Cryptographers' World
 

Pil Joong Lee


Author's Web Page Link

17 papers in database with 756 citations StarStar

Editor of 1 conference proceedings book

H-number: 12

Conference Proceedings

 
1. Pil Joong Lee, editor, Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings. Springer, 2004. ISBN 3-540-23975-8.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Yevgeniy Dodis,  Pil Joong Lee,  Dae Hyun Yum,  Optimistic Fair Exchange in a Multi-user Setting, pp. 118 - 133, PKC 2007.

[Electronic Edition][Cited 17 times ]

2. Yong Ho Hwang,  Pil Joong Lee,  Efficient Broadcast Encryption Scheme with Log-Key Storage, pp. 281 - 295, FC 2006.

[Electronic Edition][Cited 4 times ]

3. Chong Hee Kim,  Yong Ho Hwang,  Pil Joong Lee,  An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack, pp. 359 - 373, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 20 times ]

4. Chong Hee Kim,  Pil Joong Lee,  New Key Recovery in WAKE Protocol, pp. 325 - 338, PKC 2001.

[Electronic Edition][Cited 4 times ]

5. Nan Kyoung Park,  Joon Ho Hwang,  Pil Joong Lee,  HAS-V: A New Hash Function with Variable Output Length, pp. 202 - 216, SAC 2000.

[Electronic Edition][Cited 18 times ]

6. Jaewook Chung,  Sang Gyoo Sim,  Pil Joong Lee,  Fast Implementation of Elliptic Curve Defined over GF(, pp. 57 - 70, CHES 2000.

[Electronic Edition][Cited 39 times ]

7. Pil Joong Lee,  Eun Jeong Lee,  Yong Duk Kim,  How to Implement Cost-Effective and Secure Public Key Cryptosystems, pp. 73 - 79, CHES 1999.

[Electronic Edition][Cited 5 times ]

8. Chae Hoon Lim,  Pil Joong Lee,  A Study on the Proposed Korean Digital Signature Algorithm, pp. 175 - 186, ASIACRYPT 1998.

[Electronic Edition][Cited 21 times ]

9. Chae Hoon Lim,  Pil Joong Lee,  A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroup, pp. 249 - 263, CRYPTO 1997.

[Electronic Edition][Cited 112 times Red StarRed Star]

10. Chae Hoon Lim,  Pil Joong Lee,  Security and Performance of Server-Aided RSA Computation Protocols, pp. 70 - 83, CRYPTO 1995.

[Electronic Edition][Cited 47 times ]

11. Chae Hoon Lim,  Pil Joong Lee,  Server (Prover/Signer)-Aided Verification of Identity Proofs and Signatures, pp. 64 - 78, EUROCRYPT 1995.

[Electronic Edition][Cited 12 times ]

12. Chae Hoon Lim,  Pil Joong Lee,  More Flexible Exponentiation with Precomputation, pp. 95 - 107, CRYPTO 1994.

[Electronic Edition][Cited 232 times Red StarRed Star]

13. Chae Hoon Lim,  Pil Joong Lee,  Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks, pp. 420 - 434, CRYPTO 1993.

[Electronic Edition][Cited 36 times ]

14. Chae Hoon Lim,  Pil Joong Lee,  Modified Maurer-Yacobi`s scheme and its applications, pp. 308 - 323, ASIACRYPT 1992.

[Electronic Edition][Cited 51 times Red Star]

15. Pil Joong Lee,  Secure User Access Control for Public Networks, pp. 46 - 57, ASIACRYPT 1990.

[Electronic Edition][Cited 5 times ]

16. Pil Joong Lee,  Ernest F. Brickell,  An Observation on the Security of McEliece's Public-Key Cryptosystem, pp. 275 - 280, EUROCRYPT 1988.

[Electronic Edition][Cited 107 times Red StarRed Star]

17. Ernest F. Brickell,  Pil Joong Lee,  Yacov Yacobi,  Secure Audio Teleconference, pp. 418 - 426, CRYPTO 1987.

[Electronic Edition][Cited 26 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...