Minkyu KIM

Comment on the Security of an Order-Preserving Encryption Scheme Using Pseudo-Random Function
Minkyu KIM Je HONG PARK Dongyoung ROH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2016/09/01
Vol. E99-B  No. 9  pp. 2108-2111
Type of Manuscript:  WRITTEN DISCUSSION
Category: Fundamental Theories for Communications
order-preserving encryptionPOPF-CCA security
 Summary | Full Text:PDF(63.9KB)

Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption
Minkyu KIM Atsushi FUJIOKA Berkant USTAOLU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 29-39
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
authenticated key exchangeeCK modelNAXOS' approachtrapdoor test
 Summary | Full Text:PDF(358.4KB)