Chae Hoon Lim

According to our database1, Chae Hoon Lim authored at least 21 papers between 1992 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
A note on the average number of RSA fixed points.
Theor. Comput. Sci., 2011

Secure Code Dissemination and Remote Image Management Using Short-Lived Signatures in WSNs.
IEEE Commun. Lett., 2011

2009
Practical Broadcast Authentication Using Short-Lived Signatures in WSNs.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

2008
LEAP++: A Robust Key Establishment Scheme for Wireless Sensor Networks.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

2006
Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

2005
mCrypton - A Lightweight Block Cipher for Security of Low-Cost RFID Tags and Sensors.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

2004
A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2000
Fast Implementation of Elliptic Curve Arithmetic in GF(p<sup>n</sup>).
Proceedings of the Public Key Cryptography, 2000

1999
Speeding Up Elliptic Scalar Multiplication with Precomputation.
Proceedings of the Information Security and Cryptology, 1999

A Revised Version of Crypton - Crypton V1.0.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Hardware Design and Performance Estimation of the 128-bit Block Cipher Crypton.
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999

1998
Cryptanalysis in Prime Order Subgroups of <i>Z</i><sup>*</sup><sub>n</sub>.
Proceedings of the Advances in Cryptology, 1998

A Study on the Proposed Korean Digital Signature Algorithm.
Proceedings of the Advances in Cryptology, 1998

1997
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp.
Proceedings of the Advances in Cryptology, 1997

1996
Directed Signatures and Application to Threshold Cryptosystems.
Proceedings of the Security Protocols, 1996

1995
Several Practical Protocols for Authentication and Key Exchange.
Inf. Process. Lett., 1995

Server (Prover/Signer)-Aided Verification of Identity Proofs and Signatures.
Proceedings of the Advances in Cryptology, 1995

Security and Performance of Server-Aided RSA Computation Protocols.
Proceedings of the Advances in Cryptology, 1995

1994
More Flexible Exponentiation with Precomputation.
Proceedings of the Advances in Cryptology, 1994

1993
Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks.
Proceedings of the Advances in Cryptology, 1993

1992
Modified Maurer-Yacobi's scheme and its applications.
Proceedings of the Advances in Cryptology, 1992


  Loading...