Follow
Dae Hyun Yum
Dae Hyun Yum
Verified email at mju.ac.kr
Title
Cited by
Cited by
Year
Generic construction of certificateless signature
DH Yum, PJ Lee
Australasian Conference on Information Security and Privacy, 200-211, 2004
3082004
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
A Boldyreva, C Gentry, A O'Neill, DH Yum
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2322007
Generic construction of certificateless encryption
DH Yum, PJ Lee
International Conference on Computational Science and Its Applications, 802-811, 2004
1332004
New signcryption schemes based on KCDSA
DH Yum, PJ Lee
Information Security and Cryptology—ICISC 2001: 4th International …, 2002
1062002
Optimistic fair exchange in a multi-user setting
Y Dodis, PJ Lee, DH Yum
International Workshop on Public Key Cryptography, 118-133, 2007
902007
Identity-based cryptography in public key management
DH Yum, PJ Lee
European Public Key Infrastructure Workshop, 71-84, 2004
802004
Timed-release encryption with pre-open capability and its application to certified e-mail system
YH Hwang, DH Yum, PJ Lee
International Conference on Information Security, 344-358, 2005
662005
Order-preserving encryption for non-uniformly distributed plaintexts
DH Yum, DS Kim, JS Kim, PJ Lee, SJ Hong
Information Security Applications: 12th International Workshop, WISA 2011 …, 2012
482012
Distance bounding protocol for mutual authentication
DH Yum, JS Kim, SJ Hong, PJ Lee
IEEE Transactions on Wireless Communications 10 (2), 592-601, 2010
362010
Exact formulae for resilience in random key predistribution schemes
DH Yum, PJ Lee
IEEE Transactions on Wireless Communications 11 (5), 1638-1642, 2012
302012
Time capsule signature
Y Dodis, DH Yum
Financial Cryptography and Data Security: 9th International Conference, FC …, 2005
302005
EPA: An efficient password-based protocol for authenticated key exchange
YH Hwang, DH Yum, PJ Lee
Australasian Conference on Information Security and Privacy, 452-463, 2003
302003
Efficient key updating signature schemes based on IBS
DH Yum, PJ Lee
IMA International Conference on Cryptography and Coding, 167-182, 2003
262003
Single-layer fractal hash chain traversal with almost optimal complexity
DH Yum, JW Seo, S Eom, PJ Lee
Cryptographers’ Track at the RSA Conference, 325-339, 2009
232009
Trapdoor sanitizable signatures made easy
DH Yum, JW Seo, PJ Lee
Applied Cryptography and Network Security: 8th International Conference …, 2010
222010
Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles
JW Seo, DH Yum, PJ Lee
Theoretical Computer Science 491, 83-93, 2013
202013
Distance bounding protocol with adjustable false acceptance rate
DH Yum, JS Kim, SJ Hong, PJ Lee
IEEE Communications Letters 15 (4), 434-436, 2011
192011
New multiparty signature schemes for network routing applications
A Boldyreva, C Gentry, A O'Neill, DH Yum
ACM Transactions on Information and System Security (TISSEC) 12 (1), 1-39, 2008
152008
Finding the key length of a Vigenère cipher: How to improve the twist algorithm
S Park, J Kim, K Cho, DH Yum
Cryptologia 44 (3), 197-204, 2020
132020
Cryptanalysis of Yeh-Shen-Hwang's one-time password authentication scheme
DH Yum, PJ Lee
IEICE transactions on communications 88 (4), 1647-1648, 2005
132005
The system can't perform the operation now. Try again later.
Articles 1–20