Jongin Lim

Affiliations:
  • Korea University, Graduate School of Information Security, CIST, Seoul, South Korea


According to our database1, Jongin Lim authored at least 136 papers between 1995 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
The All-Purpose Sword: North Korea's Cyber Operations and Strategies.
Proceedings of the 11th International Conference on Cyber Conflict, 2019

2018
De-identification policy and risk distribution framework for securing personal information.
Inf. Polity, 2018

2017
National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment.
J. Supercomput., 2017

A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study.
KSII Trans. Internet Inf. Syst., 2017

Measures for Automaker's Legal Risks from Security Threats in Connected Car Development Lifecycle.
KSII Trans. Internet Inf. Syst., 2017

Legal Consideration on the Use of Artificial Intelligence Technology and Self-regulation in Financial Sector: Focused on Robo-Advisors.
Proceedings of the Information Security Applications - 18th International Conference, 2017

Automated vulnerability analysis technique for smart grid infrastructure.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2017

2016
The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd..
KSII Trans. Internet Inf. Syst., 2016

2015
Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis.
Peer-to-Peer Netw. Appl., 2015

New detection method and countermeasure of cyber attacks in mix networks.
Multim. Tools Appl., 2015

A Study of K-ISMS Fault Analysis for Constructing Secure Internet of Things Service.
Int. J. Distributed Sens. Networks, 2015

Changes of Cybersecurity Legal System in East Asia: Focusing on Comparison Between Korea and Japan.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

A Framework of Device Authentication Management in IoT Environments.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

Network and system management object modeling for smart grid infrastructure.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

2013
A study of the security of Internet banking and financial private information in South Korea.
Math. Comput. Model., 2013

2012
Efficient Sequential Architecture of AES CCM for the IEEE 802.16e.
IEICE Trans. Inf. Syst., 2012

2011
Privacy-Enhanced Deniable Authentication E-Mail Service.
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011

A Fast and Provably Secure Higher-Order Masking of AES S-Box.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2010
A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data.
Simul. Model. Pract. Theory, 2010

Improved Delegation-Based Authentication Protocol for Secure Roaming Service with Unlinkability.
IEEE Commun. Lett., 2010

Impossible differential cryptanalysis using matrix method.
Discret. Math., 2010

A new bit-serial multiplier over GF(p<sup>m</sup>) using irreducible trinomials.
Comput. Math. Appl., 2010

2009
U-HMS: hybrid system for secure intelligent multimedia data services in Ubi-Home.
J. Intell. Manuf., 2009

Formalizing the design, evaluation, and analysis of quality of protection in wireless networks.
J. Commun. Networks, 2009

Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector .
KSII Trans. Internet Inf. Syst., 2009

Efficient Trapdoor Commitment as Secure as Factoring with Useful Properties.
IEICE Trans. Inf. Syst., 2009

An Efficient Signature Scheme with Fast Online Signing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks.
IEEE Commun. Lett., 2009

Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems.
Comput. Stand. Interfaces, 2009

Improved remote user authentication scheme using bilinear pairings.
Proceedings of the 2009 International Conference on Hybrid Information Technology, 2009

2008
Weakness in a RSA-based password authenticated key exchange protocol.
Inf. Process. Lett., 2008

Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications.
IEICE Trans. Inf. Syst., 2008

Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Impersonation Attack on a Strong ID-Based Key Distribution.
IEICE Trans. Commun., 2008

Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Design and Implementation of a Tool to Detect Accounting Frauds.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

An Efficient Key Establishment Scheme for Self-organizing Sensor Networks.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

2007
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement.
Inf. Sci., 2007

A Secure Handover Protocol Design in Wireless Networks with Formal Verification.
Proceedings of the Wired/Wireless Internet Communications, 5th International Conference, 2007

Enhanced Doubling Attacks on Signed-All-Bits Set Recoding.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

Verification method of network simulation for pervasive environments.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Location-aware Random Pair-wise Keys Scheme for Wireless Sensor Networks.
Proceedings of the Third International Workshop on Security, 2007

Bogus Data Filtering in Sensor Networks.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

PPIDS: Privacy Preserving Intrusion Detection System.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

HMM-Based Approach for Evaluating Risk Propagation.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

Approach of the Secure Communication Mechanism in Aero-wireless Environment.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Secure Signed Radix- <i>r</i> Recoding Methods for Constrained-Embedded Devices.
Proceedings of the Information Security Practice and Experience, 2007

Password Recovery Using an Evidence Collection Tool and Countermeasures.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Fast Secure Communication Establishing Mechanism for Aero-wireless Networks.
Proceedings of the 14th IEEE International Conference on Electronics, 2007

Efficient an Implementation Method Research of a Smart Card Atomic Operation.
Proceedings of the Computational Science and Its Applications, 2007

Quantitative Risk Analysis and Evaluation in Information Systems: A Case Study.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Windows Pagefile Collection and Analysis for a Live Forensics Context.
Proceedings of the Future Generation Communication and Networking, 2007

A Field Guide to Hidden Accounting Information Detection.
Proceedings of the Future Generation Communication and Networking, 2007

SPA Countermeasure Based on Unsigned Left-to-Right Recodings.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

P-IDC: Information Security and Consideration in Building Internet Data Centers for Pervasive Environment.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

Classification of Key Management Schemes for Wireless Sensor Networks.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.
J. Cryptol., 2006

Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol.
IEEE Commun. Lett., 2006

Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields.
IACR Cryptol. ePrint Arch., 2006

A Weak Key Class of XTEA for a Related-Key Rectangle Attack.
Proceedings of the Progressin Cryptology, 2006

An Efficient ID-Based Delegation Network.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

Further Security Analysis of XTR.
Proceedings of the Information Security Practice and Experience, 2006

A Key Management Scheme for Large Scale Distributed Sensor Networks.
Proceedings of the Personal Wireless Communications, 2006

Efficient Conjunctive Keyword Search on Encrypted Data Storage System.
Proceedings of the Public Key Infrastructure, 2006

Analysis of the Power Consumption of Secure Communication in Wireless Networks.
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006

Modeling and Simulation for Security Risk Propagation in Critical Information Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

HIGHT: A New Block Cipher Suitable for Low-Resource Device.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations.
Proceedings of the Smart Card Research and Advanced Applications, 2006

Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol.
Proceedings of the Frontiers of WWW Research and Development, 2006

2005
Side Channel Cryptanalysis on XTR Public Key Cryptosystem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Oblivious Conjunctive Keyword Search.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

Sinusoidal Modeling Using Wavelet Packet Transform Applied to the Analysis and Synthesis of Speech Signals.
Proceedings of the Text, Speech and Dialogue, 8th International Conference, 2005

Digital evidence collection process in integrity and memory information gathering.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005

Detecting Trapdoors in Smart Cards Using Timing and Power Analysis.
Proceedings of the Testing of Communicating Systems, 2005

Efficient Revocation of Security Capability in Certificateless Public Key Cryptography.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm.
Proceedings of the Information Security, 8th International Conference, 2005

New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Analysis/Synthesis of Speech Signals Based on AbS/OLA Sinusoidal Modeling Using Elliptic Filter.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2005

Modified Sequential Normal Basis Multipliers for Type II Optimal Normal Bases.
Proceedings of the Computational Science and Its Applications, 2005

Color Cube Analysis for Detection of LSB Steganography in RGB Color Images.
Proceedings of the Computational Science and Its Applications, 2005

Efficient Authentication for Low-Cost RFID Systems.
Proceedings of the Computational Science and Its Applications, 2005

Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme.
Proceedings of the Computational Science and Its Applications, 2005

Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE.
Proceedings of the Computational Science and Its Applications, 2005

Fast and Secure Communication Resume Protocol for Wireless Networks.
Proceedings of the Euro-Par 2005, Parallel Processing, 11th International Euro-Par Conference, Lisbon, Portugal, August 30, 2005

A Secure and Efficient Communication Resume Protocol for Secure Wireless Networks.
Proceedings of the Distributed Applications and Interoperable Systems, 2005

Generic Transformation for Scalable Broadcast Encryption Schemes.
Proceedings of the Advances in Cryptology, 2005

Applying LR Cube Analysis to JSteg Detection.
Proceedings of the Communications and Multimedia Security, 2005

A Fast Inversion Algorithm and Low-Complexity Architecture over <i>GF</i>(2<sup><i>m</i></sup>).
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Password-Based Group Key Exchange Secure Against Insider Guessing Attacks.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
On security of XTR public key cryptosystems against Side Channel Attacks.
IACR Cryptol. ePrint Arch., 2004

Related-Key Attacks on Reduced Rounds of SHACAL-2.
Proceedings of the Progress in Cryptology, 2004

New Method for Bounding the Maximum Differential Probability for SPNs and ARIA.
Proceedings of the Information Security and Cryptology, 2004

On Security Notions for Steganalysis.
Proceedings of the Information Security and Cryptology, 2004

Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Digitalevidence Integrated Management System.
Proceedings of the 2nd Australian Computer Network & Information Forensics Conference, November 25th 2004, Perth, Western Australia, Forensic Computing, 2004

2003
Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property.
Proceedings of the Computer Network Security, 2003

Designated Verification of Non-invertible Watermark.
Proceedings of the Information Security, 6th International Conference, 2003

Covert Channel Detection in the ICMP Payload Using Support Vector Machine.
Proceedings of the Computer and Information Sciences, 2003

Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

Digital Signature Schemes with Restriction on Signing Capability.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
A New Hardware Architecture for Operations in GF(2m).
IEEE Trans. Computers, 2002

Provable security for 13 round Skipjack-like structure.
Inf. Process. Lett., 2002

Impossible Differential Cryptanalysis of Zodiac.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Practical off-line authentication.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Optimal Extension Fields for XTR.
Proceedings of the Selected Areas in Cryptography, 2002

Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98.
Proceedings of the Selected Areas in Cryptography, 2002

An Improved Method of Multiplication on Certain Elliptic Curves.
Proceedings of the Public Key Cryptography, 2002

An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves.
Proceedings of the Public Key Cryptography, 2002

An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control.
Proceedings of the Information Security and Cryptology, 2002

Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption.
Proceedings of the Information Security and Cryptology, 2002

A Chosen Plaintext Linear Attack on Block Cipher CIKS-1.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

Saturation Attacks on Reduced Round Skipjack.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis.
Proceedings of the Advances in Cryptology, 2002

On the Security of Reduced Versions of 3-Pass HAVAL.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Efficient Transferable Cash with Group Signatures.
Proceedings of the Information Security, 4th International Conference, 2001

Off-Line Authentication Using Watermarks.
Proceedings of the Information Security and Cryptology, 2001

Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation.
Proceedings of the Information Security and Cryptology, 2001

Truncated Differential Cryptanalysis of Camellia.
Proceedings of the Information Security and Cryptology, 2001

Known-IV Attacks on Triple Modes of Operation of Block Ciphers.
Proceedings of the Advances in Cryptology, 2001

2000
Efficient Normal Basis Multipliers in Composite Fields.
IEEE Trans. Computers, 2000

New Block Cipher DONUT Using Pairwise Perfect Decorrelation.
Proceedings of the Progress in Cryptology, 2000

Efficient and Secure Member Deletion in Group Signature Schemes.
Proceedings of the Information Security and Cryptology, 2000

Provable Security against Differential and Linear Cryptanalysis for the SPN Structure.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis.
Proceedings of the Advances in Cryptology, 2000

A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
A New Aspect of Dual Basis for Efficient Field Arithmetic.
Proceedings of the Public Key Cryptography, 1999

On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis.
Proceedings of the Information Security and Cryptology, 1999

1998
Global Avalanche Characteristics and Nonlinearity of Balanced Boolean Functions.
Inf. Process. Lett., 1998

1995
On Comparison and Analysis of Algorithms for Multiplication in GF(2^m).
J. Comput. Syst. Sci., 1995


  Loading...