이동훈 교수 연구실
연구실 정보 수정하기
홈
기본 정보
프로젝트
발행물
구성원
발행물
논문
저서
전체 논문
362
필터 설정하기
201
Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06
Park, Jong Hwan, 이동훈
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009
202
The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secure
Choi, Seung Geol, Herranz, Javier, Hofheinz, Dennis, Hwang, Jung Yeon, Kiltz, Eike, 이동훈, Yung, Moti
INF. PROCESS. LETT., 2009
203
RFID를 위한 이차잉여 기반의 개선된 상호인증 기법
이동훈, 박한나, 김세일, 천지영
한국정보과학회, 2009
204
Searchable Encryption with Keyword-Recoverability
Jeong, IR, Kwon, JO, Hong, D, Lee, DH
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009
205
Stronger Chikazawa-Yamagishi ID-Based Key Distribution
Jeong, IR, Kwon, JO, Lee, DH
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009
206
A Note on Leakage-Resilient Authenticated Key Exchange
천지영, 황정연, 이동훈
IEEE TRANS. WIREL. COMMUN., 2009
207
Security Flaw of Authentication Scheme with Anonymity for Wireless Communications
이지선, Chang, Jik Hyun, 이동훈
IEEE COMMUNICATIONS LETTERS, 2009
208
Light-Weight Key Exchange with Different Passwords in the Standard Model
Kwon, JO, Jeong, IR, Jeong, IR, Lee, DH
JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009
209
Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme
정익래, 권정옥, 이동훈
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009
210
Constructing PEKS schemes secure against keyword guessing attacks is possible?
정익래, 권정옥, 홍도원, 이동훈
COMPUTER COMMUNICATIONS, 2009
21
22
23
24
25
26
27
28
29
30