What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kwangjo Kim
Google Scholar
45
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiajcis
Comparison of Post-Quantum Signatures - FALCON vs SOLMAE with Python.
Kwangjo Kim
2023
conf/icisc
Theoretical and Empirical Analysis of FALCON and SOLMAE Using Their Python Implementation.
Kwangjo Kim
2019
journals/compsec
eMotion: An SGX extension for migrating enclaves.
Jaemin Park
Sungjin Park
Brent ByungHoon Kang
Kwangjo Kim
2018
journals/tifs
Deep Abstraction and Weighted Feature Selection for Wi-Fi Impersonation Detection.
Muhamad Erza Aminanto
Rakyong Choi
Harry Chandra Tanuwidjaja
Paul D. Yoo
Kwangjo Kim
2018
conf/wisa
Blockchain-Based Decentralized Key Management System with Quantum Resistance.
Hyeongcheol An
Rakyong Choi
Kwangjo Kim
2017
conf/wisa
Improving Detection of Wi-Fi Impersonation by Fully Unsupervised Deep Learning.
Muhamad Erza Aminanto
Kwangjo Kim
2016
conf/wisa
Detecting Impersonation Attack in WiFi Networks Using Deep Learning Approach.
Muhamad Erza Aminanto
Kwangjo Kim
2015
conf/asiajcis
Preliminary Design of a Novel Lightweight Authenticated Encryption Scheme Based on the Sponge Function.
Hakju Kim
Kwangjo Kim
2013
conf/asiajcis
Preventing Abuse of Cookies Stolen by XSS.
Hiroya Takahashi
Kenji Yasunaga
Masahiro Mambo
Kwangjo Kim
Heung Youl Youm
2010
conf/ccs
Efficient sensor node authentication via 3GPP mobile communication networks.
Kyusuk Han
Jangseong Kim
Kwangjo Kim
Taeshik Shon
2010
conf/acisp
Identity-Based Chameleon Hash Scheme without Key Exposure.
Xiaofeng Chen
Fangguo Zhang
Willy Susilo
Haibo Tian
Jin Li
Kwangjo Kim
2010
conf/fc
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy.
Xiaofeng Chen
Fangguo Zhang
Haibo Tian
Qianhong Wu
Yi Mu
Jangseong Kim
Kwangjo Kim
2008
journals/istr
Secure authenticated group key agreement protocol in the MANET environment.
Chan Yeob Yeun
Kyusuk Han
Duc-Liem Vo
Kwangjo Kim
2008
conf/acns
Generic Security-Amplifying Methods of Ordinary Digital Signatures.
Jin Li
Kwangjo Kim
Fangguo Zhang
Duncan S. Wong
2007
conf/icisc
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment.
Jangseong Kim
Zeen Kim
Kwangjo Kim
2007
conf/provsec
Practical Threshold Signatures Without Random Oracles.
Jin Li
Tsz Hon Yuen
Kwangjo Kim
2007
conf/provsec
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature.
Jin Li
Kwangjo Kim
Fangguo Zhang
Xiaofeng Chen
2006
conf/icisc
Mobile RFID Applications and Security Challenges.
Divyan M. Konidala
Kwangjo Kim
2005
conf/icisc
Yet Another Forward Secure Signature from Bilinear Pairings.
Duc-Liem Vo
Kwangjo Kim
2004
conf/acisp
Weak Property of Malleability in NTRUSign.
SungJun Min
Go Yamamoto
Kwangjo Kim
2004
conf/acns
Limited Verifier Signature from Bilinear Pairings.
Xiaofeng Chen
Fangguo Zhang
Kwangjo Kim
2004
conf/wisa
Efficient Authenticated Key Agreement Protocol for Dynamic Groups.
Kui Ren
Hyunrok Lee
Kwangjo Kim
Taewhan Yoo
2003
conf/acisp
Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings.
Fangguo Zhang
Kwangjo Kim
2003
conf/acisp
Practical Pay TV Schemes.
Arvind Narayanan
C. Pandu Rangan
Kwangjo Kim
2003
conf/acns
An Efficient Tree-Based Group Key Agreement Using Bilinear Map.
Sangwon Lee
Yongdae Kim
Kwangjo Kim
DaeHyun Ryu
2003
conf/icisc
Providing Receipt-Freeness in Mixnet-Based Voting Protocols.
Byoungcheon Lee
Colin Boyd
Ed Dawson
Kwangjo Kim
Jeongmo Yang
Seungjae Yoo
2003
conf/icisc
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption.
Xiaofeng Chen
Byoungcheon Lee
Kwangjo Kim
2003
conf/wisa
Practical Solution for Location Privacy in Mobile IPv6.
SuGil Choi
Kwangjo Kim
ByeongGon Kim
2003
conf/icics
ID-Based Distributed "Magic Ink" Signature from Pairings.
Yan Xie
Fangguo Zhang
Xiaofeng Chen
Kwangjo Kim
2003
conf/icics
A Forward-Secure Blind Signature Scheme Based on the Strong RSA Assumption.
Dang Nguyen Duc
Jung Hee Cheon
Kwangjo Kim
2002
conf/acisp
Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems.
Fangguo Zhang
Shengli Liu
Kwangjo Kim
2002
conf/acisp
A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem.
Myungsun Kim
Kwangjo Kim
2002
conf/icisc
Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer.
Byoungcheon Lee
Kwangjo Kim
2002
conf/icics
Anonymous Fingerprinting as Secure as the Bilinear Diffie-Hellman Assumption.
Myungsun Kim
Jongseong Kim
Kwangjo Kim
2002
conf/asiacrypt
ID-Based Blind Signature and Ring Signature from Pairings.
Fangguo Zhang
Kwangjo Kim
2001
conf/acisp
Secure Mobile Agent Using Strong Non-designated Proxy Signature.
Byoungcheon Lee
Heesun Kim
Kwangjo Kim
2001
conf/icisc
An Efficient and Provably Secure Threshold Blind Signature.
Jinho Kim
Kwangjo Kim
Chulsoo Lee
2001
conf/icisc
Improved Impossible Differential Cryptanalysis of Rijndael and Crypton.
Jung Hee Cheon
MunJu Kim
Kwangjo Kim
Jung-Yeun Lee
SungWoo Kang
2000
conf/acisp
Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption.
Joonsang Baek
Byoungcheon Lee
Kwangjo Kim
2000
conf/icisc
Secure Matchmaking Protocol.
Byoungcheon Lee
Kwangjo Kim
1999
conf/icisc
Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme.
Moonseog Seo
Kwangjo Kim
1997
conf/icics
Two efficient RSA multisignature schemes.
Sangjoon Park
Sangwoo Park
Kwangjo Kim
Dongho Won
1994
conf/asiacrypt
Semi-bent Functions.
Seongtaek Chee
Sangjin Lee
Kwangjo Kim
1991
conf/asiacrypt
Construction of DES-like S-boxes Based on Boolean Functions Satisfyieng the SAC.
Kwangjo Kim
1990
conf/crypto
A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion.
Kwangjo Kim
Tsutomu Matsumoto
Hideki Imai
Coauthors
Arvind Narayanan
(1)
Brent ByungHoon Kang
(1)
ByeongGon Kim
(1)
Byoungcheon Lee
(6)
C. Pandu Rangan
(1)
Chan Yeob Yeun
(1)
Chulsoo Lee
(1)
Colin Boyd
(1)
DaeHyun Ryu
(1)
Dang Nguyen Duc
(1)
Divyan M. Konidala
(1)
Dongho Won
(1)
Duc-Liem Vo
(2)
Duncan S. Wong
(1)
Ed Dawson
(1)
Fangguo Zhang
(9)
Go Yamamoto
(1)
Haibo Tian
(2)
Hakju Kim
(1)
Harry Chandra Tanuwidjaja
(1)
Heesun Kim
(1)
Heung Youl Youm
(1)
Hideki Imai
(1)
Hiroya Takahashi
(1)
Hyeongcheol An
(1)
Hyunrok Lee
(1)
Jaemin Park
(1)
Jangseong Kim
(3)
Jeongmo Yang
(1)
Jin Li
(4)
Jinho Kim
(1)
Jongseong Kim
(1)
Joonsang Baek
(1)
Jung Hee Cheon
(2)
Jung-Yeun Lee
(1)
Kenji Yasunaga
(1)
Kui Ren
(1)
Kwangjo Kim
(45)
Kyusuk Han
(2)
Masahiro Mambo
(1)
Moonseog Seo
(1)
Muhamad Erza Aminanto
(3)
MunJu Kim
(1)
Myungsun Kim
(2)
Paul D. Yoo
(1)
Qianhong Wu
(1)
Rakyong Choi
(2)
Sangjin Lee
(1)
Sangjoon Park
(1)
Sangwon Lee
(1)
Sangwoo Park
(1)
Seongtaek Chee
(1)
Seungjae Yoo
(1)
Shengli Liu
(1)
SuGil Choi
(1)
Sungjin Park
(1)
SungJun Min
(1)
SungWoo Kang
(1)
Taeshik Shon
(1)
Taewhan Yoo
(1)
Tsutomu Matsumoto
(1)
Tsz Hon Yuen
(1)
Willy Susilo
(1)
Xiaofeng Chen
(6)
Yan Xie
(1)
Yi Mu
(1)
Yongdae Kim
(1)
Zeen Kim
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to