Generic construction of certificateless signature DH Yum, PJ Lee Australasian Conference on Information Security and Privacy, 200-211, 2004 | 281 | 2004 |
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing A Boldyreva, C Gentry, A O'Neill, DH Yum Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 190 | 2007 |
Generic construction of certificateless encryption DH Yum, PJ Lee International Conference on Computational Science and Its Applications, 802-811, 2004 | 124 | 2004 |
New signcryption schemes based on KCDSA DH Yum, PJ Lee International Conference on Information Security and Cryptology, 305-317, 2001 | 99 | 2001 |
Optimistic fair exchange in a multi-user setting Y Dodis, PJ Lee, DH Yum International Workshop on Public Key Cryptography, 118-133, 2007 | 81 | 2007 |
Identity-based cryptography in public key management DH Yum, PJ Lee European Public Key Infrastructure Workshop, 71-84, 2004 | 73 | 2004 |
Timed-release encryption with pre-open capability and its application to certified e-mail system YH Hwang, DH Yum, PJ Lee International Conference on Information Security, 344-358, 2005 | 59 | 2005 |
Order-preserving encryption for non-uniformly distributed plaintexts DH Yum, DS Kim, JS Kim, PJ Lee, SJ Hong International Workshop on Information Security Applications, 84-97, 2011 | 45 | 2011 |
Distance bounding protocol for mutual authentication DH Yum, JS Kim, SJ Hong, PJ Lee IEEE Transactions on Wireless Communications 10 (2), 592-601, 2010 | 31 | 2010 |
EPA: An efficient password-based protocol for authenticated key exchange YH Hwang, DH Yum, PJ Lee Australasian Conference on Information Security and Privacy, 452-463, 2003 | 28 | 2003 |
Exact formulae for resilience in random key predistribution schemes DH Yum, PJ Lee IEEE Transactions on Wireless Communications 11 (5), 1638-1642, 2012 | 27 | 2012 |
Time capsule signature Y Dodis, DH Yum International Conference on Financial Cryptography and Data Security, 57-71, 2005 | 24 | 2005 |
Efficient key updating signature schemes based on IBS DH Yum, PJ Lee IMA International Conference on Cryptography and Coding, 167-182, 2003 | 23 | 2003 |
Trapdoor sanitizable signatures made easy DH Yum, JW Seo, PJ Lee International Conference on Applied Cryptography and Network Security, 53-68, 2010 | 20 | 2010 |
Distance bounding protocol with adjustable false acceptance rate DH Yum, JS Kim, SJ Hong, PJ Lee IEEE Communications Letters 15 (4), 434-436, 2011 | 19 | 2011 |
Single-layer fractal hash chain traversal with almost optimal complexity DH Yum, JW Seo, S Eom, PJ Lee Cryptographers’ Track at the RSA Conference, 325-339, 2009 | 18 | 2009 |
Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles JW Seo, DH Yum, PJ Lee Theoretical Computer Science 491, 83-93, 2013 | 15 | 2013 |
New multiparty signature schemes for network routing applications A Boldyreva, C Gentry, A O'Neill, DH Yum ACM Transactions on Information and System Security (TISSEC) 12 (1), 1-39, 2008 | 13 | 2008 |
Cryptanalysis of Yeh-Shen-Hwang's one-time password authentication scheme DH Yum, PJ Lee IEICE transactions on communications 88 (4), 1647-1648, 2005 | 12 | 2005 |
Comments on “unidirectional chosen-ciphertext secure proxy re-encryption” JW Seo, DH Yum, PJ Lee IEEE Transactions on Information Theory 59 (5), 3256-3256, 2012 | 10 | 2012 |