J
Jongin Lim
Researcher at Korea University
Publications - 189
Citations - 3800
Jongin Lim is an academic researcher from Korea University. The author has contributed to research in topics: Block cipher & Encryption. The author has an hindex of 26, co-authored 189 publications receiving 3605 citations. Previous affiliations of Jongin Lim include Electronics and Telecommunications Research Institute & Center for Information Security Technologies.
Papers
More filters
Book ChapterDOI
HIGHT: a new block cipher suitable for low-resource device
Deukjo Hong,Jaechul Sung,Seokhie Hong,Jongin Lim,Sangjin Lee,Bon-Seok Koo,Changhoon Lee,Donghoon Chang,Jesang Lee,Kitae Jeong,Hyun Kim,Jongsung Kim,Seongtaek Chee +12 more
TL;DR: This paper proposes a new block cipher HIGHT with 64-bit block length and 128-bit key length, which provides low-resource hardware implementation, which is proper to ubiquitous computing device such as a sensor in USN or a RFID tag.
Journal ArticleDOI
Quantum direct communication with authentication
TL;DR: Two quantum direct communication protocols with user authentication so that Alice can directly send a secret message to Bob without any previously shared secret using the remaining GHZ states after authentication.
Book ChapterDOI
Efficient authentication for low-cost RFID systems
TL;DR: An authentication protocol, LCAP, which needs only two one-way hash function operations and hence is quite efficient, especially for low-cost RFID systems, which have much restrictions in limited computing power, low die-size, and low power requirements.
Journal ArticleDOI
Arbitrated quantum signature scheme with message recovery
TL;DR: Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed, one of which uses a public board and the other does not.
BookDOI
Information Security and Cryptology - ICISC 2003
Jongin Lim,Dong-Hoon Lee +1 more
TL;DR: This survey presents the basic definitions of BTE and also highlights some recent applications of B TE to forward-secure encryption, identitybased and hierarchical identity-based encryption, chosen-ciphertext security, and adaptively- secure encryption.