If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Jong In Lim is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

Mathematics

Attack
Differential Cryptanalysis
Block Cipher
Linear Cryptanalysis
Countermeasures
Signature Scheme
Password
Public-key Cryptosystem
Provable Security
Side Channel Attacks
Block Ciphers
Galois field
Multiplication
Multiplier
Exponentiation
Modes of Operation
Security Analysis
Encryption
Authenticated Key Exchange
Differential Power Analysis
Normal Basis
Watermarking
Exhaustive Search
Signature
S-box
Group Signature
Sensor Networks
Hash Function
Power Analysis
Hardware Architecture
Privacy
Smart Card
Keyword Search
Key Exchange
Delegation
Key Management
Authentication
Identity-based
Rijndael
Cryptanalysis
Watermark
Elliptic Curves
Vulnerability
Pairing-based Cryptosystems
Steganography
Signed
Doubling
Permutation
Anonymity
Pairing

Engineering & Materials Science

Cryptography
Authentication
Wireless networks
Smart cards
Sensor networks
Network protocols
Steganography
Data storage equipment
Internet
Watermarking
Hash functions
Communication
Multimedia services
Wireless sensor networks
Hardware
Intrusion detection
Servers
Electronic document identification systems
Sensor nodes
Substitution reactions
Intelligent systems
Radio frequency identification (RFID)
Interoperability
Industry
Costs
Glossaries
Electricity
Artificial intelligence
Critical infrastructures
Polynomials
Information systems
Access control
Concretes
Boolean functions
Elliptic filters
Linear transformations
Telecommunication networks
Public key cryptography
Side channel attack
Nuclear weapons
Computer systems
Quantum cryptography
Composite materials
Demolition
Computer hardware
Crime
Bit error rate
Security of data
Gateways (computer networks)
Wireless local area networks (WLAN)