Publication List
The copyrights for journal and conference proceedings papers generally belong to the publisher of the journal or proceedings. All papers may be downloaded for personal or research purposes only. Also check my DBLP entry
- Public Key Encryption with Conjunctive Keyword Search and its Extension to a Multi-User System
by Yong Ho Hwang and Pil Joong Lee
Pairing-based Cryptography - Pairing 2007, LNCS, 2007 (to appear).
- Efficient Broadcast Encryption Scheme with Log-Key Storage
by Yong Ho Hwang and Pil Joong Lee
Financial Cryptography and Data Security - FC 2006, LNCS vol.4107, pp.281-295, 2006.
- Efficient Public Key Broadcast Encryption using Identifier of Receivers
by Jung Wook Lee, Yong Ho Hwang, and Pil Joong Lee
Information Security Practice and Experience Conference - ISPEC 2006, LNCS vol.3903, pp.153-164, 2006.
- Timed-Release Encryption with Pre-open Capability and Its application to Certified E-mail System
by Yong Ho Hwang, Dae Hyun Yum, and Pil Joong Lee
Information Security - ISC 2005, LNCS vol.3650, pp.344-358, 2005.
- Practical Pay-TV Scheme using Traitor Tracing Scheme for Multiple Channels
by Chong Hee Kim, Yong Ho Hwang, and Pil Joong Lee
WISA 2004, LNCS vol.3325, pp.265-279, 2004.
- System for Preventing Counterfeiting of Retail Items using RFID tags
by Sung Ho Yoo, Yong Ho Hwang, and Pil Joong Lee
Pre-proceeding of Workshop on Information Security Applications 2004, pp.593-604
- TTS without Revocation Capability Secure against CCA2
by Chong Hee Kim, Yong Ho Hwang, and Pil Joong Lee,
Information Security and Privacy - ACISP 2004, LNCS vol.3108, pp.36-49, 2004.
- An Efficient Revocation Scheme for Stateless Receivers
by Yong Ho Hwang, Chong Hee Kim, and Pil Joong Lee
Public Key Infrastructure - EuroPKI 2004, LNCS vol.3093, pp.322-334, 2004.
- Bit-Serial Multipliers for Exponentiation and Division in GF(2^m) using Irreducible AOP
by Yong Ho Hwang, Sang Gyoo Sim, and Pil Joong Lee
Computational Science and Its Applications - ICCSA 2004, LNCS vol.3043, pp.442-450, 2004.
- An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
by Chong Hee Kim, Yong Ho Hwang, and Pil Joong Lee
Advances in Cryptology - ASIACRYPT 2003, LNCS vol.2894, pp.359-373, 2003.
- EPA: An Efficient Password-based Protocol for Authenticated key exchange
by Yong Ho Hwang, Dae Hyun Yum, and Pil Joong Lee
Information Security and Privacy - ACISP 2003, LNCS vol.2727, pp.452-463, 2003.
- An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers
by Yong Ho Hwang, Chong Hee Kim, and Pil Joong Lee
Information Security and Privacy - ACISP 2003, LNCS vol.2727, pp.377-386, 2003.
|