Follow
Je Hong Park
Je Hong Park
Electronics and Telecommunications Research Institute
Verified email at nsr.re.kr
Title
Cited by
Cited by
Year
A certificate-based signature scheme
BG Kang, JH Park, SG Hahn
Topics in Cryptology - CT-RSA 2004, 99-111, 2004
2012004
Forward secure dynamic searchable symmetric encryption with efficient updates
KS Kim, M Kim, D Lee, JH Park, WH Kim
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1872017
A Simple Variant of the Merkle–Damgård Scheme with a Permutation
S Hirose, JH Park, A Yun
Journal of cryptology 25 (2), 271-309, 2012
101*2012
Security weakness in the smart grid key distribution scheme proposed by Xia and Wang
JH Park, M Kim, D Kwon
IEEE Transactions on Smart Grid 4 (3), 1613-1614, 2013
882013
Cryptanalysis of the public-key encryption based on braid groups
E Lee, JH Park
Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003
762003
Efficient and secure authenticated key exchange protocols in the eCK model
J Lee, JH Park
IEICE transactions on fundamentals of electronics, communications and …, 2011
70*2011
Security analysis of the certificateless signature scheme proposed at SecUbiq 2006
JH Park, BG Kang
International Conference on Embedded and Ubiquitous Computing, 686-691, 2007
53*2007
Addition of the ARIA cipher suites to Transport Layer Security (TLS)
W Kim, J Lee, J Park, D Kwon
462011
Efficient delegation of pairing computation
BG Kang, MS Lee, JH Park
Cryptology ePrint Archive, 2005
462005
A new forward secure signature scheme
BG Kang, JH Park, SG Hahn
Cryptology ePrint Archive, 2004
452004
Is it possible to have CBE from CL-PKE?
BG Kang, JH Park
Cryptology ePrint Archive, 2005
432005
On lai–massey and quasi-feistel ciphers
A Yun, JH Park, J Lee
Designs, Codes and Cryptography 58 (1), 45-72, 2011
42*2011
Fast elliptic curve point counting using Gaussian normal basis
HY Kim, JY Park, JH Cheon, JH Park, JH Kim, SG Hahn
International Algorithmic Number Theory Symposium, 292-307, 2002
322002
Cryptanalysis of Zhou et al.’s proxy-protected signature schemes
JH Park, BG Kang, JW Han
Applied Mathematics and Computation 169 (1), 192-197, 2005
232005
Improved impossible differential attacks on large-block Rijndael
L Zhang, W Wu, JH Park, BW Koo, Y Yeom
Information Security - ISC 2008, 298-315, 2008
222008
On the relationship between squared pairings and plain pairings
BG Kang, JH Park
Information processing letters 97 (6), 219-224, 2006
102006
Cryptanalysis of some group-oriented proxy signature schemes
JH Park, BG Kang, S Park
Information Security Applications: 6th International Workshop, WISA 2005 …, 2006
102006
Adaptive preimage resistance and permutation-based hash functions
J Lee, JH Park
Cryptology ePrint Archive, 2009
82009
Complete addition law for Montgomery curves
J Kim, JH Park, DC Kim, WH Kim
Information Security and Cryptology - ICISC 2019, 260-277, 2019
52019
Security of stateful order-preserving encryption
KS Kim, M Kim, D Lee, JH Park, WH Kim
Information Security and Cryptology - ICISC 2017, 39-56, 2017
52017
The system can't perform the operation now. Try again later.
Articles 1–20