フォロー
Je Hong Park
Je Hong Park
Electronics and Telecommunications Research Institute
確認したメール アドレス: nsr.re.kr
タイトル
引用先
引用先
A certificate-based signature scheme
BG Kang, JH Park, SG Hahn
Topics in Cryptology - CT-RSA 2004, 99-111, 2004
2012004
Forward secure dynamic searchable symmetric encryption with efficient updates
KS Kim, M Kim, D Lee, JH Park, WH Kim
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1872017
A Simple Variant of the Merkle–Damgård Scheme with a Permutation
S Hirose, JH Park, A Yun
Journal of cryptology 25 (2), 271-309, 2012
101*2012
Security weakness in the smart grid key distribution scheme proposed by Xia and Wang
JH Park, M Kim, D Kwon
IEEE Transactions on Smart Grid 4 (3), 1613-1614, 2013
882013
Cryptanalysis of the public-key encryption based on braid groups
E Lee, JH Park
Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003
762003
Efficient and secure authenticated key exchange protocols in the eCK model
J Lee, JH Park
IEICE transactions on fundamentals of electronics, communications and …, 2011
72*2011
Security analysis of the certificateless signature scheme proposed at SecUbiq 2006
JH Park, BG Kang
International Conference on Embedded and Ubiquitous Computing, 686-691, 2007
53*2007
Addition of the ARIA cipher suites to Transport Layer Security (TLS)
W Kim, J Lee, J Park, D Kwon
462011
Efficient delegation of pairing computation
BG Kang, MS Lee, JH Park
Cryptology ePrint Archive, 2005
462005
A new forward secure signature scheme
BG Kang, JH Park, SG Hahn
Cryptology ePrint Archive, 2004
452004
On lai–massey and quasi-feistel ciphers
A Yun, JH Park, J Lee
Designs, Codes and Cryptography 58 (1), 45-72, 2011
43*2011
Is it possible to have CBE from CL-PKE?
BG Kang, JH Park
Cryptology ePrint Archive, 2005
432005
Fast elliptic curve point counting using Gaussian normal basis
HY Kim, JY Park, JH Cheon, JH Park, JH Kim, SG Hahn
International Algorithmic Number Theory Symposium, 292-307, 2002
322002
Cryptanalysis of Zhou et al.’s proxy-protected signature schemes
JH Park, BG Kang, JW Han
Applied Mathematics and Computation 169 (1), 192-197, 2005
232005
Improved impossible differential attacks on large-block Rijndael
L Zhang, W Wu, JH Park, BW Koo, Y Yeom
Information Security - ISC 2008, 298-315, 2008
222008
On the relationship between squared pairings and plain pairings
BG Kang, JH Park
Information processing letters 97 (6), 219-224, 2006
102006
Cryptanalysis of some group-oriented proxy signature schemes
JH Park, BG Kang, S Park
Information Security Applications: 6th International Workshop, WISA 2005 …, 2006
102006
Adaptive preimage resistance and permutation-based hash functions
J Lee, JH Park
Cryptology ePrint Archive, 2009
82009
Complete addition law for Montgomery curves
J Kim, JH Park, DC Kim, WH Kim
Information Security and Cryptology - ICISC 2019, 260-277, 2019
52019
Security of stateful order-preserving encryption
KS Kim, M Kim, D Lee, JH Park, WH Kim
Information Security and Cryptology - ICISC 2017, 39-56, 2017
52017
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20