BibTeX records: Dae Hyun Yum

download as .bib file

@article{DBLP:journals/ieicetd/LeeKCY21,
  author       = {Jinwoo Lee and
                  Tae Gu Kang and
                  Kookrae Cho and
                  Dae Hyun Yum},
  title        = {New Parameter Sets for SPHINCS\({}^{\mbox{+}}\)},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {104-D},
  number       = {6},
  pages        = {890--892},
  year         = {2021},
  url          = {https://doi.org/10.1587/transinf.2019edl8223},
  doi          = {10.1587/TRANSINF.2019EDL8223},
  timestamp    = {Thu, 12 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/LeeKCY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ZhangYS21,
  author       = {Zhong Zhang and
                  Dae Hyun Yum and
                  Minho Shin},
  title        = {{PARS:} Privacy-Aware Reward System for Mobile Crowdsensing Systems},
  journal      = {Sensors},
  volume       = {21},
  number       = {21},
  pages        = {7045},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21217045},
  doi          = {10.3390/S21217045},
  timestamp    = {Thu, 18 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/ZhangYS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/ParkKCY20,
  author       = {Seongmin Park and
                  Juneyeun Kim and
                  Kookrae Cho and
                  Dae Hyun Yum},
  title        = {Finding the key length of a Vigen{\`{e}}re cipher: How to improve
                  the twist algorithm},
  journal      = {Cryptologia},
  volume       = {44},
  number       = {3},
  pages        = {197--204},
  year         = {2020},
  url          = {https://doi.org/10.1080/01611194.2019.1657202},
  doi          = {10.1080/01611194.2019.1657202},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/ParkKCY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yum19,
  author       = {Dae Hyun Yum},
  title        = {Mathematical Analysis of Secrecy Amplification in Key Infection: The
                  Whispering Mode},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {102-D},
  number       = {12},
  pages        = {2599--2602},
  year         = {2019},
  url          = {https://doi.org/10.1587/transinf.2019EDL8055},
  doi          = {10.1587/TRANSINF.2019EDL8055},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/Yum19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KangLKY19,
  author       = {Tae Gu Kang and
                  Jinwoo Lee and
                  Junyeng Kim and
                  Dae Hyun Yum},
  title        = {On the Performance Analysis of SPHINCS\({}^{\mbox{+}}\) Verification},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {102-D},
  number       = {12},
  pages        = {2603--2606},
  year         = {2019},
  url          = {https://doi.org/10.1587/transinf.2019EDL8131},
  doi          = {10.1587/TRANSINF.2019EDL8131},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/KangLKY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LeeSCLY17,
  author       = {Jinwoo Lee and
                  Jae Woo Seo and
                  Kookrae Cho and
                  Pil Joong Lee and
                  Dae Hyun Yum},
  title        = {A Visibility-Based Lower Bound for Android Unlock Patterns},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {100-D},
  number       = {3},
  pages        = {578--581},
  year         = {2017},
  url          = {https://doi.org/10.1587/transinf.2016EDL8196},
  doi          = {10.1587/TRANSINF.2016EDL8196},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LeeSCLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yum16,
  author       = {Dae Hyun Yum},
  title        = {Average-Case Analysis of Certificate Revocation in Combinatorial Certificate
                  Management Schemes},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {99-A},
  number       = {2},
  pages        = {663--665},
  year         = {2016},
  url          = {https://doi.org/10.1587/transfun.E99.A.663},
  doi          = {10.1587/TRANSFUN.E99.A.663},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Yum16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yum16a,
  author       = {Dae Hyun Yum},
  title        = {Mathematical Analysis of Secrecy Amplification in Key Infection},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {9},
  pages        = {2390--2394},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2016EDL8001},
  doi          = {10.1587/TRANSINF.2016EDL8001},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Yum16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LeeSCLKCY16,
  author       = {Jinwoo Lee and
                  Jae Woo Seo and
                  Kookrae Cho and
                  Pil Joong Lee and
                  Juneyeun Kim and
                  Seung Hoon Choi and
                  Dae Hyun Yum},
  title        = {A Visibility-Based Upper Bound for Android Unlock Patterns},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {11},
  pages        = {2814--2816},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2016EDL8095},
  doi          = {10.1587/TRANSINF.2016EDL8095},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LeeSCLKCY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yum15,
  author       = {Dae Hyun Yum},
  title        = {On the Probability of Certificate Revocation in Combinatorial Certificate
                  Management Schemes},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {98-D},
  number       = {5},
  pages        = {1104--1107},
  year         = {2015},
  url          = {https://doi.org/10.1587/transinf.2015EDL8012},
  doi          = {10.1587/TRANSINF.2015EDL8012},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Yum15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yum15a,
  author       = {Dae Hyun Yum},
  title        = {Randomized Certificate Replacement with Bounded Collateral Damage},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {98-D},
  number       = {11},
  pages        = {1990--1993},
  year         = {2015},
  url          = {https://doi.org/10.1587/transinf.2015EDL8133},
  doi          = {10.1587/TRANSINF.2015EDL8133},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Yum15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ParkNKYL13,
  author       = {Myung{-}Ho Park and
                  Ki{-}Gon Nam and
                  Jin Seok Kim and
                  Dae Hyun Yum and
                  Pil Joong Lee},
  title        = {Unilateral Distance Bounding Protocol with Bidirectional Challenges},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {96-D},
  number       = {1},
  pages        = {134--137},
  year         = {2013},
  url          = {https://doi.org/10.1587/transinf.E96.D.134},
  doi          = {10.1587/TRANSINF.E96.D.134},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ParkNKYL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ParkNKYL13a,
  author       = {Myung{-}Ho Park and
                  Ki{-}Gon Nam and
                  Jin Seok Kim and
                  Dae Hyun Yum and
                  Pil Joong Lee},
  title        = {Secure and Lightweight Localization Method for Wireless Sensor Networks},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {96-D},
  number       = {3},
  pages        = {723--726},
  year         = {2013},
  url          = {https://doi.org/10.1587/transinf.E96.D.723},
  doi          = {10.1587/TRANSINF.E96.D.723},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ParkNKYL13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/SeoYL13,
  author       = {Jae Woo Seo and
                  Dae Hyun Yum and
                  Pil Joong Lee},
  title        = {Proxy-invisible CCA-secure type-based proxy re-encryption without
                  random oracles},
  journal      = {Theor. Comput. Sci.},
  volume       = {491},
  pages        = {83--93},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.tcs.2012.11.026},
  doi          = {10.1016/J.TCS.2012.11.026},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/SeoYL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/SeoYL13,
  author       = {Jae Woo Seo and
                  Dae Hyun Yum and
                  Pil Joong Lee},
  title        = {Comments on "Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption"},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {59},
  number       = {5},
  pages        = {3256},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIT.2012.2236606},
  doi          = {10.1109/TIT.2012.2236606},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/SeoYL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KimCYHL12,
  author       = {Jin Seok Kim and
                  Kookrae Cho and
                  Dae Hyun Yum and
                  Sung Je Hong and
                  Pil Joong Lee},
  title        = {Lightweight Distance Bounding Protocol against Relay Attacks},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {95-D},
  number       = {4},
  pages        = {1155--1158},
  year         = {2012},
  url          = {https://doi.org/10.1587/transinf.E95.D.1155},
  doi          = {10.1587/TRANSINF.E95.D.1155},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KimCYHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KimYHKL12,
  author       = {Jin Seok Kim and
                  Dae Hyun Yum and
                  Sung Je Hong and
                  Jong Kim and
                  Pil Joong Lee},
  title        = {Security Condition for Exact Localization in Wireless Ad Hoc Networks},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {95-B},
  number       = {7},
  pages        = {2459--2462},
  year         = {2012},
  url          = {https://doi.org/10.1587/transcom.E95.B.2459},
  doi          = {10.1587/TRANSCOM.E95.B.2459},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KimYHKL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/KimYLHK12,
  author       = {Jin Seok Kim and
                  Dae Hyun Yum and
                  Pil Joong Lee and
                  Sung Je Hong and
                  Jong Kim},
  title        = {A Hybrid Sonar Algorithm for Submersible Cars to Verify the Location
                  of Senders},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {61},
  number       = {6},
  pages        = {2707--2714},
  year         = {2012},
  url          = {https://doi.org/10.1109/TVT.2012.2199343},
  doi          = {10.1109/TVT.2012.2199343},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/KimYLHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/YumL12,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  title        = {Exact Formulae for Resilience in Random Key Predistribution Schemes},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {11},
  number       = {5},
  pages        = {1638--1642},
  year         = {2012},
  url          = {https://doi.org/10.1109/TWC.2012.031212.110887},
  doi          = {10.1109/TWC.2012.031212.110887},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/YumL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/YumKHL11,
  author       = {Dae Hyun Yum and
                  Jin Seok Kim and
                  Sung Je Hong and
                  Pil Joong Lee},
  title        = {Distance Bounding Protocol with Adjustable False Acceptance Rate},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {15},
  number       = {4},
  pages        = {434--436},
  year         = {2011},
  url          = {https://doi.org/10.1109/LCOMM.2011.030911.110066},
  doi          = {10.1109/LCOMM.2011.030911.110066},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/YumKHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YumKLH11,
  author       = {Dae Hyun Yum and
                  Jin Seok Kim and
                  Pil Joong Lee and
                  Sung Je Hong},
  title        = {Fast Verification of Hash Chains with Reduced Storage},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {1},
  pages        = {383--391},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.383},
  doi          = {10.1587/TRANSFUN.E94.A.383},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YumKLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YumL11,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  title        = {Sanitizable Signatures Reconsidered},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {2},
  pages        = {717--724},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.717},
  doi          = {10.1587/TRANSFUN.E94.A.717},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YumL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YumSL11,
  author       = {Dae Hyun Yum and
                  Jae Woo Seo and
                  Pil Joong Lee},
  title        = {Energy-Efficient Hash Chain Traversal},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {3},
  pages        = {955--963},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.955},
  doi          = {10.1587/TRANSFUN.E94.A.955},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YumSL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YumL11a,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  title        = {Lightweight One-Time Signature for Short Messages},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {7},
  pages        = {1567--1575},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.1567},
  doi          = {10.1587/TRANSFUN.E94.A.1567},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YumL11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/YumL11,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  title        = {On the average cost of order-preserving encryption based on hypergeometric
                  distribution},
  journal      = {Inf. Process. Lett.},
  volume       = {111},
  number       = {19},
  pages        = {956--959},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ipl.2011.07.004},
  doi          = {10.1016/J.IPL.2011.07.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/YumL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/YumKHL11,
  author       = {Dae Hyun Yum and
                  Jin Seok Kim and
                  Sung Je Hong and
                  Pil Joong Lee},
  title        = {Distance Bounding Protocol for Mutual Authentication},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {10},
  number       = {2},
  pages        = {592--601},
  year         = {2011},
  url          = {https://doi.org/10.1109/TWC.2010.120610.100491},
  doi          = {10.1109/TWC.2010.120610.100491},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/YumKHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YumKKLH11,
  author       = {Dae Hyun Yum and
                  Duk Soo Kim and
                  Jin Seok Kim and
                  Pil Joong Lee and
                  Sung Je Hong},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Order-Preserving Encryption for Non-uniformly Distributed Plaintexts},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {84--97},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_7},
  doi          = {10.1007/978-3-642-27890-7\_7},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YumKKLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YumSCL10,
  author       = {Dae Hyun Yum and
                  Jae Woo Seo and
                  Kookrae Cho and
                  Pil Joong Lee},
  title        = {Generalized Hash Chain Traversal with Selective Output},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {93-D},
  number       = {5},
  pages        = {1303--1306},
  year         = {2010},
  url          = {https://doi.org/10.1587/transinf.E93.D.1303},
  doi          = {10.1587/TRANSINF.E93.D.1303},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YumSCL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/YumSL10,
  author       = {Dae Hyun Yum and
                  Jae Woo Seo and
                  Pil Joong Lee},
  editor       = {Jianying Zhou and
                  Moti Yung},
  title        = {Trapdoor Sanitizable Signatures Made Easy},
  booktitle    = {Applied Cryptography and Network Security, 8th International Conference,
                  {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6123},
  pages        = {53--68},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13708-2\_4},
  doi          = {10.1007/978-3-642-13708-2\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/YumSL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/YumKLH10,
  author       = {Dae Hyun Yum and
                  Jin Seok Kim and
                  Pil Joong Lee and
                  Sung Je Hong},
  editor       = {Josef Pieprzyk},
  title        = {On Fast Verification of Hash Chains},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {382--396},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_26},
  doi          = {10.1007/978-3-642-11925-5\_26},
  timestamp    = {Sun, 02 Jun 2019 21:22:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/YumKLH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/YumL09,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  title        = {Cracking Hill Ciphers with Goodness-of-Fit Statistics},
  journal      = {Cryptologia},
  volume       = {33},
  number       = {4},
  pages        = {335--342},
  year         = {2009},
  url          = {https://doi.org/10.1080/01611190903185369},
  doi          = {10.1080/01611190903185369},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/YumL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YumL09,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  title        = {Invisibly Sanitizable Signature without Pairings},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {6},
  pages        = {1541--1543},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.1541},
  doi          = {10.1587/TRANSFUN.E92.A.1541},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YumL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/YumSEL09,
  author       = {Dae Hyun Yum and
                  Jae Woo Seo and
                  Sungwook Eom and
                  Pil Joong Lee},
  editor       = {Marc Fischlin},
  title        = {Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
                  the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5473},
  pages        = {325--339},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00862-7\_22},
  doi          = {10.1007/978-3-642-00862-7\_22},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/YumSEL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YumKMKRL09,
  author       = {Dae Hyun Yum and
                  Sun Young Kim and
                  Ho{-}Kun Moon and
                  Mi{-}Yeon Kim and
                  Jae{-}Hoon Roh and
                  Pil Joong Lee},
  editor       = {Heung Youl Youm and
                  Moti Yung},
  title        = {Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers},
  booktitle    = {Information Security Applications, 10th International Workshop, {WISA}
                  2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5932},
  pages        = {339--353},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10838-9\_25},
  doi          = {10.1007/978-3-642-10838-9\_25},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YumKMKRL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YumL08,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  title        = {Efficient Fair Exchange from Identity-Based Signature},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {119--126},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.119},
  doi          = {10.1093/IETFEC/E91-A.1.119},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YumL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YumSL08,
  author       = {Dae Hyun Yum and
                  Jong Hoon Shin and
                  Pil Joong Lee},
  title        = {Security Analysis of Yeh-Tsai Security Mechanism},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {91-D},
  number       = {5},
  pages        = {1477--1480},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietisy/e91-d.5.1477},
  doi          = {10.1093/IETISY/E91-D.5.1477},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YumSL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YumSL08a,
  author       = {Dae Hyun Yum and
                  Jae Woo Seo and
                  Pil Joong Lee},
  title        = {Generalized Combinatoric Accumulator},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {91-D},
  number       = {5},
  pages        = {1489--1491},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietisy/e91-d.5.1489},
  doi          = {10.1093/IETISY/E91-D.5.1489},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YumSL08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/DodisLY08,
  author       = {Yevgeniy Dodis and
                  Pil Joong Lee and
                  Dae Hyun Yum},
  title        = {Optimistic Fair Exchange in a Multi-user Setting},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {14},
  number       = {3},
  pages        = {318--346},
  year         = {2008},
  url          = {https://doi.org/10.3217/jucs-014-03-0318},
  doi          = {10.3217/JUCS-014-03-0318},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/DodisLY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BoldyrevaGOY08,
  author       = {Alexandra Boldyreva and
                  Craig Gentry and
                  Adam O'Neill and
                  Dae Hyun Yum},
  title        = {New Multiparty Signature Schemes for Network Routing Applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {3:1--3:39},
  year         = {2008},
  url          = {https://doi.org/10.1145/1410234.1410237},
  doi          = {10.1145/1410234.1410237},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BoldyrevaGOY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YumL07,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  title        = {Security Analysis of Zhu-Bao's Verifiably Committed Signature},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {12},
  pages        = {2962--2964},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.12.2962},
  doi          = {10.1093/IETFEC/E90-A.12.2962},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YumL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BoldyrevaGOY07,
  author       = {Alexandra Boldyreva and
                  Craig Gentry and
                  Adam O'Neill and
                  Dae Hyun Yum},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Ordered multisignatures and identity-based sequential aggregate signatures,
                  with applications to secure routing},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {276--285},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315280},
  doi          = {10.1145/1315245.1315280},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BoldyrevaGOY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DodisLY07,
  author       = {Yevgeniy Dodis and
                  Pil Joong Lee and
                  Dae Hyun Yum},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Optimistic Fair Exchange in a Multi-user Setting},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {118--133},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_9},
  doi          = {10.1007/978-3-540-71677-8\_9},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DodisLY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisLY07,
  author       = {Yevgeniy Dodis and
                  Pil Joong Lee and
                  Dae Hyun Yum},
  title        = {Optimistic Fair Exchange in a Multi-user Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisLY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoldyrevaGOY07,
  author       = {Alexandra Boldyreva and
                  Craig Gentry and
                  Adam O'Neill and
                  Dae Hyun Yum},
  title        = {Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures,
                  with Applications to Secure Routing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BoldyrevaGOY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YumL05,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  title        = {Cryptanalysis of Yeh-Shen-Hwang's One-Time Password Authentication
                  Scheme},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {88-B},
  number       = {4},
  pages        = {1647--1648},
  year         = {2005},
  url          = {https://doi.org/10.1093/ietcom/e88-b.4.1647},
  doi          = {10.1093/IETCOM/E88-B.4.1647},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YumL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DodisY05,
  author       = {Yevgeniy Dodis and
                  Dae Hyun Yum},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Time Capsule Signature},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {57--71},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_6},
  doi          = {10.1007/11507840\_6},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DodisY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/HwangYL05,
  author       = {Yong Ho Hwang and
                  Dae Hyun Yum and
                  Pil Joong Lee},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {Timed-Release Encryption with Pre-open Capability and Its Application
                  to Certified E-mail System},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {344--358},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_25},
  doi          = {10.1007/11556992\_25},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/HwangYL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YumL04,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Generic Construction of Certificateless Signature},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {200--211},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_18},
  doi          = {10.1007/978-3-540-27800-9\_18},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YumL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/YumL04,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  editor       = {Sokratis K. Katsikas and
                  Stefanos Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {Identity-Based Cryptography in Public Key Management},
  booktitle    = {Public Key Infrastructure, First European PKIWorkshop: Research and
                  Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3093},
  pages        = {71--84},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25980-0\_6},
  doi          = {10.1007/978-3-540-25980-0\_6},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/YumL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/YumL04,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  editor       = {Antonio Lagan{\`{a}} and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Youngsong Mun and
                  Chih Jeng Kenneth Tan and
                  Osvaldo Gervasi},
  title        = {A Distributed Online Certificate Status Protocol Based on {GQ} Signature
                  Scheme},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2004, International
                  Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3043},
  pages        = {471--480},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24707-4\_58},
  doi          = {10.1007/978-3-540-24707-4\_58},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/YumL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/YumL04a,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  editor       = {Antonio Lagan{\`{a}} and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Youngsong Mun and
                  Chih Jeng Kenneth Tan and
                  Osvaldo Gervasi},
  title        = {Generic Construction of Certificateless Encryption},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2004, International
                  Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3043},
  pages        = {802--811},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24707-4\_93},
  doi          = {10.1007/978-3-540-24707-4\_93},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/YumL04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YumL04,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Separable Implicit Certificate Revocation},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {121--136},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_10},
  doi          = {10.1007/11496618\_10},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YumL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HwangYL03,
  author       = {Yong Ho Hwang and
                  Dae Hyun Yum and
                  Pil Joong Lee},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {{EPA:} An Efficient Password-Based Protocal for Authenticated Key
                  Exchange},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {452--463},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_39},
  doi          = {10.1007/3-540-45067-X\_39},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HwangYL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/YumL03,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  editor       = {Kenneth G. Paterson},
  title        = {Efficient Key Updating Signature Schemes Based on {IBS}},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {167--182},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_14},
  doi          = {10.1007/978-3-540-40974-8\_14},
  timestamp    = {Wed, 18 Mar 2020 16:01:02 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/YumL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/YumKL03,
  author       = {Dae Hyun Yum and
                  Jae Eun Kang and
                  Pil Joong Lee},
  editor       = {Vladimir Gorodetsky and
                  Leonard J. Popyack and
                  Victor A. Skormin},
  title        = {Advanced Certificate Status Protocol},
  booktitle    = {Computer Network Security, Second International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2776},
  pages        = {229--240},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45215-7\_19},
  doi          = {10.1007/978-3-540-45215-7\_19},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/YumKL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YumL01,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  editor       = {Kwangjo Kim},
  title        = {New Signcryption Schemes Based on {KCDSA}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2001, 4th International
                  Conference Seoul, Korea, December 6-7, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2288},
  pages        = {305--317},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45861-1\_23},
  doi          = {10.1007/3-540-45861-1\_23},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YumL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics