Je Hong Park
Je Hong Park
Electronics and Telecommunications Research Institute
Verified email at
Cited by
Cited by
A certificate-based signature scheme
BG Kang, JH Park, SG Hahn
Cryptographers’ Track at the RSA Conference, 99-111, 2004
Forward secure dynamic searchable symmetric encryption with efficient updates
KS Kim, M Kim, D Lee, JH Park, WH Kim
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
A Simple Variant of the Merkle–Damgård Scheme with a Permutation
S Hirose, JH Park, A Yun
Journal of cryptology 25 (2), 271-309, 2012
Cryptanalysis of the public-key encryption based on braid groups
E Lee, JH Park
International Conference on the Theory and Applications of Cryptographic …, 2003
Security weakness in the smart grid key distribution scheme proposed by Xia and Wang
JH Park, M Kim, D Kwon
IEEE Transactions on Smart Grid 4 (3), 1613-1614, 2013
Efficient and secure authenticated key exchange protocols in the eCK model
J Lee, JH Park
IEICE transactions on fundamentals of electronics, communications and …, 2011
Security analysis of the certificateless signature scheme proposed at SecUbiq 2006
JH Park, BG Kang
International Conference on Embedded and Ubiquitous Computing, 686-691, 2007
Is it possible to have CBE from CL-PKE?
BG Kang, JH Park
Cryptology ePrint Archive, 2005
Efficient delegation of pairing computation
BG Kang, MS Lee, JH Park
Cryptology ePrint Archive, 2005
A new forward secure signature scheme
BG Kang, JH Park, SG Hahn
Cryptology ePrint Archive, 2004
Addition of the ARIA cipher suites to Transport Layer Security (TLS)
W Kim, J Lee, J Park, D Kwon
On lai–massey and quasi-feistel ciphers
A Yun, JH Park, J Lee
Designs, Codes and Cryptography 58 (1), 45-72, 2011
Fast elliptic curve point counting using Gaussian normal basis
HY Kim, JY Park, JH Cheon, JH Park, JH Kim, SG Hahn
International Algorithmic Number Theory Symposium, 292-307, 2002
Cryptanalysis of Zhou et al.’s proxy-protected signature schemes
JH Park, BG Kang, JW Han
Applied Mathematics and Computation 169 (1), 192-197, 2005
Improved impossible differential attacks on large-block Rijndael
L Zhang, W Wu, JH Park, BW Koo, Y Yeom
International Conference on Information Security, 298-315, 2008
On the relationship between squared pairings and plain pairings
BG Kang, JH Park
Information processing letters 97 (6), 219-224, 2006
Cryptanalysis of some group-oriented proxy signature schemes
JH Park, BG Kang, S Park
International Workshop on Information Security Applications, 10-24, 2005
Adaptive preimage resistance and permutation-based hash functions
J Lee, JH Park
Cryptology ePrint Archive, 2009
Preimage resistance of LPmkr with r= m− 1
J Lee, JH Park
Information processing letters 110 (14-15), 602-608, 2010
On the security of status certificate-based encryption scheme
JH Park, DH Lee
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2007
The system can't perform the operation now. Try again later.
Articles 1–20