The SCEAS System
Navigation Menu

Search the dblp DataBase


Yongjin Yeom: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Daesung Kwon, Daewan Han, JooYoung Lee, Yongjin Yeom
    Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:262-270 [Conf]
  2. Jin Hong, Dong Hoon Lee, Yongjin Yeom, Daewan Han
    A New Class of Single Cycle T-Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:68-82 [Conf]
  3. Yongjin Yeom, Sangwoo Park, Iljun Kim
    On the Security of CAMELLIA against the Square Attack. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:89-99 [Conf]
  4. Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong
    New Block Cipher: ARIA. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:432-445 [Conf]
  5. Daewan Han, Myung-Hwan Kim, Yongjin Yeom
    Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:107-117 [Conf]

  6. Improved Impossible Differential Attacks on Large-Block Rijndael. [Citation Graph (, )][DBLP]

  7. High-Speed Implementations of Block Cipher ARIA Using Graphics Processing Units. [Citation Graph (, )][DBLP]

  8. Efficient RFID authentication protocols based on pseudorandom sequence generators. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002