Dae Hyun Yum
Dae Hyun Yum
Verified email at mju.ac.kr
Title
Cited by
Cited by
Year
Generic construction of certificateless signature
DH Yum, PJ Lee
Australasian Conference on Information Security and Privacy, 200-211, 2004
2812004
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
A Boldyreva, C Gentry, A O'Neill, DH Yum
Proceedings of the 14th ACM conference on Computer and communications …, 2007
1902007
Generic construction of certificateless encryption
DH Yum, PJ Lee
International Conference on Computational Science and Its Applications, 802-811, 2004
1242004
New signcryption schemes based on KCDSA
DH Yum, PJ Lee
International Conference on Information Security and Cryptology, 305-317, 2001
992001
Optimistic fair exchange in a multi-user setting
Y Dodis, PJ Lee, DH Yum
International Workshop on Public Key Cryptography, 118-133, 2007
812007
Identity-based cryptography in public key management
DH Yum, PJ Lee
European Public Key Infrastructure Workshop, 71-84, 2004
732004
Timed-release encryption with pre-open capability and its application to certified e-mail system
YH Hwang, DH Yum, PJ Lee
International Conference on Information Security, 344-358, 2005
592005
Order-preserving encryption for non-uniformly distributed plaintexts
DH Yum, DS Kim, JS Kim, PJ Lee, SJ Hong
International Workshop on Information Security Applications, 84-97, 2011
452011
Distance bounding protocol for mutual authentication
DH Yum, JS Kim, SJ Hong, PJ Lee
IEEE Transactions on Wireless Communications 10 (2), 592-601, 2010
312010
EPA: An efficient password-based protocol for authenticated key exchange
YH Hwang, DH Yum, PJ Lee
Australasian Conference on Information Security and Privacy, 452-463, 2003
282003
Exact formulae for resilience in random key predistribution schemes
DH Yum, PJ Lee
IEEE Transactions on Wireless Communications 11 (5), 1638-1642, 2012
272012
Time capsule signature
Y Dodis, DH Yum
International Conference on Financial Cryptography and Data Security, 57-71, 2005
242005
Efficient key updating signature schemes based on IBS
DH Yum, PJ Lee
IMA International Conference on Cryptography and Coding, 167-182, 2003
232003
Trapdoor sanitizable signatures made easy
DH Yum, JW Seo, PJ Lee
International Conference on Applied Cryptography and Network Security, 53-68, 2010
202010
Distance bounding protocol with adjustable false acceptance rate
DH Yum, JS Kim, SJ Hong, PJ Lee
IEEE Communications Letters 15 (4), 434-436, 2011
192011
Single-layer fractal hash chain traversal with almost optimal complexity
DH Yum, JW Seo, S Eom, PJ Lee
Cryptographers’ Track at the RSA Conference, 325-339, 2009
182009
Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles
JW Seo, DH Yum, PJ Lee
Theoretical Computer Science 491, 83-93, 2013
152013
New multiparty signature schemes for network routing applications
A Boldyreva, C Gentry, A O'Neill, DH Yum
ACM Transactions on Information and System Security (TISSEC) 12 (1), 1-39, 2008
132008
Cryptanalysis of Yeh-Shen-Hwang's one-time password authentication scheme
DH Yum, PJ Lee
IEICE transactions on communications 88 (4), 1647-1648, 2005
122005
Comments on “unidirectional chosen-ciphertext secure proxy re-encryption”
JW Seo, DH Yum, PJ Lee
IEEE Transactions on Information Theory 59 (5), 3256-3256, 2012
102012
The system can't perform the operation now. Try again later.
Articles 1–20