Seungjoo KIM


Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards
Junghyun NAM Seungjoo KIM Sangjoon PARK Dongho WON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 299-302
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
distributed systemauthentication schemepasswordsmart cardparallel session attackdenial of service attack
 Summary | Full Text:PDF(98.6KB)

Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol
Yunho LEE Seungjoo KIM Dongho WON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/07/01
Vol. E89-A  No. 7  pp. 2084-2087
Type of Manuscript:  LETTER
Category: Digital Signal Processing
Keyword: 
fingerprintinganonymous buyer-seller protocolwatermarkingman-in-the-middle attack
 Summary | Full Text:PDF(274.1KB)

Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords
Junghyun NAM Seungjoo KIM Dongho WON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 209-212
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Protocol
Keyword: 
three-party key agreementpasswordverifier
 Summary | Full Text:PDF(139KB)

Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme
Junghyun NAM Seungjoo KIM Dongho WON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 213-218
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Protocol
Keyword: 
conference key distributionimplicit key authenticationparallel session attack
 Summary | Full Text:PDF(259.5KB)

On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks
Seungjoo KIM Masahiro MAMBO Takeshi OKAMOTO Hiroki SHIZUYA Mitsuru TADA Dongho WON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 231-238
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Okamoto-Tanaka key exchange schemeID-based schemeactive attackknown-key attackforward secrecy
 Summary | Full Text:PDF(288.5KB)