Kee-Young YOO


Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/06/01
Vol. E95-D  No. 6  pp. 1687-1689
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
cryptanalysisauthenticationanonymitywireless communicationssecurity
 Summary | Full Text:PDF

On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/06/01
Vol. E95-D  No. 6  pp. 1684-1686
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
authenticationpasswordcryptanalysishash functionsmartcard
 Summary | Full Text:PDF

Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11  pp. 2167-2170
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
cryptanalysiskey agreementchaotic mapshash functionChebyshev map
 Summary | Full Text:PDF

Robust Authentication Scheme between User and Remote Autonomous Object in Telecommunications System
Eun-Jun YOON Il-Soo JEON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/05/01
Vol. E94-D  No. 5  pp. 1113-1116
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
network securityautonomous systemcryptographyauthenticationAES
 Summary | Full Text:PDF

Improvement of the Efficient Secret Broadcast Scheme
Eun-Jun YOON Muhammad KHURRAM KHAN Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/12/01
Vol. E93-D  No. 12  pp. 3396-3399
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
broadcasting networksecret broadcastbinding encryptionmessage consistencysecurity
 Summary | Full Text:PDF

Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing
Eun-Jun YOON Muhammad Khurram KHAN Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/12/01
Vol. E93-D  No. 12  pp. 3400-3402
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
handover authenticationchameleon hashingsecurityforward/backward secrecy
 Summary | Full Text:PDF

A Robust Security Mechanism for Mobile Commerce Transactions
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/11/01
Vol. E93-D  No. 11  pp. 2898-2906
Type of Manuscript:  Special Section PAPER (Special Section on Architectures, Protocols, and Applications for the Future Internet)
Category: 
Keyword: 
cryptographysecurity analysissecurity protocolmobile commerceWAPauthentication
 Summary | Full Text:PDF

A Biometric Authenticated Key Agreement Protocol for Secure Token
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/08/01
Vol. E93-D  No. 8  pp. 2311-2315
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
biometrictokenauthenticationpasswordsecurity
 Summary | Full Text:PDF

Off-Line Keyword Guessing Attacks on Searchable Encryption with Keyword-Recoverability
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/07/01
Vol. E93-D  No. 7  pp. 1995-1996
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
keyword searchkeyword-recoverabilitycryptanalysiskeyword guessing attacks
 Summary | Full Text:PDF

An Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/04/01
Vol. E93-A  No. 4  pp. 850-853
Type of Manuscript:  LETTER
Category: Reliability, Maintainability and Safety Analysis
Keyword: 
cryptographyauthenticationpasswordkey exchangecryptanalysis
 Summary | Full Text:PDF

Comments on Modified User Friendly Remote Authentication Scheme with Smart Cards
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/02/01
Vol. E90-B  No. 2  pp. 331-333
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
authenticationpassword guessing attacksmart cardefficiency
 Summary | Full Text:PDF

Cryptanalysis of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/06/01
Vol. E88-B  No. 6  pp. 2627-2628
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
key exchangepasswordguessing attackwireless network
 Summary | Full Text:PDF

Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards
Eun-Jun YOON Eun-Kyung RYU Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 319-321
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographypasswordauthenticationsecuritysmart card
 Summary | Full Text:PDF