Efficient ID-based group key agreement with bilinear maps KY Choi, JY Hwang, DH Lee International Workshop on Public Key Cryptography, 130-144, 2004 | 213 | 2004 |
Efficient certificateless signature schemes KY Choi, JH Park, JY Hwang, DH Lee Applied Cryptography and Network Security: 5th International Conference …, 2007 | 159 | 2007 |
A new provably secure certificateless short signature scheme KY Choi, JH Park, DH Lee Computers & Mathematics with Applications 61 (7), 1760-1768, 2011 | 109 | 2011 |
ID-based authenticated key agreement for low-power mobile devices KY Choi, JY Hwang, DH Lee, IS Seo Australasian Conference on Information Security and Privacy, 494-505, 2005 | 81 | 2005 |
Efficient certificateless proxy signature scheme with provable security SH Seo, KY Choi, JY Hwang, S Kim Information Sciences 188, 322-337, 2012 | 41 | 2012 |
Identity-based universal designated multi-verifiers signature schemes SH Seo, JY Hwang, KY Choi, DH Lee Computer Standards & Interfaces 30 (5), 288-295, 2008 | 39 | 2008 |
ID-based authenticated group key agreement secure against insider attacks KY Choi, JY Hwang, DH Lee IEICE Transactions on Fundamentals of Electronics, Communications and …, 2008 | 35 | 2008 |
WEM: A new family of white-box block ciphers based on the even-mansour construction J Cho, KY Choi, I Dinur, O Dunkelman, N Keller, D Moon, A Veidberg Cryptographers’ Track at the RSA Conference, 293-308, 2017 | 33 | 2017 |
Novel side-channel attacks on quasi-cyclic code-based cryptography BY Sim, J Kwon, KY Choi, J Cho, A Park, DG Han IACR Transactions on Cryptographic Hardware and Embedded Systems, 180-212, 2019 | 30 | 2019 |
Certificateless public key encryption in the selective-ID security model (without random oracles) JH Park, KY Choi, JY Hwang, DH Lee International Conference on Pairing-Based Cryptography, 60-82, 2007 | 29 | 2007 |
Anonymous and traceable communication using tamper-proof device for vehicular ad hoc networks BH Kim, KY Choi, JH Lee, DH Lee 2007 International Conference on Convergence Information Technology (ICCIT …, 2007 | 19 | 2007 |
Constructing efficient PAKE protocols from identity-based KEM/DEM KY Choi, J Cho, JY Hwang, T Kwon Information Security Applications: 16th International Workshop, WISA 2015 …, 2016 | 14 | 2016 |
Apparatus and method for data encryption KY Choi, J Cho, Y Hyo-Jin US Patent 9,515,821, 2016 | 11 | 2016 |
Authentication method between client and server, machine-readable storage medium, client and server B Kang, KY Choi, HS Kim, JE Eom, DH Lee, LEE Byeong-Rae US Patent 9,189,616, 2015 | 8 | 2015 |
System and method for communication between devices Y Hyo-Jin, KY Choi, DJ Moon, KY Kim, JH Ahn, J Cho US Patent 11,042,954, 2021 | 6 | 2021 |
Data encryption apparatus and method, and data decryption apparatus and method KY Choi, DJ Moon, J Cho US Patent App. 15/575,533, 2018 | 6 | 2018 |
Drm service provision apparatus and method, and content playback apparatus and method using drm service KY Choi, J Cho, DJ Moon US Patent App. 14/980,521, 2017 | 6 | 2017 |
Apparatus and method for encryption DJ Moon, J Cho, KY Choi, N Keller, O Dunkelman, I Dinur US Patent 10,491,374, 2019 | 5 | 2019 |
Apparatus and method for exchanging encryption key KY Choi, SY Lee, KY Kim, J Cho US Patent App. 15/140,632, 2017 | 5 | 2017 |
Security weakness in an authenticated group key agreement protocol in two rounds JY Hwang, KY Choi, DH Lee Computer communications 31 (15), 3719-3724, 2008 | 5 | 2008 |