Linear-complexity private set intersection protocols secure in malicious model E De Cristofaro, J Kim, G Tsudik International Conference on the Theory and Application of Cryptology and …, 2010 | 281 | 2010 |
SRDP: Secure route discovery for dynamic source routing in MANETs J Kim, G Tsudik Ad Hoc Networks 7 (6), 1097-1109, 2009 | 65 | 2009 |
Privacy-preserving policy-based information transfer E De Cristofaro, S Jarecki, J Kim, G Tsudik Privacy Enhancing Technologies: 9th International Symposium, PETS 2009 …, 2009 | 65 | 2009 |
Beyond secret handshakes: Affiliation-hiding authenticated key exchange S Jarecki, J Kim, G Tsudik Topics in Cryptology–CT-RSA 2008: The Cryptographers’ Track at the RSA …, 2008 | 61 | 2008 |
Srdp: Securing route discovery in dsr J Kim, G Tsudik The Second Annual International Conference on Mobile and Ubiquitous Systems …, 2005 | 54 | 2005 |
Flexible robust group key agreement S Jarecki, J Kim, G Tsudik IEEE Transactions on Parallel and Distributed Systems 22 (5), 879-886, 2010 | 45 | 2010 |
Group secret handshakes or affiliation-hiding authenticated group key agreement S Jarecki, J Kim, G Tsudik Topics in Cryptology–CT-RSA 2007: The Cryptographers’ Track at the RSA …, 2006 | 42 | 2006 |
Authentication for paranoids: Multi-party secret handshakes S Jarecki, J Kim, G Tsudik Applied Cryptography and Network Security: 4th International Conference …, 2006 | 37 | 2006 |
Constant-round privacy preserving multiset union J Hong, JW Kim, J Kim, K Park, JH Cheon Cryptology ePrint Archive, 2011 | 32 | 2011 |
Secure acknowledgment aggregation and multisignatures with limited robustness C Castelluccia, S Jarecki, J Kim, G Tsudik Computer Networks 50 (10), 1639-1652, 2006 | 22 | 2006 |
Robust group key agreement using short broadcasts S Jarecki, J Kim, G Tsudik Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 21 | 2007 |
Sims: Self sovereign identity management system with preserving privacy in blockchain J Lee, J Hwang, J Choi, H Oh, J Kim Cryptology ePrint Archive, 2019 | 19 | 2019 |
Simulation-extractable zk-SNARK with a single verification J Kim, J Lee, H Oh IEEE Access 8, 156569-156581, 2020 | 17 | 2020 |
Threshold signature schemes for ElGamal variants S Kim, J Kim, JH Cheon, S Ju Computer Standards & Interfaces 33 (4), 432-437, 2011 | 17 | 2011 |
FAS: Forward secure sequential aggregate signatures for secure logging J Kim, H Oh Information Sciences 471, 115-131, 2019 | 14 | 2019 |
A robust multisignature scheme with applications to acknowledgement aggregation C Castelluccia, S Jarecki, J Kim, G Tsudik Security in Communication Networks: 4th International Conference, SCN 2004 …, 2005 | 14 | 2005 |
Forward-secure ID based digital signature scheme with forward-secure private key generator H Oh, J Kim, JS Shin Information Sciences 454, 96-109, 2018 | 12 | 2018 |
Scalable wildcarded identity-based encryption J Kim, S Lee, J Lee, H Oh Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 10 | 2018 |
Compress multiple ciphertexts using ElGamal encryption schemes M Kim, J Kim, JH Cheon Cryptology ePrint Archive, 2012 | 10 | 2012 |
Survival in the wild: Robust group key agreement in wide-area networks J Kim, G Tsudik Information Security and Cryptology–ICISC 2008: 11th International …, 2009 | 10 | 2009 |