Name
Affiliation
Papers
DAE HYUN YUM
Pohang Univ Sci & Technol, Dept Elect & Elect Engn, Pohang 790784, Kyungbuk, South Korea
44
Collaborators
Citations 
PageRank 
28
315
24.95
Referers 
Referees 
References 
578
553
432
Search Limit
100578
Title
Citations
PageRank
Year
Finding the key length of a Vigenère cipher: How to improve the twist algorithm00.342020
On The Performance Analysis Of Sphincs+ Verification00.342019
A Visibility-Based Lower Bound For Android Unlock Patterns00.342017
Average-Case Analysis Of Certificate Revocation In Combinatorial Certificate Management Schemes00.342016
A Visibility-Based Upper Bound For Android Unlock Patterns00.342016
Mathematical Analysis Of Secrecy Amplification In Key Infection00.342016
On The Probability Of Certificate Revocation In Combinatorial Certificate Management Schemes10.412015
Randomized Certificate Replacement With Bounded Collateral Damage00.342015
Unilateral Distance Bounding Protocol With Bidirectional Challenges00.342013
Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles70.442013
Secure And Lightweight Localization Method For Wireless Sensor Networks20.362013
Comments on “Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption”20.392013
Lightweight Distance Bounding Protocol Against Relay Attacks40.412012
Exact Formulae for Resilience in Random Key Predistribution Schemes20.362012
A Hybrid Sonar Algorithm for Submersible Cars to Verify the Location of Senders.00.342012
Security Condition For Exact Localization In Wireless Ad Hoc Networks00.342012
Sanitizable Signatures Reconsidered10.362011
On the average cost of order-preserving encryption based on hypergeometric distribution00.342011
Fast Verification Of Hash Chains With Reduced Storage10.372011
Lightweight One-Time Signature For Short Messages00.342011
Distance Bounding Protocol with Adjustable False Acceptance Rate110.602011
Order-Preserving encryption for non-uniformly distributed plaintexts120.642011
Energy-Efficient Hash Chain Traversal20.382011
Distance Bounding Protocol for Mutual Authentication140.812011
On fast verification of hash chains20.392010
Generalized Hash Chain Traversal With Selective Output10.362010
Trapdoor sanitizable signatures made easy80.452010
Detecting Ringing-Based DoS Attacks on VoIP Proxy Servers00.342009
Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity100.602009
Cracking Hill Ciphers with Goodness-of-Fit Statistics20.532009
Invisibly Sanitizable Signature Without Pairings00.342009
Efficient Fair Exchange from Identity-Based Signature60.472008
Security Analysis of Yeh-Tsai Security Mechanism00.342008
New Multiparty Signature Schemes for Network Routing Applications81.402008
Optimistic fair exchange in a multi-user setting280.792008
Generalized Combinatoric Accumulator20.372008
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing682.202007
Security Analysis of Zhu-Bao's Verifiably Committed Signature10.352007
Time Capsule Signature80.522005
Cryptanalysis Of Yeh-Shen-Hwang'S One-Time Password Authentication Scheme40.542005
Timed-release encryption with pre-open capability and its application to certified e-mail system271.272005
Identity-Based Cryptography in Public Key Management321.832004
EPA: an efficient password-based protocol for authenticated key exchange90.672003
New Signcryption Schemes Based on KCDSA401.602001