Ikkwon Yie

According to our database1, Ikkwon Yie authored at least 23 papers between 1994 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
On Insecure Uses of BGN for Privacy Preserving Data Aggregation Protocols.
Fundam. Informaticae, 2022

On Privacy Preserving Data Aggregation Protocols using BGN cryptosystem.
CoRR, 2022

2020
New orthogonality criterion for shortest vector of lattices and its applications.
Discret. Appl. Math., 2020

2017
Groups of permutations generated by function-linear translator pairs.
Finite Fields Their Appl., 2017

A Lattice Attack on Homomorphic NTRU with Non-invertible Public Keys.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

On Pairing Inversion of the Self-bilinear Map on Unknown Order Groups.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

2013
Remarks on Zhang et al.'s Analysis on a Short Signature Scheme and Their Improvement.
Int. J. Netw. Secur., 2013

2012
A correspondence of certain irreducible polynomials over finite fields.
Finite Fields Their Appl., 2012

2011
A Method of Finding Bad Signatures in an RSA-Type Batch Verification.
Informatica, 2011

Batch Verification and Finding Invalid Signatures in a Group Signature Scheme.
Int. J. Netw. Secur., 2011

2010
On the Security of Two Group Signature Schemes with Forward Security.
Informatica (Slovenia), 2010

2009
Remark on Shao et al.'s Bidirectional Proxy Re-signature Scheme in Indocrypt'07.
Int. J. Netw. Secur., 2009

Strong unforgeability in group signature schemes.
Comput. Stand. Interfaces, 2009

A privacy problem on Hu-Huang's proxy key generation protocol.
Comput. Stand. Interfaces, 2009

2007
Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

An Information Aggregation Scheme of Multi-node in Ubiquitous Sensor Networks.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

2006
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

2003
Prime Numbers of Diffie-Hellman Groups for IKE-MODP.
Proceedings of the Progress in Cryptology, 2003

2001
XTR Extended to GF(p<sup>6m</sup>).
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001.
Proceedings of the Progress in Cryptology, 2001

Fast Generation of Cubic Irreducible Polynomials for XTR.
Proceedings of the Progress in Cryptology, 2001

2000
A Generalized Takagi-Cryptosystem with a modulus of the form <i>p<sup>r</sup>q<sup>s</sup></i>.
Proceedings of the Progress in Cryptology, 2000

1994
Small degree coverings of the affine line in characteristic two.
Discret. Math., 1994


  Loading...