발행물

전체 논문

362

201

Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06
Park, Jong Hwan, 이동훈
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009

202

The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure
Choi, Seung Geol, Herranz, Javier, Hofheinz, Dennis, Hwang, Jung Yeon, Kiltz, Eike, 이동훈, Yung, Moti
INF. PROCESS. LETT., 2009

203

RFID를 위한 이차잉여 기반의 개선된 상호인증 기법
이동훈, 박한나, 김세일, 천지영
한국정보과학회, 2009

204

Searchable Encryption with Keyword-Recoverability
Jeong, IR, Kwon, JO, Hong, D, Lee, DH
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009

205

Stronger Chikazawa-Yamagishi ID-Based Key Distribution
Jeong, IR, Kwon, JO, Lee, DH
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009

206

A Note on Leakage-Resilient Authenticated Key Exchange
천지영, 황정연, 이동훈
IEEE TRANS. WIREL. COMMUN., 2009

207

Security Flaw of Authentication Scheme with Anonymity for Wireless Communications
이지선, Chang, Jik Hyun, 이동훈
IEEE COMMUNICATIONS LETTERS, 2009

208

Light-Weight Key Exchange with Different Passwords in the Standard Model
Kwon, JO, Jeong, IR, Jeong, IR, Lee, DH
JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009

209

Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme
정익래, 권정옥, 이동훈
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009

210

Constructing PEKS schemes secure against keyword guessing attacks is possible?
정익래, 권정옥, 홍도원, 이동훈
COMPUTER COMMUNICATIONS, 2009