Je Hong Park

Orcid: 0000-0002-6662-919X

According to our database1, Je Hong Park authored at least 36 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Security weakness of a certificate-based proxy signature scheme for IIoT environments.
Inf. Process. Lett., January, 2024

Comments on "A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs".
IEEE Access, 2024

Comments on "Certificateless Short Aggregate Signature Scheme for Mobile Devices".
IEEE Access, 2024

2019
Complete Addition Law for Montgomery Curves.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

2017
The ARIA Algorithm and Its Use with the Secure Real-Time Transport Protocol (SRTP).
RFC, October, 2017

Security of Stateful Order-Preserving Encryption.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Comment on the Security of an Order-Preserving Encryption Scheme Using Pseudo-Random Function.
IEICE Trans. Commun., 2016

2013
Security Weakness in the Smart Grid Key Distribution Scheme Proposed by Xia and Wang.
IEEE Trans. Smart Grid, 2013

2012
A Simple Variant of the Merkle-Damgård Scheme with a Permutation.
J. Cryptol., 2012

2011
Addition of the ARIA Cipher Suites to Transport Layer Security (TLS).
RFC, April, 2011

Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

On Lai-Massey and quasi-Feistel ciphers.
Des. Codes Cryptogr., 2011

2010
Preimage resistance of LPmkr with r=m-1.
Inf. Process. Lett., 2010

2009
Adaptive Preimage Resistance and Permutation-based Hash Functions.
IACR Cryptol. ePrint Arch., 2009

2008
Security Analysis of a Variant of Self-Shrinking Generator.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Powered Tate Pairing Computation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption.
IACR Cryptol. ePrint Arch., 2008

Improved Impossible Differential Attacks on Large-Block Rijndael.
Proceedings of the Information Security, 11th International Conference, 2008

2007
On the Security of Status Certificate-Based Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Lai-Massey Scheme and Quasi-Feistel Networks.
IACR Cryptol. ePrint Arch., 2007

Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006.
IACR Cryptol. ePrint Arch., 2007

Security Analysis of the Certificateless Signature Scheme Proposed at SecUbiq 2006.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

2006
On the relationship between squared pairings and plain pairings.
Inf. Process. Lett., 2006

An attack on the certificateless signature scheme from EUC Workshops 2006.
IACR Cryptol. ePrint Arch., 2006

2005
Is it possible to have CBE from CL-PKE?
IACR Cryptol. ePrint Arch., 2005

Efficient Delegation of Pairing Computation.
IACR Cryptol. ePrint Arch., 2005

Cryptanalysis of Zhou et al.'s proxy-protected signature schemes.
Appl. Math. Comput., 2005

Security of Lu et al.'s proxy-protected signature scheme.
Appl. Math. Comput., 2005

A note on digital signature scheme using a self-pairing map.
Appl. Math. Comput., 2005

Cryptanalysis of Some Group-Oriented Proxy Signature Schemes.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

2004
A New Forward Secure Signature Scheme.
IACR Cryptol. ePrint Arch., 2004

A Certificate-Based Signature Scheme.
Proceedings of the Topics in Cryptology, 2004

2003
Complexity of the generalized conjugacy problem.
Discret. Appl. Math., 2003

Cryptanalysis of the Public-Key Encryption Based on Braid Groups.
Proceedings of the Advances in Cryptology, 2003

2002
Fast Elliptic Curve Point Counting Using Gaussian Normal Basis.
Proceedings of the Algorithmic Number Theory, 5th International Symposium, 2002


  Loading...