Kyu Young Choi

Orcid: 0000-0003-4616-1566

According to our database1, Kyu Young Choi authored at least 18 papers between 2004 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
The value of CT, MRI, and PET-CT in detecting retropharyngeal lymph node metastasis of head and neck squamous cell carcinoma.
BMC Medical Imaging, 2020

2019
Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Generic Construction of Bounded-Collusion IBE via Table-Based ID-to-Key Map.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks.
Proceedings of the Information Security Practice and Experience, 2018

2017
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

2016
Hybrid WBC: Secure and Efficient White-Box Encryption Schemes.
IACR Cryptol. ePrint Arch., 2016

2015
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM.
IACR Cryptol. ePrint Arch., 2015

2012
Efficient certificateless proxy signature scheme with provable security.
Inf. Sci., 2012

2011
A new provably secure certificateless short signature scheme.
Comput. Math. Appl., 2011

2008
ID-Based Authenticated Group Key Agreement Secure against Insider Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Identity-based universal designated multi-verifiers signature schemes.
Comput. Stand. Interfaces, 2008

Security weakness in an authenticated group key agreement protocol in two rounds.
Comput. Commun., 2008

An Efficient Key Establishment Scheme for Self-organizing Sensor Networks.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

2007
Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles).
Proceedings of the Pairing-Based Cryptography, 2007

Efficient Certificateless Signature Schemes.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Disaster Coverable PKI Model Utilizing the Existing PKI Structure.
Proceedings of the On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, 2006

2005
ID-based Authenticated Key Agreement for Low-Power Mobile Devices.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Efficient ID-based Group Key Agreement with Bilinear Maps.
Proceedings of the Public Key Cryptography, 2004


  Loading...