Jong In Lim
List of publications from the DBLP Bibliography Server - FAQ
2009 | ||
---|---|---|
100 | Eun-A Jun, Jea Doek Ji, Jongin Lim, Seok Won Jung: Improved remote user authentication scheme using bilinear pairings. ICHIT 2009: 602-605 | |
99 | Eun Young Choi, Dong Hoon Lee, Jong In Lim: Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems. Computer Standards & Interfaces 31(6): 1124-1130 (2009) | |
2008 | ||
98 | Yong Ho Kim, Kyu Young Choi, Jongin Lim, Dong Hoon Lee: An Efficient Key Establishment Scheme for Self-organizing Sensor Networks. ICDCN 2008: 345-349 | |
97 | Sooyoung Chae, Hosub Lee, Jaeik Cho, Manhyun Jung, Jongin Lim, Jongsub Moon: A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model. WISA 2008: 190-200 | |
96 | Jongsung Kim, Changhoon Lee, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jongin Lim: Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis. IEICE Transactions 91-A(10): 3047-3058 (2008) | |
95 | Eunjin Lee, Jongsung Kim, Deukjo Hong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim: Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks. IEICE Transactions 91-A(2): 642-649 (2008) | |
94 | Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong, Jongin Lim, Haeryong Park, Kilsoo Chun: Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function. IEICE Transactions 91-A(9): 2607-2614 (2008) | |
93 | Jung Yeon Hwang, Jongin Lim, Dong Hoon Lee: Impersonation Attack on a Strong ID-Based Key Distribution. IEICE Transactions 91-B(8): 2702-2703 (2008) | |
92 | Taek-Young Youn, Young-Ho Park, Taekyoung Kwon, Soonhak Kwon, Jongin Lim: Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications. IEICE Transactions 91-D(5): 1481-1484 (2008) | |
91 | Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim: Weakness in a RSA-based password authenticated key exchange protocol. Inf. Process. Lett. 108(6): 339-342 (2008) | |
2007 | ||
90 | Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim: Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. ACISP 2007: 143-157 | |
89 | Jong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, Laurence Tianruo Yang: Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. AINA 2007: 311-316 | |
88 | Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee, Jongin Lim: Classification of Key Management Schemes for Wireless Sensor Networks. APWeb/WAIM Workshops 2007: 664-673 | |
87 | Sung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim: SPA Countermeasure Based on Unsigned Left-to-Right Recodings. ATC 2007: 286-295 | |
86 | Yeog Kim, Jewan Bang, Gu Taek Lee, Sangjin Lee, Jongin Lim: A Field Guide to Hidden Accounting Information Detection. FGCN (2) 2007: 146-150 | |
85 | Seokhee Lee, Antonio Savoldi, Sangjin Lee, Jongin Lim: Windows Pagefile Collection and Analysis for a Live Forensics Context. FGCN (2) 2007: 97-101 | |
84 | Eun A. Jun, Seok Won Jung, Jeom Goo Kim, Jong In Lim: Efficient an Implementation Method Research of a Smart Card Atomic Operation. ICCSA (2) 2007: 113-121 | |
83 | Dong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim: Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. ISPEC 2007: 238-253 | |
82 | Young-Gab Kim, Jongin Lim: Quantitative Risk Analysis and Evaluation in Information Systems: A Case Study. International Conference on Computational Science (3) 2007: 1040-1047 | |
81 | Kihong Kim, Jinkeun Hong, Jongin Lim: Approach of the Secure Communication Mechanism in Aero-wireless Environment. MUE 2007: 1070-1075 | |
80 | Hyun-A Park, Dong Hoon Lee, Jongin Lim, Sang Hyun Cho: PPIDS: Privacy Preserving Intrusion Detection System. PAISI 2007: 269-274 | |
79 | Young-Gab Kim, Jongin Lim: HMM-Based Approach for Evaluating Risk Propagation. PAISI 2007: 325-326 | |
78 | Yong Ho Kim, Jong Hwan Park, Dong Hoon Lee, Jongin Lim: Bogus Data Filtering in Sensor Networks. PAKDD Workshops 2007: 629-635 | |
77 | HeeSeok Kim, Tae-Hyun Kim, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim, Jongin Lim: Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. WISTP 2007: 39-52 | |
76 | Sun-Hee Lim, Ki-Seok Bang, Okyeon Yi, Jongin Lim: A Secure Handover Protocol Design in Wireless Networks with Formal Verification. WWIC 2007: 67-78 | |
75 | Jin Wook Byun, Dong Hoon Lee, Jong In Lim: EC2C-PAKA: An efficient client-to-client password-authenticated key agreement. Inf. Sci. 177(19): 3995-4013 (2007) | |
2006 | ||
74 | Jin Wook Byun, Dong Hoon Lee, Jongin Lim: Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. APWeb 2006: 830-836 | |
73 | Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim: Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. CANS 2006: 168-181 | |
72 | Tae-Hyun Kim, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim: Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. CARDIS 2006: 119-134 | |
71 | Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jaesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee: HIGHT: A New Block Cipher Suitable for Low-Resource Device. CHES 2006: 46-59 | |
70 | Young-Gab Kim, Dongwon Jeong, Soo-Hyun Park, Jongin Lim, Doo-Kwon Baik: Modeling and Simulation for Security Risk Propagation in Critical Information Systems. CIS 2006: 858-868 | |
69 | Kihong Kim, Jinkeun Hong, Jongin Lim: Analysis of the Power Consumption of Secure Communication in Wireless Networks. DEXA 2006: 894-903 | |
68 | Jin Wook Byun, Dong Hoon Lee, Jongin Lim: Efficient Conjunctive Keyword Search on Encrypted Data Storage System. EuroPKI 2006: 184-196 | |
67 | Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim: Further Security Analysis of XTR. ISPEC 2006: 33-44 | |
66 | Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim: An Efficient ID-Based Delegation Network. OTM Workshops (1) 2006: 382-391 | |
65 | Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee, Jongin Lim: A Key Management Scheme for Large Scale Distributed Sensor Networks. PWC 2006: 437-446 | |
64 | Eunjin Lee, Deukjo Hong, Donghoon Chang, Seokhie Hong, Jongin Lim: A Weak Key Class of XTEA for a Related-Key Rectangle Attack. VIETCRYPT 2006: 286-297 | |
63 | Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi: Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. J. Cryptology 19(4): 441-462 (2006) | |
2005 | ||
62 | Sosun Kim, Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim: A Fast Inversion Algorithm and Low-Complexity Architecture over GF(2m). CIS (2) 2005: 1-8 | |
61 | Jin Wook Byun, Dong Hoon Lee, Jongin Lim: Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. CIS (2) 2005: 143-148 | |
60 | Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim: Generic Transformation for Scalable Broadcast Encryption Schemes. CRYPTO 2005: 276-292 | |
59 | Kwangsoo Lee, Changho Jung, Sangjin Lee, HyungJun Kim, Jongin Lim: Applying LR Cube Analysis to JSteg Detection. Communications and Multimedia Security 2005: 275-276 | |
58 | Kihong Kim, Jinkeun Hong, Jongin Lim: A Secure and Efficient Communication Resume Protocol for Secure Wireless Networks. DAIS 2005: 157-168 | |
57 | Kihong Kim, Jinkeun Hong, Jongin Lim: Fast and Secure Communication Resume Protocol for Wireless Networks. Euro-Par 2005: 1120-1129 | |
56 | Su-Mi Lee, Young Ju Hwang, Dong Hoon Lee, Jong In Lim: Efficient Authentication for Low-Cost RFID Systems. ICCSA (1) 2005: 619-627 | |
55 | Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun: Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme. ICCSA (2) 2005: 381-390 | |
54 | Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim: Color Cube Analysis for Detection of LSB Steganography in RGB Color Images. ICCSA (2) 2005: 537-546 | |
53 | Jaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee, Jongin Lim: Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. ICCSA (2) 2005: 567-576 | |
52 | Dong Jin Yang, Chang Han Kim, Young-Ho Park, Yongtae Kim, Jongin Lim: Modified Sequential Normal Basis Multipliers for Type II Optimal Normal Bases. ICCSA (2) 2005: 647-656 | |
51 | Kihong Kim, Jinkeun Hong, Jongin Lim: Analysis/Synthesis of Speech Signals Based on AbS/OLA Sinusoidal Modeling Using Elliptic Filter. IDEAL 2005: 141-148 | |
50 | Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim: A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm. ISC 2005: 288-299 | |
49 | Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim: New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography. Information Hiding 2005: 312-326 | |
48 | Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun: Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. KES (2) 2005: 453-459 | |
47 | Seokhee Lee, Hyunsang Kim, Sangjin Lee, Jongin Lim: Digital evidence collection process in integrity and memory information gathering. SADFE 2005: 236-247 | |
46 | Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim: An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism. Selected Areas in Cryptography 2005: 144-158 | |
45 | Kihong Kim, Jinkeun Hong, Jongin Lim: Sinusoidal Modeling Using Wavelet Packet Transform Applied to the Analysis and Synthesis of Speech Signals. TSD 2005: 241-248 | |
44 | Jung Youp Lee, Seok Won Jung, Jongin Lim: Detecting Trapdoors in Smart Cards Using Timing and Power Analysis. TestCom 2005: 275-288 | |
43 | Hyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, Jongin Lim: Oblivious Conjunctive Keyword Search. WISA 2005: 318-327 | |
42 | Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai: Side Channel Cryptanalysis on XTR Public Key Cryptosystem. IEICE Transactions 88-A(5): 1214-1223 (2005) | |
2004 | ||
41 | Jong In Lim, Dong Hoon Lee: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers Springer 2004 | |
40 | Dong-Guk Han, Jongin Lim, Kouichi Sakurai: On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. ACISP 2004: 454-465 | |
39 | Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai: Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. ICICS 2004: 305-317 | |
38 | Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim: New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. ICISC 2004: 21-32 | |
37 | Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim: On Security Notions for Steganalysis. ICISC 2004: 440-454 | |
36 | Jongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, Jung Hwan Song: Related-Key Attacks on Reduced Rounds of SHACAL-2. INDOCRYPT 2004: 175-190 | |
2003 | ||
35 | Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim: Digital Signature Schemes with Restriction on Signing Capability. ACISP 2003: 324-335 | |
34 | Sangwoo Park, Soo Hak Sung, Sangjin Lee, Jongin Lim: Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES. FSE 2003: 247-260 | |
33 | Hyejoung Yoo, Hyungwoo Lee, Sangjin Lee, Jongin Lim: Designated Verification of Non-invertible Watermark. ISC 2003: 338-351 | |
32 | Taeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim: Covert Channel Detection in the ICMP Payload Using Support Vector Machine. ISCIS 2003: 828-835 | |
31 | Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim: Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property. MMM-ACNS 2003: 298-307 | |
2002 | ||
30 | Sangwoo Park, Soo Hak Sung, Seongtaek Chee, Jongin Lim: On the Security of Reduced Versions of 3-Pass HAVAL. ACISP 2002: 406-419 | |
29 | Sangwoo Park, Soo Hak Sung, Seongtaek Chee, E-Joong Yoon, Jongin Lim: On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis. ASIACRYPT 2002: 176-191 | |
28 | Young-Ho Park, Sangtae Jeong, Jongin Lim: Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms. EUROCRYPT 2002: 197-208 | |
27 | Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim: Saturation Attacks on Reduced Round Skipjack. FSE 2002: 100-111 | |
26 | Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, Jongin Lim: Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA. FSE 2002: 49-60 | |
25 | Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, Jongin Lim: A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. ICICS 2002: 456-468 | |
24 | Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim: Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. ICISC 2002: 16-34 | |
23 | Hak Soo Ju, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim: An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. ICISC 2002: 421-432 | |
22 | Young-Ho Park, Sangho Oh, Sangjin Lee, Jongin Lim, Maenghee Sung: An Improved Method of Multiplication on Certain Elliptic Curves. Public Key Cryptography 2002: 310-322 | |
21 | Young-Ho Park, Sangtae Jeong, Chang Han Kim, Jongin Lim: An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves. Public Key Cryptography 2002: 323-334 | |
20 | Donghoon Chang, Jaechul Sung, Soo Hak Sung, Sangjin Lee, Jongin Lim: Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. Selected Areas in Cryptography 2002: 160-174 | |
19 | Dong-Guk Han, Ki Soon Yoon, Young-Ho Park, Chang Han Kim, Jongin Lim: Optimal Extension Fields for XTR. Selected Areas in Cryptography 2002: 369-384 | |
18 | Chang Han Kim, Sangho Oh, Jongin Lim: A New Hardware Architecture for Operations in GF(2m). IEEE Trans. Computers 51(1): 90-92 (2002) | |
17 | Seokhie Hong, Jaechul Sung, Sangjin Lee, Jongin Lim, Jongsu Kim: Provable security for 13 round Skipjack-like structure. Inf. Process. Lett. 82(5): 243-246 (2002) | |
2001 | ||
16 | Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi: Known-IV Attacks on Triple Modes of Operation of Block Ciphers. ASIACRYPT 2001: 208-221 | |
15 | Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim: Impossible Differential Cryptanalysis of Zodiac. FSE 2001: 300-311 | |
14 | Jaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi: Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. ICISC 2001: 103-113 | |
13 | Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee, Jongin Lim: Off-Line Authentication Using Watermarks. ICISC 2001: 200-213 | |
12 | Seonhee Lee, Seokhie Hong, Sangjin Lee, Jongin Lim, Seonhee Yoon: Truncated Differential Cryptanalysis of Camellia. ICISC 2001: 32-38 | |
11 | Ik Rae Jeong, Dong Hoon Lee, Jong In Lim: Efficient Transferable Cash with Group Signatures. ISC 2001: 462-474 | |
2000 | ||
10 | Heajoung Yoo, Seokhie Hong, Sangjin Lee, Jong In Lim, Okyeon Yi, Maenghee Sung: A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring. ACISP 2000: 41-48 | |
9 | Jaechul Sung, Sangjin Lee, Jong In Lim, Seokhie Hong, Sangjoon Park: Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. ASIACRYPT 2000: 274-288 | |
8 | Seokhie Hong, Sangjin Lee, Jongin Lim, Jaechul Sung, Dong Hyeon Cheon, Inho Cho: Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. FSE 2000: 273-283 | |
7 | Hyun-Jeong Kim, Jong In Lim, Dong Hoon Lee: Efficient and Secure Member Deletion in Group Signature Schemes. ICISC 2000: 150-161 | |
6 | Dong Hyeon Cheon, Sangjin Lee, Jong In Lim, Sung Jae Lee: New Block Cipher DONUT Using Pairwise Perfect Decorrelation. INDOCRYPT 2000: 262-270 | |
5 | Sangho Oh, Chang Han Kim, Jongin Lim, Dong Hyeon Cheon: Efficient Normal Basis Multipliers in Composite Fields. IEEE Trans. Computers 49(10): 1133-1138 (2000) | |
1999 | ||
4 | Ju-Sung Kang, Choonsik Park, Sangjin Lee, Jong In Lim: On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis. ICISC 1999: 38-52 | |
3 | Chang-Hyi Le, Jong In Lim: A New Aspect of Dual Basis for Efficient Field Arithmetic. Public Key Cryptography 1999: 12-28 | |
1998 | ||
2 | Jung Je Son, Jong In Lim, Seongtaek Chee, Soo Hak Sung: Global Avalanche Characteristics and Nonlinearity of Balanced Boolean Functions. Inf. Process. Lett. 65(3): 139-144 (1998) | |
1995 | ||
1 | Changho Seo, Jongin Lim, Hichum Eun: On Comparison and Analysis of Algorithms for Multiplication in GF(2^m). J. Comput. Syst. Sci. 51(3): 456-459 (1995) |