default search action
Dae Hyun Yum
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j36]Jinwoo Lee, Tae Gu Kang, Kookrae Cho, Dae Hyun Yum:
New Parameter Sets for SPHINCS+. IEICE Trans. Inf. Syst. 104-D(6): 890-892 (2021) - [j35]Zhong Zhang, Dae Hyun Yum, Minho Shin:
PARS: Privacy-Aware Reward System for Mobile Crowdsensing Systems. Sensors 21(21): 7045 (2021) - 2020
- [j34]Seongmin Park, Juneyeun Kim, Kookrae Cho, Dae Hyun Yum:
Finding the key length of a Vigenère cipher: How to improve the twist algorithm. Cryptologia 44(3): 197-204 (2020)
2010 – 2019
- 2019
- [j33]Dae Hyun Yum:
Mathematical Analysis of Secrecy Amplification in Key Infection: The Whispering Mode. IEICE Trans. Inf. Syst. 102-D(12): 2599-2602 (2019) - [j32]Tae Gu Kang, Jinwoo Lee, Junyeng Kim, Dae Hyun Yum:
On the Performance Analysis of SPHINCS+ Verification. IEICE Trans. Inf. Syst. 102-D(12): 2603-2606 (2019) - 2017
- [j31]Jinwoo Lee, Jae Woo Seo, Kookrae Cho, Pil Joong Lee, Dae Hyun Yum:
A Visibility-Based Lower Bound for Android Unlock Patterns. IEICE Trans. Inf. Syst. 100-D(3): 578-581 (2017) - 2016
- [j30]Dae Hyun Yum:
Average-Case Analysis of Certificate Revocation in Combinatorial Certificate Management Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(2): 663-665 (2016) - [j29]Dae Hyun Yum:
Mathematical Analysis of Secrecy Amplification in Key Infection. IEICE Trans. Inf. Syst. 99-D(9): 2390-2394 (2016) - [j28]Jinwoo Lee, Jae Woo Seo, Kookrae Cho, Pil Joong Lee, Juneyeun Kim, Seung Hoon Choi, Dae Hyun Yum:
A Visibility-Based Upper Bound for Android Unlock Patterns. IEICE Trans. Inf. Syst. 99-D(11): 2814-2816 (2016) - 2015
- [j27]Dae Hyun Yum:
On the Probability of Certificate Revocation in Combinatorial Certificate Management Schemes. IEICE Trans. Inf. Syst. 98-D(5): 1104-1107 (2015) - [j26]Dae Hyun Yum:
Randomized Certificate Replacement with Bounded Collateral Damage. IEICE Trans. Inf. Syst. 98-D(11): 1990-1993 (2015) - 2013
- [j25]Myung-Ho Park, Ki-Gon Nam, Jin Seok Kim, Dae Hyun Yum, Pil Joong Lee:
Unilateral Distance Bounding Protocol with Bidirectional Challenges. IEICE Trans. Inf. Syst. 96-D(1): 134-137 (2013) - [j24]Myung-Ho Park, Ki-Gon Nam, Jin Seok Kim, Dae Hyun Yum, Pil Joong Lee:
Secure and Lightweight Localization Method for Wireless Sensor Networks. IEICE Trans. Inf. Syst. 96-D(3): 723-726 (2013) - [j23]Jae Woo Seo, Dae Hyun Yum, Pil Joong Lee:
Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles. Theor. Comput. Sci. 491: 83-93 (2013) - [j22]Jae Woo Seo, Dae Hyun Yum, Pil Joong Lee:
Comments on "Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption". IEEE Trans. Inf. Theory 59(5): 3256 (2013) - 2012
- [j21]Jin Seok Kim, Kookrae Cho, Dae Hyun Yum, Sung Je Hong, Pil Joong Lee:
Lightweight Distance Bounding Protocol against Relay Attacks. IEICE Trans. Inf. Syst. 95-D(4): 1155-1158 (2012) - [j20]Jin Seok Kim, Dae Hyun Yum, Sung Je Hong, Jong Kim, Pil Joong Lee:
Security Condition for Exact Localization in Wireless Ad Hoc Networks. IEICE Trans. Commun. 95-B(7): 2459-2462 (2012) - [j19]Jin Seok Kim, Dae Hyun Yum, Pil Joong Lee, Sung Je Hong, Jong Kim:
A Hybrid Sonar Algorithm for Submersible Cars to Verify the Location of Senders. IEEE Trans. Veh. Technol. 61(6): 2707-2714 (2012) - [j18]Dae Hyun Yum, Pil Joong Lee:
Exact Formulae for Resilience in Random Key Predistribution Schemes. IEEE Trans. Wirel. Commun. 11(5): 1638-1642 (2012) - 2011
- [j17]Dae Hyun Yum, Jin Seok Kim, Sung Je Hong, Pil Joong Lee:
Distance Bounding Protocol with Adjustable False Acceptance Rate. IEEE Commun. Lett. 15(4): 434-436 (2011) - [j16]Dae Hyun Yum, Jin Seok Kim, Pil Joong Lee, Sung Je Hong:
Fast Verification of Hash Chains with Reduced Storage. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 383-391 (2011) - [j15]Dae Hyun Yum, Pil Joong Lee:
Sanitizable Signatures Reconsidered. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(2): 717-724 (2011) - [j14]Dae Hyun Yum, Jae Woo Seo, Pil Joong Lee:
Energy-Efficient Hash Chain Traversal. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(3): 955-963 (2011) - [j13]Dae Hyun Yum, Pil Joong Lee:
Lightweight One-Time Signature for Short Messages. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(7): 1567-1575 (2011) - [j12]Dae Hyun Yum, Pil Joong Lee:
On the average cost of order-preserving encryption based on hypergeometric distribution. Inf. Process. Lett. 111(19): 956-959 (2011) - [j11]Dae Hyun Yum, Jin Seok Kim, Sung Je Hong, Pil Joong Lee:
Distance Bounding Protocol for Mutual Authentication. IEEE Trans. Wirel. Commun. 10(2): 592-601 (2011) - [c18]Dae Hyun Yum, Duk Soo Kim, Jin Seok Kim, Pil Joong Lee, Sung Je Hong:
Order-Preserving Encryption for Non-uniformly Distributed Plaintexts. WISA 2011: 84-97 - 2010
- [j10]Dae Hyun Yum, Jae Woo Seo, Kookrae Cho, Pil Joong Lee:
Generalized Hash Chain Traversal with Selective Output. IEICE Trans. Inf. Syst. 93-D(5): 1303-1306 (2010) - [c17]Dae Hyun Yum, Jae Woo Seo, Pil Joong Lee:
Trapdoor Sanitizable Signatures Made Easy. ACNS 2010: 53-68 - [c16]Dae Hyun Yum, Jin Seok Kim, Pil Joong Lee, Sung Je Hong:
On Fast Verification of Hash Chains. CT-RSA 2010: 382-396
2000 – 2009
- 2009
- [j9]Dae Hyun Yum, Pil Joong Lee:
Cracking Hill Ciphers with Goodness-of-Fit Statistics. Cryptologia 33(4): 335-342 (2009) - [j8]Dae Hyun Yum, Pil Joong Lee:
Invisibly Sanitizable Signature without Pairings. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(6): 1541-1543 (2009) - [c15]Dae Hyun Yum, Jae Woo Seo, Sungwook Eom, Pil Joong Lee:
Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity. CT-RSA 2009: 325-339 - [c14]Dae Hyun Yum, Sun Young Kim, Ho-Kun Moon, Mi-Yeon Kim, Jae-Hoon Roh, Pil Joong Lee:
Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers. WISA 2009: 339-353 - 2008
- [j7]Dae Hyun Yum, Pil Joong Lee:
Efficient Fair Exchange from Identity-Based Signature. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 119-126 (2008) - [j6]Dae Hyun Yum, Jong Hoon Shin, Pil Joong Lee:
Security Analysis of Yeh-Tsai Security Mechanism. IEICE Trans. Inf. Syst. 91-D(5): 1477-1480 (2008) - [j5]Dae Hyun Yum, Jae Woo Seo, Pil Joong Lee:
Generalized Combinatoric Accumulator. IEICE Trans. Inf. Syst. 91-D(5): 1489-1491 (2008) - [j4]Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum:
Optimistic Fair Exchange in a Multi-user Setting. J. Univers. Comput. Sci. 14(3): 318-346 (2008) - [j3]Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum:
New Multiparty Signature Schemes for Network Routing Applications. ACM Trans. Inf. Syst. Secur. 12(1): 3:1-3:39 (2008) - 2007
- [j2]Dae Hyun Yum, Pil Joong Lee:
Security Analysis of Zhu-Bao's Verifiably Committed Signature. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(12): 2962-2964 (2007) - [c13]Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum:
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. CCS 2007: 276-285 - [c12]Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum:
Optimistic Fair Exchange in a Multi-user Setting. Public Key Cryptography 2007: 118-133 - [i2]Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum:
Optimistic Fair Exchange in a Multi-user Setting. IACR Cryptol. ePrint Arch. 2007: 182 (2007) - [i1]Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum:
Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing. IACR Cryptol. ePrint Arch. 2007: 438 (2007) - 2005
- [j1]Dae Hyun Yum, Pil Joong Lee:
Cryptanalysis of Yeh-Shen-Hwang's One-Time Password Authentication Scheme. IEICE Trans. Commun. 88-B(4): 1647-1648 (2005) - [c11]Yevgeniy Dodis, Dae Hyun Yum:
Time Capsule Signature. Financial Cryptography 2005: 57-71 - [c10]Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee:
Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System. ISC 2005: 344-358 - 2004
- [c9]Dae Hyun Yum, Pil Joong Lee:
Generic Construction of Certificateless Signature. ACISP 2004: 200-211 - [c8]Dae Hyun Yum, Pil Joong Lee:
Identity-Based Cryptography in Public Key Management. EuroPKI 2004: 71-84 - [c7]Dae Hyun Yum, Pil Joong Lee:
A Distributed Online Certificate Status Protocol Based on GQ Signature Scheme. ICCSA (1) 2004: 471-480 - [c6]Dae Hyun Yum, Pil Joong Lee:
Generic Construction of Certificateless Encryption. ICCSA (1) 2004: 802-811 - [c5]Dae Hyun Yum, Pil Joong Lee:
Separable Implicit Certificate Revocation. ICISC 2004: 121-136 - 2003
- [c4]Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee:
EPA: An Efficient Password-Based Protocal for Authenticated Key Exchange. ACISP 2003: 452-463 - [c3]Dae Hyun Yum, Pil Joong Lee:
Efficient Key Updating Signature Schemes Based on IBS. IMACC 2003: 167-182 - [c2]Dae Hyun Yum, Jae Eun Kang, Pil Joong Lee:
Advanced Certificate Status Protocol. MMM-ACNS 2003: 229-240 - 2001
- [c1]Dae Hyun Yum, Pil Joong Lee:
New Signcryption Schemes Based on KCDSA. ICISC 2001: 305-317
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint