Pil Joong Lee
According to our database1,
Pil Joong Lee
authored at least 85 papers
between 1985 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2017
IEICE Trans. Inf. Syst., 2017
2016
J. Commun. Networks, 2016
IEICE Trans. Inf. Syst., 2016
2014
Shared and Searchable Encrypted Data for Semi-trusted Servers with Controllable Sharing Property.
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Size-Efficient Digital Signatures with Appendix by Truncating Unnecessarily Long Hashcode.
Proceedings of the Security Standardisation Research - First International Conference, 2014
2013
IEEE Trans. Inf. Theory, 2013
Theor. Comput. Sci., 2013
IEICE Trans. Inf. Syst., 2013
IEICE Trans. Inf. Syst., 2013
2012
IEEE Trans. Wirel. Commun., 2012
IEEE Trans. Veh. Technol., 2012
IEICE Trans. Commun., 2012
IEICE Trans. Inf. Syst., 2012
2011
IEEE Trans. Wirel. Commun., 2011
On the average cost of order-preserving encryption based on hypergeometric distribution.
Inf. Process. Lett., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEEE Commun. Lett., 2011
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Proceedings of the Information Security Applications - 12th International Workshop, 2011
2010
IEICE Trans. Inf. Syst., 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the Topics in Cryptology, 2009
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System.
Proceedings of the Pairing-Based Cryptography, 2007
Proceedings of the Information Security and Cryptology, 2007
2006
Proceedings of the Information Security Practice and Experience, 2006
2005
IEICE Trans. Commun., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Timed-Release Encryption with Pre-open Capability and Its Application to Certified E-mail System.
Proceedings of the Information Security, 8th International Conference, 2005
2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science and Its Applications, 2004
Bit-Serial Multipliers for Exponentiation and Division in GF(2<sup>m</sup>) Using Irreducible AOP.
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Public Key Infrastructure, 2004
Proceedings of the Public Key Infrastructure, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Fast Scalar Multiplication Method Using Change-of-Basis Matrix to Prevent Power Analysis Attacks on Koblitz Curves.
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Cryptography and Coding, 2003
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2001
Proceedings of the Information Security and Cryptology, 2001
2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000), 2000
Fast Implementation of Elliptic Curve Defined over GF(<i>p</i><sup>m</sup>) on CalmRISC with MAC2424 Coprocessor.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000
1999
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999
1998
Speed-up of arithmetics in F<sub>p</sub><sup>m</sup> for elliptic curve cryptosystems.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998
Proceedings of the Advances in Cryptology, 1998
1997
Proceedings of the Advances in Cryptology, 1997
1996
Proceedings of the Security Protocols, 1996
1995
Several Practical Protocols for Authentication and Key Exchange.
Inf. Process. Lett., 1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Advances in Cryptology, 1995
1994
Proceedings of the Advances in Cryptology, 1994
1993
Proceedings of the Advances in Cryptology, 1993
1992
Proceedings of the Advances in Cryptology, 1992
1990
IEEE J. Sel. Areas Commun., 1990
Proceedings of the Advances in Cryptology, 1990
1989
IEEE Trans. Inf. Theory, 1989
1988
Constructions of rate (n-1)/n punctured convolutional codes with minimum required SNR criterion.
IEEE Trans. Commun., 1988
Proceedings of the Advances in Cryptology, 1988
1987
1985
IEEE Trans. Commun., 1985
Performance of a Normalized Energy Metric Without Jammer State Information for an FH/MFSK System in Worst Case Partial Band Jamming.
IEEE Trans. Commun., 1985