default search action
Jongin Lim 0001
Person information
- affiliation: Korea University, Graduate School of Information Security, CIST, Seoul, South Korea
Other persons with the same name
- Jongin Lim 0002 — Seoul National University, ASRI, Department of Electrical and Computer Engineering, South Korea (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c100]Ji-Young Kong, Jong-In Lim, Kyoung-Gon Kim:
The All-Purpose Sword: North Korea's Cyber Operations and Strategies. CyCon 2019: 1-20 - 2018
- [j37]Moon-Ho Joo, Sang-Pil Yoon, Hun-Yeong Kwon, Jong-In Lim:
De-identification policy and risk distribution framework for securing personal information. Inf. Polity 23(2): 195-219 (2018) - 2017
- [j36]Dong Hee Kim, Seungjo Baek, Jongin Lim:
Measures for Automaker's Legal Risks from Security Threats in Connected Car Development Lifecycle. KSII Trans. Internet Inf. Syst. 11(2): 865-882 (2017) - [j35]Hwankuk Kim, Kyungho Lee, Jongin Lim:
A Study on the Impact Analysis of Security Flaws between Security Controls: An Empirical Analysis of K-ISMS using Case-Control Study. KSII Trans. Internet Inf. Syst. 11(9): 4588-4608 (2017) - [j34]Kwangho Kim, InJung Kim, Jongin Lim:
National cyber security enhancement scheme for intelligent surveillance capacity with public IoT environment. J. Supercomput. 73(3): 1140-1151 (2017) - [c99]YooJin Kwon, Huy Kang Kim, Koudjo M. Koumadi, Yong Hun Lim, Jong In Lim:
Automated vulnerability analysis technique for smart grid infrastructure. ISGT 2017: 1-5 - [c98]Keun Young Lee, Hun Yeong Kwon, Jong In Lim:
Legal Consideration on the Use of Artificial Intelligence Technology and Self-regulation in Financial Sector: Focused on Robo-Advisors. WISA 2017: 323-335 - 2016
- [j33]Kyung-Bok Lee, Jong-In Lim:
The Reality and Response of Cyber Threats to Critical Infrastructure: A Case Study of the Cyber-terror Attack on the Korea Hydro & Nuclear Power Co., Ltd.. KSII Trans. Internet Inf. Syst. 10(2): 857-880 (2016) - 2015
- [j32]Hwankuk Kim, Jongin Lim, Kyungho Lee:
A Study of K-ISMS Fault Analysis for Constructing Secure Internet of Things Service. Int. J. Distributed Sens. Networks 11: 474329:1-474329:12 (2015) - [j31]Kwang Cheol Park, Hoon Shin, Won Hyung Park, Jong In Lim:
New detection method and countermeasure of cyber attacks in mix networks. Multim. Tools Appl. 74(16): 6509-6518 (2015) - [j30]Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim:
Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. Peer-to-Peer Netw. Appl. 8(4): 716-732 (2015) - [c97]YooJin Kwon, Myung-Sup Kim, Yong Hun Lim, Jong In Lim:
Network and system management object modeling for smart grid infrastructure. APNOMS 2015: 588-591 - [c96]AHyeon-Ju Park, Hye-Young Kim, Jong-In Lim:
A Framework of Device Authentication Management in IoT Environments. ICITCS 2015: 1-3 - [c95]Kwangho Kim, Sangdon Park, Jongin Lim:
Changes of Cybersecurity Legal System in East Asia: Focusing on Comparison Between Korea and Japan. WISA 2015: 348-356 - 2013
- [j29]Jung-Hyun Lee, Won Gue Lim, Jong In Lim:
A study of the security of Internet banking and financial private information in South Korea. Math. Comput. Model. 58(1-2): 117-131 (2013) - 2012
- [j28]Jae Deok Ji, Seok Won Jung, Jongin Lim:
Efficient Sequential Architecture of AES CCM for the IEEE 802.16e. IEICE Trans. Inf. Syst. 95-D(1): 185-187 (2012) - 2011
- [c94]HeeSeok Kim, Seokhie Hong, Jongin Lim:
A Fast and Provably Secure Higher-Order Masking of AES S-Box. CHES 2011: 95-107 - [c93]JuHee Ki, Jung Yeon Hwang, DaeHun Nyang, Dong Hoon Lee, Jongin Lim:
Privacy-Enhanced Deniable Authentication E-Mail Service. DEIS 2011: 16-29 - 2010
- [j27]Nam Su Chang, Tae Hyun Kim, Chang Han Kim, Dong-Guk Han, Jongin Lim:
A new bit-serial multiplier over GF(pm) using irreducible trinomials. Comput. Math. Appl. 60(2): 355-361 (2010) - [j26]Jongsung Kim, Seokhie Hong, Jongin Lim:
Impossible differential cryptanalysis using matrix method. Discret. Math. 310(5): 988-1002 (2010) - [j25]Taek-Young Youn, Jongin Lim:
Improved Delegation-Based Authentication Protocol for Secure Roaming Service with Unlinkability. IEEE Commun. Lett. 14(9): 791-793 (2010) - [j24]Jaeik Cho, Changhoon Lee, Sang Hyun Cho, Jung Hwan Song, Jongin Lim, Jongsub Moon:
A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data. Simul. Model. Pract. Theory 18(4): 431-435 (2010)
2000 – 2009
- 2009
- [j23]Eun Young Choi, Dong Hoon Lee, Jong In Lim:
Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems. Comput. Stand. Interfaces 31(6): 1124-1130 (2009) - [j22]Taek-Young Youn, Young-Ho Park, Jongin Lim:
Weaknesses in an anonymous authentication scheme for roaming service in global mobility networks. IEEE Commun. Lett. 13(7): 471-473 (2009) - [j21]Taek-Young Youn, Young-Ho Park, Jongin Lim:
An Efficient Signature Scheme with Fast Online Signing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(10): 2431-2437 (2009) - [j20]Taek-Young Youn, Young-Ho Park, Jongin Lim:
Efficient Trapdoor Commitment as Secure as Factoring with Useful Properties. IEICE Trans. Inf. Syst. 92-D(12): 2520-2523 (2009) - [j19]Mina Shim, Seungjo Baek, Taehyoung Park, Jeongseon Seol, Jongin Lim:
Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector . KSII Trans. Internet Inf. Syst. 3(5): 548-574 (2009) - [j18]Sun-Hee Lim, Seunghwan Yun, Jongin Lim, Okyeon Yi:
Formalizing the design, evaluation, and analysis of quality of protection in wireless networks. J. Commun. Networks 11(6): 634-644 (2009) - [j17]Jong Hyuk Park, Sangjin Lee, Jongin Lim, Laurence T. Yang:
U-HMS: hybrid system for secure intelligent multimedia data services in Ubi-Home. J. Intell. Manuf. 20(3): 337-346 (2009) - [c92]Eun-A Jun, Jea Doek Ji, Jongin Lim, Seok Won Jung:
Improved remote user authentication scheme using bilinear pairings. ICHIT 2009: 602-605 - 2008
- [j16]Eunjin Lee, Jongsung Kim, Deukjo Hong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim:
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(2): 642-649 (2008) - [j15]Taek-Young Youn, Young-Ho Park, Taekyoung Kwon, Soonhak Kwon, Jongin Lim:
Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications. IEICE Trans. Inf. Syst. 91-D(5): 1481-1484 (2008) - [j14]Jung Yeon Hwang, Jongin Lim, Dong Hoon Lee:
Impersonation Attack on a Strong ID-Based Key Distribution. IEICE Trans. Commun. 91-B(8): 2702-2703 (2008) - [j13]Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong, Jongin Lim, Haeryong Park, Kilsoo Chun:
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9): 2607-2614 (2008) - [j12]Jongsung Kim, Changhoon Lee, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jongin Lim:
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(10): 3047-3058 (2008) - [j11]Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim:
Weakness in a RSA-based password authenticated key exchange protocol. Inf. Process. Lett. 108(6): 339-342 (2008) - [c91]Yong Ho Kim, Kyu Young Choi, Jongin Lim, Dong Hoon Lee:
An Efficient Key Establishment Scheme for Self-organizing Sensor Networks. ICDCN 2008: 345-349 - [c90]Yeog Kim, Antonio Savoldi, Hyewon Lee, Sunmi Yun, Sangjin Lee, Jongin Lim:
Design and Implementation of a Tool to Detect Accounting Frauds. IIH-MSP 2008: 547-552 - [c89]Sooyoung Chae, Hosub Lee, Jaeik Cho, Manhyun Jung, Jongin Lim, Jongsub Moon:
A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model. WISA 2008: 190-200 - 2007
- [j10]Jin Wook Byun, Dong Hoon Lee, Jong In Lim:
EC2C-PAKA: An efficient client-to-client password-authenticated key agreement. Inf. Sci. 177(19): 3995-4013 (2007) - [c88]Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim:
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. ACISP 2007: 143-157 - [c87]Jong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, Laurence Tianruo Yang:
Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. AINA 2007: 311-316 - [c86]Jae-min Yang, Jong-Geun Kim, Jongin Lim:
P-IDC: Information Security and Consideration in Building Internet Data Centers for Pervasive Environment. APWeb/WAIM Workshops 2007: 583-592 - [c85]Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee, Jongin Lim:
Classification of Key Management Schemes for Wireless Sensor Networks. APWeb/WAIM Workshops 2007: 664-673 - [c84]Sung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim:
SPA Countermeasure Based on Unsigned Left-to-Right Recodings. ATC 2007: 286-295 - [c83]Seokhee Lee, Antonio Savoldi, Sangjin Lee, Jongin Lim:
Windows Pagefile Collection and Analysis for a Live Forensics Context. FGCN (2) 2007: 97-101 - [c82]Yeog Kim, Jewan Bang, Gu Taek Lee, Sangjin Lee, Jongin Lim:
A Field Guide to Hidden Accounting Information Detection. FGCN (2) 2007: 146-150 - [c81]Young-Gab Kim, Jongin Lim:
Quantitative Risk Analysis and Evaluation in Information Systems: A Case Study. International Conference on Computational Science (3) 2007: 1040-1047 - [c80]Eun-A Jun, Seok Won Jung, Jeom Goo Kim, Jong In Lim:
Efficient an Implementation Method Research of a Smart Card Atomic Operation. ICCSA (2) 2007: 113-121 - [c79]Kihong Kim, Jinkeun Hong, Jongin Lim:
Fast Secure Communication Establishing Mechanism for Aero-wireless Networks. ICECS 2007: 1360-1363 - [c78]Seokhee Lee, Antonio Savoldi, Sangjin Lee, Jongin Lim:
Password Recovery Using an Evidence Collection Tool and Countermeasures. IIH-MSP 2007: 97-102 - [c77]Dong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim:
Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. ISPEC 2007: 238-253 - [c76]Kihong Kim, Jinkeun Hong, Jongin Lim:
Approach of the Secure Communication Mechanism in Aero-wireless Environment. MUE 2007: 1070-1075 - [c75]Hyun-A Park, Dong Hoon Lee, Jongin Lim, Sang Hyun Cho:
PPIDS: Privacy Preserving Intrusion Detection System. PAISI 2007: 269-274 - [c74]Young-Gab Kim, Jongin Lim:
HMM-Based Approach for Evaluating Risk Propagation. PAISI 2007: 325-326 - [c73]Yong Ho Kim, Jong Hwan Park, Dong Hoon Lee, Jongin Lim:
Bogus Data Filtering in Sensor Networks. PAKDD Workshops 2007: 629-635 - [c72]Ji Young Chun, Yong Ho Kim, Jongin Lim, Dong Hoon Lee:
Location-aware Random Pair-wise Keys Scheme for Wireless Sensor Networks. SECPerU 2007: 31-36 - [c71]Kyuhyung Cho, Jongsung Lee, Jongin Lim, Jongsub Moon:
Verification method of network simulation for pervasive environments. SecureComm 2007: 155-161 - [c70]HeeSeok Kim, Tae Hyun Kim, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim, Jongin Lim:
Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. WISTP 2007: 39-52 - [c69]Sun-Hee Lim, Ki-Seok Bang, Okyeon Yi, Jongin Lim:
A Secure Handover Protocol Design in Wireless Networks with Formal Verification. WWIC 2007: 67-78 - 2006
- [j9]Jin Wook Byun, Dong Hoon Lee, Jong In Lim:
Security analysis and improvement of a gateway-oriented password-based authenticated key exchange protocol. IEEE Commun. Lett. 10(9): 683-685 (2006) - [j8]Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi:
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. J. Cryptol. 19(4): 441-462 (2006) - [c68]Jin Wook Byun, Dong Hoon Lee, Jongin Lim:
Efficient and Provably Secure Client-to-Client Password-Based Key Exchange Protocol. APWeb 2006: 830-836 - [c67]Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim:
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. CANS 2006: 168-181 - [c66]Tae Hyun Kim, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim:
Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. CARDIS 2006: 119-134 - [c65]Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee:
HIGHT: A New Block Cipher Suitable for Low-Resource Device. CHES 2006: 46-59 - [c64]Young-Gab Kim, Dongwon Jeong, Soo-Hyun Park, Jongin Lim, Doo-Kwon Baik:
Modeling and Simulation for Security Risk Propagation in Critical Information Systems. CIS 2006: 858-868 - [c63]Kihong Kim, Jinkeun Hong, Jongin Lim:
Analysis of the Power Consumption of Secure Communication in Wireless Networks. DEXA 2006: 894-903 - [c62]Jin Wook Byun, Dong Hoon Lee, Jongin Lim:
Efficient Conjunctive Keyword Search on Encrypted Data Storage System. EuroPKI 2006: 184-196 - [c61]Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee, Jongin Lim:
A Key Management Scheme for Large Scale Distributed Sensor Networks. PWC 2006: 437-446 - [c60]Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim:
Further Security Analysis of XTR. ISPEC 2006: 33-44 - [c59]Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim:
An Efficient ID-Based Delegation Network. OTM Workshops (1) 2006: 382-391 - [c58]Eunjin Lee, Deukjo Hong, Donghoon Chang, Seokhie Hong, Jongin Lim:
A Weak Key Class of XTEA for a Related-Key Rectangle Attack. VIETCRYPT 2006: 286-297 - [i2]Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim:
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. IACR Cryptol. ePrint Arch. 2006: 243 (2006) - 2005
- [j7]Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai:
Side Channel Cryptanalysis on XTR Public Key Cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(5): 1214-1223 (2005) - [c57]Sosun Kim, Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim:
A Fast Inversion Algorithm and Low-Complexity Architecture over GF(2m). CIS (2) 2005: 1-8 - [c56]Jin Wook Byun, Dong Hoon Lee, Jongin Lim:
Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. CIS (2) 2005: 143-148 - [c55]Kwangsoo Lee, Changho Jung, Sangjin Lee, HyungJun Kim, Jongin Lim:
Applying LR Cube Analysis to JSteg Detection. Communications and Multimedia Security 2005: 275-276 - [c54]Jung Yeon Hwang, Dong Hoon Lee, Jongin Lim:
Generic Transformation for Scalable Broadcast Encryption Schemes. CRYPTO 2005: 276-292 - [c53]Kihong Kim, Jinkeun Hong, Jongin Lim:
A Secure and Efficient Communication Resume Protocol for Secure Wireless Networks. DAIS 2005: 157-168 - [c52]Kihong Kim, Jinkeun Hong, Jongin Lim:
Fast and Secure Communication Resume Protocol for Wireless Networks. Euro-Par 2005: 1120-1129 - [c51]Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun:
Fine Grained Control of Security Capability and Forward Security in a Pairing Based Signature Scheme. ICCSA (2) 2005: 381-390 - [c50]Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim:
Color Cube Analysis for Detection of LSB Steganography in RGB Color Images. ICCSA (2) 2005: 537-546 - [c49]Jaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee, Jongin Lim:
Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. ICCSA (2) 2005: 567-576 - [c48]Su-Mi Lee, Young Ju Hwang, Dong Hoon Lee, Jong In Lim:
Efficient Authentication for Low-Cost RFID Systems. ICCSA (1) 2005: 619-627 - [c47]Dong Jin Yang, Chang Han Kim, Young-Ho Park, Yongtae Kim, Jongin Lim:
Modified Sequential Normal Basis Multipliers for Type II Optimal Normal Bases. ICCSA (2) 2005: 647-656 - [c46]Kihong Kim, Jinkeun Hong, Jongin Lim:
Analysis/Synthesis of Speech Signals Based on AbS/OLA Sinusoidal Modeling Using Elliptic Filter. IDEAL 2005: 141-148 - [c45]Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim:
New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography. Information Hiding 2005: 312-326 - [c44]Nam Su Chang, Chang Han Kim, Young-Ho Park, Jongin Lim:
A Non-redundant and Efficient Architecture for Karatsuba-Ofman Algorithm. ISC 2005: 288-299 - [c43]Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Jongin Lim, Kilsoo Chun:
Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. KES (2) 2005: 453-459 - [c42]Jung Youp Lee, Seok Won Jung, Jongin Lim:
Detecting Trapdoors in Smart Cards Using Timing and Power Analysis. TestCom 2005: 275-288 - [c41]Taek-Young Youn, Young-Ho Park, Chang Han Kim, Jongin Lim:
An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism. Selected Areas in Cryptography 2005: 144-158 - [c40]Seokhee Lee, Hyunsang Kim, Sangjin Lee, Jongin Lim:
Digital evidence collection process in integrity and memory information gathering. SADFE 2005: 236-247 - [c39]Kihong Kim, Jinkeun Hong, Jongin Lim:
Sinusoidal Modeling Using Wavelet Packet Transform Applied to the Analysis and Synthesis of Speech Signals. TSD 2005: 241-248 - [c38]Hyun Sook Rhee, Jin Wook Byun, Dong Hoon Lee, Jongin Lim:
Oblivious Conjunctive Keyword Search. WISA 2005: 318-327 - 2004
- [c37]Dong-Guk Han, Jongin Lim, Kouichi Sakurai:
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. ACISP 2004: 454-465 - [c36]Hyun-Sang Kim, Sang-Jin Lee, Jong-In Lim:
Digitalevidence Integrated Management System. Australian Computer, Network & Information Forensics Conference 2004: 31-39 - [c35]Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai:
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. ICICS 2004: 305-317 - [c34]Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim:
New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. ICISC 2004: 21-32 - [c33]Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim:
On Security Notions for Steganalysis. ICISC 2004: 440-454 - [c32]Jongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, Jung Hwan Song:
Related-Key Attacks on Reduced Rounds of SHACAL-2. INDOCRYPT 2004: 175-190 - [e1]Jong In Lim, Dong Hoon Lee:
Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers. Lecture Notes in Computer Science 2971, Springer 2004, ISBN 3-540-21376-7 [contents] - [i1]Dong-Guk Han, Jongin Lim, Kouichi Sakurai:
On security of XTR public key cryptosystems against Side Channel Attacks. IACR Cryptol. ePrint Arch. 2004: 123 (2004) - 2003
- [c31]Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim:
Digital Signature Schemes with Restriction on Signing Capability. ACISP 2003: 324-335 - [c30]Sangwoo Park, Soo Hak Sung, Sangjin Lee, Jongin Lim:
Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES. FSE 2003: 247-260 - [c29]Taeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim:
Covert Channel Detection in the ICMP Payload Using Support Vector Machine. ISCIS 2003: 828-835 - [c28]Hyejoung Yoo, Hyungwoo Lee, Sangjin Lee, Jongin Lim:
Designated Verification of Non-invertible Watermark. ISC 2003: 338-351 - [c27]Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim:
Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property. MMM-ACNS 2003: 298-307 - 2002
- [j6]Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim:
Impossible Differential Cryptanalysis of Zodiac. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 38-43 (2002) - [j5]Seokhie Hong, Jaechul Sung, Sangjin Lee, Jongin Lim, Jongsu Kim:
Provable security for 13 round Skipjack-like structure. Inf. Process. Lett. 82(5): 243-246 (2002) - [j4]Chang Han Kim, Sangho Oh, Jongin Lim:
A New Hardware Architecture for Operations in GF(2m). IEEE Trans. Computers 51(1): 90-92 (2002) - [c26]Sangwoo Park, Soo Hak Sung, Seongtaek Chee, Jongin Lim:
On the Security of Reduced Versions of 3-Pass HAVAL. ACISP 2002: 406-419 - [c25]Sangwoo Park, Soo Hak Sung, Seongtaek Chee, E-Joong Yoon, Jongin Lim:
On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis. ASIACRYPT 2002: 176-191 - [c24]Young-Ho Park, Sangtae Jeong, Jongin Lim:
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms. EUROCRYPT 2002: 197-208 - [c23]Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, Jongin Lim:
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA. FSE 2002: 49-60 - [c22]Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim:
Saturation Attacks on Reduced Round Skipjack. FSE 2002: 100-111 - [c21]Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, Jongin Lim:
A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. ICICS 2002: 456-468 - [c20]Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim:
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. ICISC 2002: 16-34 - [c19]Hak Soo Ju, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim:
An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. ICISC 2002: 421-432 - [c18]Young-Ho Park, Sangho Oh, Sangjin Lee, Jongin Lim, Maenghee Sung:
An Improved Method of Multiplication on Certain Elliptic Curves. Public Key Cryptography 2002: 310-322 - [c17]Young-Ho Park, Sangtae Jeong, Chang Han Kim, Jongin Lim:
An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves. Public Key Cryptography 2002: 323-334 - [c16]Donghoon Chang, Jaechul Sung, Soo Hak Sung, Sangjin Lee, Jongin Lim:
Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. Selected Areas in Cryptography 2002: 160-174 - [c15]Dong-Guk Han, Ki Soon Yoon, Young-Ho Park, Chang Han Kim, Jongin Lim:
Optimal Extension Fields for XTR. Selected Areas in Cryptography 2002: 369-384 - [c14]Heajoung Yoo, Seungchul Seo, Sangjin Lee, Jongin Lim:
Practical off-line authentication. Security and Watermarking of Multimedia Contents 2002: 141-148 - 2001
- [c13]Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi:
Known-IV Attacks on Triple Modes of Operation of Block Ciphers. ASIACRYPT 2001: 208-221 - [c12]Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim:
Impossible Differential Cryptanalysis of Zodiac. FSE 2001: 300-311 - [c11]Seonhee Lee, Seokhie Hong, Sangjin Lee, Jongin Lim, Seonhee Yoon:
Truncated Differential Cryptanalysis of Camellia. ICISC 2001: 32-38 - [c10]Jaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi:
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. ICISC 2001: 103-113 - [c9]Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee, Jongin Lim:
Off-Line Authentication Using Watermarks. ICISC 2001: 200-213 - [c8]Ik Rae Jeong, Dong Hoon Lee, Jong In Lim:
Efficient Transferable Cash with Group Signatures. ISC 2001: 462-474 - 2000
- [j3]Sangho Oh, Chang Han Kim, Jongin Lim, Dong Hyeon Cheon:
Efficient Normal Basis Multipliers in Composite Fields. IEEE Trans. Computers 49(10): 1133-1138 (2000) - [c7]Heajoung Yoo, Seokhie Hong, Sangjin Lee, Jong In Lim, Okyeon Yi, Maenghee Sung:
A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring. ACISP 2000: 41-48 - [c6]Jaechul Sung, Sangjin Lee, Jong In Lim, Seokhie Hong, Sangjoon Park:
Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. ASIACRYPT 2000: 274-288 - [c5]Seokhie Hong, Sangjin Lee, Jongin Lim, Jaechul Sung, Dong Hyeon Cheon, Inho Cho:
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. FSE 2000: 273-283 - [c4]Hyun-Jeong Kim, Jong In Lim, Dong Hoon Lee:
Efficient and Secure Member Deletion in Group Signature Schemes. ICISC 2000: 150-161 - [c3]Dong Hyeon Cheon, Sangjin Lee, Jong In Lim, Sung Jae Lee:
New Block Cipher DONUT Using Pairwise Perfect Decorrelation. INDOCRYPT 2000: 262-270
1990 – 1999
- 1999
- [c2]Ju-Sung Kang, Choonsik Park, Sangjin Lee, Jong In Lim:
On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis. ICISC 1999: 38-52 - [c1]Chang-Hyi Le, Jong In Lim:
A New Aspect of Dual Basis for Efficient Field Arithmetic. Public Key Cryptography 1999: 12-28 - 1998
- [j2]Jung Je Son, Jong In Lim, Seongtaek Chee, Soo Hak Sung:
Global Avalanche Characteristics and Nonlinearity of Balanced Boolean Functions. Inf. Process. Lett. 65(3): 139-144 (1998) - 1995
- [j1]Changho Seo, Jongin Lim, Hichum Eun:
On Comparison and Analysis of Algorithms for Multiplication in GF(2^m). J. Comput. Syst. Sci. 51(3): 456-459 (1995)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint