Sang-Jae Moon
According to our database1,
Sang-Jae Moon
authored at least 89 papers
between 1998 and 2013.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2013
Int. J. Distributed Sens. Networks, 2013
Int. J. Ad Hoc Ubiquitous Comput., 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
2012
Multi-exponentiation algorithm based on binary GCD computation and its application to side-channel countermeasure.
J. Cryptogr. Eng., 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011
2010
J. Digit. Content Technol. its Appl., 2010
An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing.
Int. J. Netw. Secur., 2010
IEICE Trans. Inf. Syst., 2010
Secure Message Distribution Scheme with Configurable Privacy in Heterogeneous Wireless Sensor Networks.
IEICE Trans. Inf. Syst., 2010
On the Computational Sequence of Scalar Multiplication with Left-to-Right Recoded NAF and Sliding Window Technique.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Comput. Secur., 2010
Sci. China Inf. Sci., 2010
Sci. China Inf. Sci., 2010
Ad Hoc Sens. Wirel. Networks, 2010
Proceedings of the Prodeedings of the 2010 International Conference on Computational Science and Its Applications, 2010
2009
IEEE Trans. Wirel. Commun., 2009
Multi-path Protocol for High Data Confidentiality and Reliability in Wireless Sensor Networks Using Non-dominated Dynamic Compensation.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
2008
Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing.
EURASIP J. Wirel. Commun. Netw., 2008
Sci. China Ser. F Inf. Sci., 2008
Ad Hoc Sens. Wirel. Networks, 2008
Proceedings of the 1st ACM International Workshop on Heterogeneous Sensor and Actor Networks, 2008
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2008
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
CRMS: A Collusion-Resistant Matrix System for Group Key Management in Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the Computer Security, 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IACR Cryptol. ePrint Arch., 2007
Sci. China Ser. F Inf. Sci., 2007
Inefficiency of common-multiplicand multiplication and exponentiation algorithms by performing binary complements.
Appl. Math. Comput., 2007
Proceedings of the Information Security Applications, 8th International Workshop, 2007
Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP).
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007
Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol.
Proceedings of the Information Systems Security, Third International Conference, 2007
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Cryptanalysis on the Robust and Simple Authentication Protocol for Secure Communication on the Web.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Proceedings of the Computer and Information Sciences, 2006
Proceedings of the Ubiquitous Convergence Technology, First International Conference, 2006
Proceedings of the Fault Diagnosis and Tolerance in Cryptography, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Sci. China Ser. F Inf. Sci., 2005
Proceedings of the Trust, 2005
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves.
Proceedings of the Selected Areas in Cryptography, 12th International Workshop, 2005
Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption.
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005
How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes.
Proceedings of the Information Systems Security, First International Conference, 2005
Proceedings of the Information Systems Security, First International Conference, 2005
Proceedings of the Information Security and Cryptology, 2005
Proceedings of the High Performance Computing and Communications, 2005
Proceedings of the High Performance Computing and Communications, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Computational Science and Its Applications, 2004
Proceedings of the Computational Science and Its Applications, 2004
2003
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis.
IEEE Trans. Computers, 2003
Proceedings of the Computational Science and Its Applications, 2003
Proceedings of the Computational Science and Its Applications, 2003
Proceedings of the Applied Cryptography and Network Security, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
Proceedings of the Mobile Communications, 7th CDMA International Conference, CIC 2002, Seoul, Korea, October 29, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Proceedings of the Public Key Cryptography, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1999
Proceedings of the Information Security and Cryptology, 1999
1998
A Common-Multiplicand Method to the Montgomery Algorithm for Speeding up Exponentiation.
Inf. Process. Lett., 1998