default search action
SeongHan Shin
Person information
- affiliation: National Institute of Advanced Industrial Science and Technology (AIST), Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Ilsun You, Gunwoo Kim, Seonghan Shin, Hoseok Kwon, Jongkil Kim, Joonsang Baek:
5G-AKA-FS: A 5G Authentication and Key Agreement Protocol for Forward Secrecy. Sensors 24(1): 159 (2024) - [e1]Ilsun You, Michal Choras, Seonghan Shin, Hwankuk Kim, Philip Virgil Astillo:
Mobile Internet Security - 7th International Conference, MobiSec 2023, Okinawa, Japan, December 19-21, 2023, Revised Selected Papers. Communications in Computer and Information Science 2095, Springer 2024, ISBN 978-981-97-4464-0 [contents] - 2022
- [j26]SeongHan Shin, Shota Yamada, Goichiro Hanaoka, Yusuke Ishida, Atsushi Kunii, Junichi Oketani, Shimpei Kunii, Kiyoshi Tomomura:
How to Extend CTRT for AES-256 and AES-192. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(8): 1121-1133 (2022) - [j25]Seonghan Shin:
A Strengthened PAKE Protocol with Identity-Based Encryption. IEICE Trans. Inf. Syst. 105-D(11): 1900-1910 (2022) - [c28]SeongHan Shin, Tomoyuki Ogawa, Ryo Fujita, Mari Itoh, Hirotaka Yoshida:
An Investigation of PSA Certified. ARES 2022: 97:1-97:8 - [c27]SeongHan Shin:
A Study on 5G Security Activities in Japan. MobiSec 2022: 33-47 - [c26]SeongHan Shin:
5G-AKA, Revisited. WISA 2022: 114-127 - 2021
- [j24]SeongHan Shin:
Leakage-Resilient and Proactive Authenticated Key Exchange (LRP-AKE), Reconsidered. IEICE Trans. Inf. Syst. 104-D(11): 1880-1893 (2021) - 2020
- [j23]Goichiro Hanaoka, Yusuke Sakai, Toshiya Shimizu, Takeshi Shimoyama, SeongHan Shin:
A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 150-164 (2020)
2010 – 2019
- 2019
- [c25]SeongHan Shin, Shota Yamada, Goichiro Hanaoka, Yusuke Ishida, Atsushi Kunii, Junichi Oketani, Shimpei Kunii, Kiyoshi Tomomura:
An Extended CTRT for AES-256. WISA 2019: 79-91 - [c24]SeongHan Shin:
Strengthened PAKE Protocols Secure Against Malicious Private Key Generator. WISA 2019: 192-205 - 2018
- [j22]SeongHan Shin, Kazukuni Kobara:
How to Preserve User Anonymity in Password-Based Anonymous Authentication Scheme. IEICE Trans. Inf. Syst. 101-D(3): 803-807 (2018) - [c23]SeongHan Shin:
Secure Hybrid Authentication Protocols against Malicious Key Generation Center. ISITA 2018: 213-217 - 2017
- [j21]SeongHan Shin, Kazukuni Kobara:
Simple Anonymous Password-Based Authenticated Key Exchange (SAPAKE), Reconsidered. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(2): 639-652 (2017) - [j20]SeongHan Shin, Kazukuni Kobara:
Security Analysis of Password-Authenticated Key Retrieval. IEEE Trans. Dependable Secur. Comput. 14(5): 573-576 (2017) - 2016
- [c22]SeongHan Shin, Kazukuni Kobara, Chia-Chuan Chuang, Weicheng Huang:
A security framework for MQTT. CNS 2016: 432-436 - [c21]SeongHan Shin, Kazukuni Kobara:
A secure anonymous password-based authentication protocol with control of authentication numbers. ISITA 2016: 325-329 - 2015
- [j19]SeongHan Shin, Kazukuni Kobara:
Hidden Credential Retrieval, Revisited. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 428-433 (2015) - [j18]SeongHan Shin, Kazukuni Kobara:
On Unlinkability of Password-Based Anonymous Authentication. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(6): 1320-1324 (2015) - [j17]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
On Finding Secure Domain Parameters Resistant to Cheon's Algorithm. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(12): 2456-2470 (2015) - 2014
- [j16]SeongHan Shin, Kazukuni Kobara:
About Validity Checks of Augmented PAKE in IEEE 1363.2 and ISO/IEC 11770-4. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 413-417 (2014) - [c20]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
In search of secure domain parameters under strong diffie-hellman and related assumptions. ISITA 2014: 483-487 - 2013
- [c19]SeongHan Shin, Kazukuni Kobara:
RSA-based Password-Authenticated Key Retrieval using multiple servers. WorldCIS 2013: 106-111 - [i5]SeongHan Shin, Kazukuni Kobara:
Security Analysis of Password-Authenticated Key Retrieval. IACR Cryptol. ePrint Arch. 2013: 649 (2013) - 2012
- [i4]SeongHan Shin, Kazukuni Kobara:
Efficient Augmented Password-Only Authentication and Key Exchange for IKEv2. RFC 6628: 1-20 (2012) - 2011
- [j15]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks. IEICE Trans. Inf. Syst. 94-D(11): 2095-2110 (2011) - [c18]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A secure public cloud storage system. ICITST 2011: 103-109 - 2010
- [j14]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 102-115 (2010) - [j13]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(6): 1086-1101 (2010) - [j12]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 2092-2095 (2010) - [j11]Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems. Wirel. Pers. Commun. 54(1): 225-236 (2010) - [c17]Yasunori Onda, SeongHan Shin, Kazukuni Kobara, Hideki Imai:
How to distinguish on-line dictionary attacks and password mis-typing in two-factor authentication. ISITA 2010: 571-576 - [i3]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Security Proof of AugPAKE. IACR Cryptol. ePrint Arch. 2010: 334 (2010)
2000 – 2009
- 2009
- [j10]Hideki Imai, SeongHan Shin, Kazukuni Kobara:
New security layer for overlay networks. J. Commun. Networks 11(3): 211-228 (2009) - [c16]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions. AAECC 2009: 149-158 - [c15]Kazukuni Kobara, SeongHan Shin, Mario Strefler:
Partnership in key exchange protocols. AsiaCCS 2009: 161-170 - 2008
- [j9]Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Protocols for purpose-restricted anonymous communications in IP-based wireless networks. Comput. Commun. 31(15): 3662-3671 (2008) - [j8]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Secure Authenticated Key Exchange Protocol for Credential Services. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 139-149 (2008) - [j7]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
RSA-Based Password-Authenticated Key Exchange, Revisited. IEICE Trans. Inf. Syst. 91-D(5): 1424-1438 (2008) - [j6]SeongHan Shin, Hanane Fathi, Kazukuni Kobara, Neeli R. Prasad, Hideki Imai:
A New Security Architecture for Personal Networks and Its Performance Evaluation. IEICE Trans. Commun. 91-B(7): 2255-2264 (2008) - [j5]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(11): 3312-3324 (2008) - [c14]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A security framework for personal networks. COMSWARE 2008: 682-690 - [i2]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2008: 537 (2008) - 2007
- [j4]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(2): 474-490 (2007) - [c13]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. IWSEC 2007: 444-458 - [c12]Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Protocols for Authenticated Anonymous Communications. PIMRC 2007: 1-5 - 2006
- [j3]Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Shyam S. Chakraborty, Hideki Imai, Ramjee Prasad:
LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links. IEEE J. Sel. Areas Commun. 24(9): 1725-1737 (2006) - [c11]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. CIS 2006: 767-777 - [c10]SeongHan Shin, Hanane Fathi, Mohamed Imine, Kazukuni Kobara, Neeli R. Prasad, Hideki Imai:
A New Security Architecture for Personal Networks. GLOBECOM 2006 - [c9]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
An Authentication and Key Exchange Protocol for Secure Credential Services. ISC 2006: 443-458 - [c8]SeongHan Shin, Mohamed Imine, Hanane Fathi, Kazukuni Kobara, Neeli R. Prasad, Hideki Imai:
A Leakage-Resilient and Forward-Secure Authenticated Key Exchange Protocol for Private Personal Area Networks. PIMRC 2006: 1-5 - [c7]Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Next Wireless Security Architecture for MJPv6. SMC 2006: 1256-1261 - 2005
- [j2]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(3): 736-754 (2005) - [j1]Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Shyam S. Chakraborty, Hideki Imai, Ramjee Prasad:
Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks. IEEE J. Sel. Areas Commun. 23(11): 2182-2193 (2005) - [c6]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. ACNS 2005: 269-284 - [c5]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange. EuroPKI 2005: 191-205 - [c4]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. ICN (2) 2005: 944-952 - [c3]Hideki Imai, SeongHan Shin, Kazukuni Kobara:
Authenticated key exchange for wireless security. WCNC 2005: 1180-1186 - [c2]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Secure Network Storage System with Information Privacy. WEWoRC 2005: 22-31 - [i1]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA". IACR Cryptol. ePrint Arch. 2005: 190 (2005) - 2003
- [c1]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Leakage-Resilient Authenticated Key Establishment Protocols. ASIACRYPT 2003: 155-172
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint