scispace - formally typeset
S

Seungjoo Kim

Researcher at Sungkyunkwan University

Publications -  278
Citations -  4334

Seungjoo Kim is an academic researcher from Sungkyunkwan University. The author has contributed to research in topics: Cancer & Password. The author has an hindex of 31, co-authored 272 publications receiving 4065 citations. Previous affiliations of Seungjoo Kim include Center for Information Security Technologies & Korea University.

Papers
More filters
Book ChapterDOI

Proxy signatures, Revisited

TL;DR: Two new types of digital proxy signatures called partial delegation with warrant and threshold delegation are presented, which combines the benefit of Mambo's partial delegation and Neuman's delegation by warrant and the proxy signer's power to sign messages is shared.
Book ChapterDOI

Challenge-eesponse based RFID authentication protocol for distributed database environment

TL;DR: A more secure and effective authentication protocol to protect user's privacy is proposed based on Challenge-Response using one-way hash function and random number and fitted for distributed database environment.
Book ChapterDOI

A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack

TL;DR: A new type of safe-error based hardware fault cryptanalysis is demonstrated which is mounted on a recently reported countermeasure against simple power analysis attack and it is emphasized that acountermeasure developed against one physical attack if not carefully examined may benefit another physical attack tremendously.
Journal ArticleDOI

RSA speedup with Chinese remainder theorem immune against hardware fault cryptanalysis

TL;DR: This article considers the problem of how to prevent RSA signature and decryption computation with a residue number system (CRT-based approach) speedup from a hardware fault cryptanalysis in a highly reliable and efficient approach and proposes two novel protocols that have comparable performance to Shamir's scheme.
Book ChapterDOI

WIPI mobile platform with secure service for mobile RFID network environment

TL;DR: A light-weight security mechanism which is constructed by mobile RFID security mechanism based on WIPI (Wireless Internet Platform for Interoperability) can be applicable to various mobile RFIDs services that required secure business applications in mobile environment.