Seongan Lim
Orcid: 0000-0002-1192-6672
According to our database1,
Seongan Lim
authored at least 39 papers
between 2000 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Fundam. Informaticae, 2022
2021
Discret. Appl. Math., 2021
2020
Fundam. Informaticae, 2020
Discret. Appl. Math., 2020
2019
Electron. Notes Discret. Math., 2019
2018
Secur. Commun. Networks, 2018
Proceedings of the Information Security Theory and Practice, 2018
Proceedings of the International Conference on Software Security and Assurance, 2018
2017
Secur. Commun. Networks, 2017
Finite Fields Their Appl., 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017
2016
Discret. Appl. Math., 2016
2014
Equivalent public keys and a key substitution attack on the schemes from vector decomposition.
Secur. Commun. Networks, 2014
Fundam. Informaticae, 2014
2013
Secur. Commun. Networks, 2013
2012
2011
Informatica, 2011
Int. J. Netw. Secur., 2011
2009
Int. J. Netw. Secur., 2009
Comput. Stand. Interfaces, 2009
2007
Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
2004
Proceedings of the Computational Science and Its Applications, 2004
2003
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis.
IEEE Trans. Computers, 2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003
Proceedings of the Progress in Cryptology, 2003
2002
Proceedings of the Selected Areas in Cryptography, 2002
2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Progress in Cryptology, 2001
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).
Proceedings of the Cryptography and Coding, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Information Security and Cryptology, 2001
2000
A Generalized Takagi-Cryptosystem with a modulus of the form <i>p<sup>r</sup>q<sup>s</sup></i>.
Proceedings of the Progress in Cryptology, 2000