 55-60 - 2005
- [c2]Haeryong Park, Kilsoo Chun, Seungho Ahn:
The Security Requirement for off-line E-cash system based on IC Card. ICPADS (2) 2005: 260-264 - 2003
- [c1]Jeeyeon Kim, Hyunjo Kwon, Haeryong Park, Seungjoo Kim, Dongho Won:
An Improvement of VeriSign's Key Roaming Service Protocol. ICWE 2003: 281-288
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint