|
Search the dblp DataBase
Daewan Han:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon
Key Recovery Attacks on NTRU without Ciphertext Validation Routine. [Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:274-284 [Conf]
- Daesung Kwon, Daewan Han, JooYoung Lee, Yongjin Yeom
Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2006, pp:262-270 [Conf]
- Jin Hong, Dong Hoon Lee, Yongjin Yeom, Daewan Han
A New Class of Single Cycle T-Functions. [Citation Graph (0, 0)][DBLP] FSE, 2005, pp:68-82 [Conf]
- Daewan Han, Sangwoo Park, Seongtaek Chee
Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:252-262 [Conf]
- Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong
New Block Cipher: ARIA. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:432-445 [Conf]
- Sang Cheol Hwang, Dong Hoon Lee, Daewan Han, Jae-Cheol Ryou
Vulnerability of a Mobile Payment System Proposed at WISA 2002. [Citation Graph (0, 0)][DBLP] WISA, 2004, pp:278-285 [Conf]
- Daewan Han, Moonsik Lee
An algebraic attack on the improved summation generator with 2-bit memory. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2005, v:93, n:1, pp:43-46 [Journal]
- Daewan Han, Myung-Hwan Kim, Yongjin Yeom
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2007, pp:107-117 [Conf]
Search in 0.001secs, Finished in 0.002secs
|