Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Dae Hyun Yum
@article{DBLP:journals/ieicetd/LeeKCY21, author = {Jinwoo Lee and Tae Gu Kang and Kookrae Cho and Dae Hyun Yum}, title = {New Parameter Sets for SPHINCS\({}^{\mbox{+}}\)}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {104-D}, number = {6}, pages = {890--892}, year = {2021}, url = {https://doi.org/10.1587/transinf.2019edl8223}, doi = {10.1587/TRANSINF.2019EDL8223}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/LeeKCY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ZhangYS21, author = {Zhong Zhang and Dae Hyun Yum and Minho Shin}, title = {{PARS:} Privacy-Aware Reward System for Mobile Crowdsensing Systems}, journal = {Sensors}, volume = {21}, number = {21}, pages = {7045}, year = {2021}, url = {https://doi.org/10.3390/s21217045}, doi = {10.3390/S21217045}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/ZhangYS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/ParkKCY20, author = {Seongmin Park and Juneyeun Kim and Kookrae Cho and Dae Hyun Yum}, title = {Finding the key length of a Vigen{\`{e}}re cipher: How to improve the twist algorithm}, journal = {Cryptologia}, volume = {44}, number = {3}, pages = {197--204}, year = {2020}, url = {https://doi.org/10.1080/01611194.2019.1657202}, doi = {10.1080/01611194.2019.1657202}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/ParkKCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Yum19, author = {Dae Hyun Yum}, title = {Mathematical Analysis of Secrecy Amplification in Key Infection: The Whispering Mode}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {102-D}, number = {12}, pages = {2599--2602}, year = {2019}, url = {https://doi.org/10.1587/transinf.2019EDL8055}, doi = {10.1587/TRANSINF.2019EDL8055}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/Yum19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KangLKY19, author = {Tae Gu Kang and Jinwoo Lee and Junyeng Kim and Dae Hyun Yum}, title = {On the Performance Analysis of SPHINCS\({}^{\mbox{+}}\) Verification}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {102-D}, number = {12}, pages = {2603--2606}, year = {2019}, url = {https://doi.org/10.1587/transinf.2019EDL8131}, doi = {10.1587/TRANSINF.2019EDL8131}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/KangLKY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LeeSCLY17, author = {Jinwoo Lee and Jae Woo Seo and Kookrae Cho and Pil Joong Lee and Dae Hyun Yum}, title = {A Visibility-Based Lower Bound for Android Unlock Patterns}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {100-D}, number = {3}, pages = {578--581}, year = {2017}, url = {https://doi.org/10.1587/transinf.2016EDL8196}, doi = {10.1587/TRANSINF.2016EDL8196}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LeeSCLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Yum16, author = {Dae Hyun Yum}, title = {Average-Case Analysis of Certificate Revocation in Combinatorial Certificate Management Schemes}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {2}, pages = {663--665}, year = {2016}, url = {https://doi.org/10.1587/transfun.E99.A.663}, doi = {10.1587/TRANSFUN.E99.A.663}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Yum16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Yum16a, author = {Dae Hyun Yum}, title = {Mathematical Analysis of Secrecy Amplification in Key Infection}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {9}, pages = {2390--2394}, year = {2016}, url = {https://doi.org/10.1587/transinf.2016EDL8001}, doi = {10.1587/TRANSINF.2016EDL8001}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Yum16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LeeSCLKCY16, author = {Jinwoo Lee and Jae Woo Seo and Kookrae Cho and Pil Joong Lee and Juneyeun Kim and Seung Hoon Choi and Dae Hyun Yum}, title = {A Visibility-Based Upper Bound for Android Unlock Patterns}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {11}, pages = {2814--2816}, year = {2016}, url = {https://doi.org/10.1587/transinf.2016EDL8095}, doi = {10.1587/TRANSINF.2016EDL8095}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LeeSCLKCY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Yum15, author = {Dae Hyun Yum}, title = {On the Probability of Certificate Revocation in Combinatorial Certificate Management Schemes}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {98-D}, number = {5}, pages = {1104--1107}, year = {2015}, url = {https://doi.org/10.1587/transinf.2015EDL8012}, doi = {10.1587/TRANSINF.2015EDL8012}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Yum15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Yum15a, author = {Dae Hyun Yum}, title = {Randomized Certificate Replacement with Bounded Collateral Damage}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {98-D}, number = {11}, pages = {1990--1993}, year = {2015}, url = {https://doi.org/10.1587/transinf.2015EDL8133}, doi = {10.1587/TRANSINF.2015EDL8133}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Yum15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ParkNKYL13, author = {Myung{-}Ho Park and Ki{-}Gon Nam and Jin Seok Kim and Dae Hyun Yum and Pil Joong Lee}, title = {Unilateral Distance Bounding Protocol with Bidirectional Challenges}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {96-D}, number = {1}, pages = {134--137}, year = {2013}, url = {https://doi.org/10.1587/transinf.E96.D.134}, doi = {10.1587/TRANSINF.E96.D.134}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ParkNKYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ParkNKYL13a, author = {Myung{-}Ho Park and Ki{-}Gon Nam and Jin Seok Kim and Dae Hyun Yum and Pil Joong Lee}, title = {Secure and Lightweight Localization Method for Wireless Sensor Networks}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {96-D}, number = {3}, pages = {723--726}, year = {2013}, url = {https://doi.org/10.1587/transinf.E96.D.723}, doi = {10.1587/TRANSINF.E96.D.723}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ParkNKYL13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SeoYL13, author = {Jae Woo Seo and Dae Hyun Yum and Pil Joong Lee}, title = {Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles}, journal = {Theor. Comput. Sci.}, volume = {491}, pages = {83--93}, year = {2013}, url = {https://doi.org/10.1016/j.tcs.2012.11.026}, doi = {10.1016/J.TCS.2012.11.026}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/SeoYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/SeoYL13, author = {Jae Woo Seo and Dae Hyun Yum and Pil Joong Lee}, title = {Comments on "Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption"}, journal = {{IEEE} Trans. Inf. Theory}, volume = {59}, number = {5}, pages = {3256}, year = {2013}, url = {https://doi.org/10.1109/TIT.2012.2236606}, doi = {10.1109/TIT.2012.2236606}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/SeoYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KimCYHL12, author = {Jin Seok Kim and Kookrae Cho and Dae Hyun Yum and Sung Je Hong and Pil Joong Lee}, title = {Lightweight Distance Bounding Protocol against Relay Attacks}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {95-D}, number = {4}, pages = {1155--1158}, year = {2012}, url = {https://doi.org/10.1587/transinf.E95.D.1155}, doi = {10.1587/TRANSINF.E95.D.1155}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KimCYHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KimYHKL12, author = {Jin Seok Kim and Dae Hyun Yum and Sung Je Hong and Jong Kim and Pil Joong Lee}, title = {Security Condition for Exact Localization in Wireless Ad Hoc Networks}, journal = {{IEICE} Trans. Commun.}, volume = {95-B}, number = {7}, pages = {2459--2462}, year = {2012}, url = {https://doi.org/10.1587/transcom.E95.B.2459}, doi = {10.1587/TRANSCOM.E95.B.2459}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KimYHKL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/KimYLHK12, author = {Jin Seok Kim and Dae Hyun Yum and Pil Joong Lee and Sung Je Hong and Jong Kim}, title = {A Hybrid Sonar Algorithm for Submersible Cars to Verify the Location of Senders}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {61}, number = {6}, pages = {2707--2714}, year = {2012}, url = {https://doi.org/10.1109/TVT.2012.2199343}, doi = {10.1109/TVT.2012.2199343}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/KimYLHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/YumL12, author = {Dae Hyun Yum and Pil Joong Lee}, title = {Exact Formulae for Resilience in Random Key Predistribution Schemes}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {11}, number = {5}, pages = {1638--1642}, year = {2012}, url = {https://doi.org/10.1109/TWC.2012.031212.110887}, doi = {10.1109/TWC.2012.031212.110887}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/YumL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/YumKHL11, author = {Dae Hyun Yum and Jin Seok Kim and Sung Je Hong and Pil Joong Lee}, title = {Distance Bounding Protocol with Adjustable False Acceptance Rate}, journal = {{IEEE} Commun. Lett.}, volume = {15}, number = {4}, pages = {434--436}, year = {2011}, url = {https://doi.org/10.1109/LCOMM.2011.030911.110066}, doi = {10.1109/LCOMM.2011.030911.110066}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/YumKHL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YumKLH11, author = {Dae Hyun Yum and Jin Seok Kim and Pil Joong Lee and Sung Je Hong}, title = {Fast Verification of Hash Chains with Reduced Storage}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {1}, pages = {383--391}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.383}, doi = {10.1587/TRANSFUN.E94.A.383}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YumKLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YumL11, author = {Dae Hyun Yum and Pil Joong Lee}, title = {Sanitizable Signatures Reconsidered}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {2}, pages = {717--724}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.717}, doi = {10.1587/TRANSFUN.E94.A.717}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YumL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YumSL11, author = {Dae Hyun Yum and Jae Woo Seo and Pil Joong Lee}, title = {Energy-Efficient Hash Chain Traversal}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {3}, pages = {955--963}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.955}, doi = {10.1587/TRANSFUN.E94.A.955}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YumSL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YumL11a, author = {Dae Hyun Yum and Pil Joong Lee}, title = {Lightweight One-Time Signature for Short Messages}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {7}, pages = {1567--1575}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.1567}, doi = {10.1587/TRANSFUN.E94.A.1567}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YumL11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/YumL11, author = {Dae Hyun Yum and Pil Joong Lee}, title = {On the average cost of order-preserving encryption based on hypergeometric distribution}, journal = {Inf. Process. Lett.}, volume = {111}, number = {19}, pages = {956--959}, year = {2011}, url = {https://doi.org/10.1016/j.ipl.2011.07.004}, doi = {10.1016/J.IPL.2011.07.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/YumL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/YumKHL11, author = {Dae Hyun Yum and Jin Seok Kim and Sung Je Hong and Pil Joong Lee}, title = {Distance Bounding Protocol for Mutual Authentication}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {10}, number = {2}, pages = {592--601}, year = {2011}, url = {https://doi.org/10.1109/TWC.2010.120610.100491}, doi = {10.1109/TWC.2010.120610.100491}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/YumKHL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YumKKLH11, author = {Dae Hyun Yum and Duk Soo Kim and Jin Seok Kim and Pil Joong Lee and Sung Je Hong}, editor = {Souhwan Jung and Moti Yung}, title = {Order-Preserving Encryption for Non-uniformly Distributed Plaintexts}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {84--97}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_7}, doi = {10.1007/978-3-642-27890-7\_7}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YumKKLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YumSCL10, author = {Dae Hyun Yum and Jae Woo Seo and Kookrae Cho and Pil Joong Lee}, title = {Generalized Hash Chain Traversal with Selective Output}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {93-D}, number = {5}, pages = {1303--1306}, year = {2010}, url = {https://doi.org/10.1587/transinf.E93.D.1303}, doi = {10.1587/TRANSINF.E93.D.1303}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YumSCL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/YumSL10, author = {Dae Hyun Yum and Jae Woo Seo and Pil Joong Lee}, editor = {Jianying Zhou and Moti Yung}, title = {Trapdoor Sanitizable Signatures Made Easy}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {53--68}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_4}, doi = {10.1007/978-3-642-13708-2\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/YumSL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/YumKLH10, author = {Dae Hyun Yum and Jin Seok Kim and Pil Joong Lee and Sung Je Hong}, editor = {Josef Pieprzyk}, title = {On Fast Verification of Hash Chains}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {382--396}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_26}, doi = {10.1007/978-3-642-11925-5\_26}, timestamp = {Sun, 02 Jun 2019 21:22:43 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/YumKLH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/YumL09, author = {Dae Hyun Yum and Pil Joong Lee}, title = {Cracking Hill Ciphers with Goodness-of-Fit Statistics}, journal = {Cryptologia}, volume = {33}, number = {4}, pages = {335--342}, year = {2009}, url = {https://doi.org/10.1080/01611190903185369}, doi = {10.1080/01611190903185369}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/YumL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YumL09, author = {Dae Hyun Yum and Pil Joong Lee}, title = {Invisibly Sanitizable Signature without Pairings}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {6}, pages = {1541--1543}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.1541}, doi = {10.1587/TRANSFUN.E92.A.1541}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YumL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/YumSEL09, author = {Dae Hyun Yum and Jae Woo Seo and Sungwook Eom and Pil Joong Lee}, editor = {Marc Fischlin}, title = {Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {325--339}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_22}, doi = {10.1007/978-3-642-00862-7\_22}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/YumSEL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YumKMKRL09, author = {Dae Hyun Yum and Sun Young Kim and Ho{-}Kun Moon and Mi{-}Yeon Kim and Jae{-}Hoon Roh and Pil Joong Lee}, editor = {Heung Youl Youm and Moti Yung}, title = {Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers}, booktitle = {Information Security Applications, 10th International Workshop, {WISA} 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5932}, pages = {339--353}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10838-9\_25}, doi = {10.1007/978-3-642-10838-9\_25}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YumKMKRL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YumL08, author = {Dae Hyun Yum and Pil Joong Lee}, title = {Efficient Fair Exchange from Identity-Based Signature}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {119--126}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.119}, doi = {10.1093/IETFEC/E91-A.1.119}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YumL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YumSL08, author = {Dae Hyun Yum and Jong Hoon Shin and Pil Joong Lee}, title = {Security Analysis of Yeh-Tsai Security Mechanism}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {91-D}, number = {5}, pages = {1477--1480}, year = {2008}, url = {https://doi.org/10.1093/ietisy/e91-d.5.1477}, doi = {10.1093/IETISY/E91-D.5.1477}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YumSL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YumSL08a, author = {Dae Hyun Yum and Jae Woo Seo and Pil Joong Lee}, title = {Generalized Combinatoric Accumulator}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {91-D}, number = {5}, pages = {1489--1491}, year = {2008}, url = {https://doi.org/10.1093/ietisy/e91-d.5.1489}, doi = {10.1093/IETISY/E91-D.5.1489}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YumSL08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/DodisLY08, author = {Yevgeniy Dodis and Pil Joong Lee and Dae Hyun Yum}, title = {Optimistic Fair Exchange in a Multi-user Setting}, journal = {J. Univers. Comput. Sci.}, volume = {14}, number = {3}, pages = {318--346}, year = {2008}, url = {https://doi.org/10.3217/jucs-014-03-0318}, doi = {10.3217/JUCS-014-03-0318}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/DodisLY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BoldyrevaGOY08, author = {Alexandra Boldyreva and Craig Gentry and Adam O'Neill and Dae Hyun Yum}, title = {New Multiparty Signature Schemes for Network Routing Applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {1}, pages = {3:1--3:39}, year = {2008}, url = {https://doi.org/10.1145/1410234.1410237}, doi = {10.1145/1410234.1410237}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BoldyrevaGOY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YumL07, author = {Dae Hyun Yum and Pil Joong Lee}, title = {Security Analysis of Zhu-Bao's Verifiably Committed Signature}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {12}, pages = {2962--2964}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.12.2962}, doi = {10.1093/IETFEC/E90-A.12.2962}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YumL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoldyrevaGOY07, author = {Alexandra Boldyreva and Craig Gentry and Adam O'Neill and Dae Hyun Yum}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {276--285}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315280}, doi = {10.1145/1315245.1315280}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoldyrevaGOY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DodisLY07, author = {Yevgeniy Dodis and Pil Joong Lee and Dae Hyun Yum}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Optimistic Fair Exchange in a Multi-user Setting}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {118--133}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_9}, doi = {10.1007/978-3-540-71677-8\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DodisLY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisLY07, author = {Yevgeniy Dodis and Pil Joong Lee and Dae Hyun Yum}, title = {Optimistic Fair Exchange in a Multi-user Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2007}, url = {http://eprint.iacr.org/2007/182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisLY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoldyrevaGOY07, author = {Alexandra Boldyreva and Craig Gentry and Adam O'Neill and Dae Hyun Yum}, title = {Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2007}, url = {http://eprint.iacr.org/2007/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoldyrevaGOY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YumL05, author = {Dae Hyun Yum and Pil Joong Lee}, title = {Cryptanalysis of Yeh-Shen-Hwang's One-Time Password Authentication Scheme}, journal = {{IEICE} Trans. Commun.}, volume = {88-B}, number = {4}, pages = {1647--1648}, year = {2005}, url = {https://doi.org/10.1093/ietcom/e88-b.4.1647}, doi = {10.1093/IETCOM/E88-B.4.1647}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YumL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DodisY05, author = {Yevgeniy Dodis and Dae Hyun Yum}, editor = {Andrew S. Patrick and Moti Yung}, title = {Time Capsule Signature}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {57--71}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_6}, doi = {10.1007/11507840\_6}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/DodisY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/HwangYL05, author = {Yong Ho Hwang and Dae Hyun Yum and Pil Joong Lee}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {344--358}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_25}, doi = {10.1007/11556992\_25}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/HwangYL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YumL04, author = {Dae Hyun Yum and Pil Joong Lee}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Generic Construction of Certificateless Signature}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {200--211}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_18}, doi = {10.1007/978-3-540-27800-9\_18}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YumL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/YumL04, author = {Dae Hyun Yum and Pil Joong Lee}, editor = {Sokratis K. Katsikas and Stefanos Gritzalis and Javier L{\'{o}}pez}, title = {Identity-Based Cryptography in Public Key Management}, booktitle = {Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3093}, pages = {71--84}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25980-0\_6}, doi = {10.1007/978-3-540-25980-0\_6}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/europki/YumL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/YumL04, author = {Dae Hyun Yum and Pil Joong Lee}, editor = {Antonio Lagan{\`{a}} and Marina L. Gavrilova and Vipin Kumar and Youngsong Mun and Chih Jeng Kenneth Tan and Osvaldo Gervasi}, title = {A Distributed Online Certificate Status Protocol Based on {GQ} Signature Scheme}, booktitle = {Computational Science and Its Applications - {ICCSA} 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3043}, pages = {471--480}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24707-4\_58}, doi = {10.1007/978-3-540-24707-4\_58}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/YumL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/YumL04a, author = {Dae Hyun Yum and Pil Joong Lee}, editor = {Antonio Lagan{\`{a}} and Marina L. Gavrilova and Vipin Kumar and Youngsong Mun and Chih Jeng Kenneth Tan and Osvaldo Gervasi}, title = {Generic Construction of Certificateless Encryption}, booktitle = {Computational Science and Its Applications - {ICCSA} 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3043}, pages = {802--811}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24707-4\_93}, doi = {10.1007/978-3-540-24707-4\_93}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/YumL04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YumL04, author = {Dae Hyun Yum and Pil Joong Lee}, editor = {Choonsik Park and Seongtaek Chee}, title = {Separable Implicit Certificate Revocation}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {121--136}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_10}, doi = {10.1007/11496618\_10}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YumL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HwangYL03, author = {Yong Ho Hwang and Dae Hyun Yum and Pil Joong Lee}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {{EPA:} An Efficient Password-Based Protocal for Authenticated Key Exchange}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {452--463}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_39}, doi = {10.1007/3-540-45067-X\_39}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HwangYL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/YumL03, author = {Dae Hyun Yum and Pil Joong Lee}, editor = {Kenneth G. Paterson}, title = {Efficient Key Updating Signature Schemes Based on {IBS}}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {167--182}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_14}, doi = {10.1007/978-3-540-40974-8\_14}, timestamp = {Wed, 18 Mar 2020 16:01:02 +0100}, biburl = {https://dblp.org/rec/conf/ima/YumL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/YumKL03, author = {Dae Hyun Yum and Jae Eun Kang and Pil Joong Lee}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Advanced Certificate Status Protocol}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {229--240}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_19}, doi = {10.1007/978-3-540-45215-7\_19}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/YumKL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YumL01, author = {Dae Hyun Yum and Pil Joong Lee}, editor = {Kwangjo Kim}, title = {New Signcryption Schemes Based on {KCDSA}}, booktitle = {Information Security and Cryptology - {ICISC} 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2288}, pages = {305--317}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45861-1\_23}, doi = {10.1007/3-540-45861-1\_23}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YumL01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.