The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jin Hong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon
    Key Recovery Attacks on NTRU without Ciphertext Validation Routine. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:274-284 [Conf]
  2. Jin Hong, Palash Sarkar
    New Applications of Time Memory Data Tradeoffs. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:353-372 [Conf]
  3. Jin Hong, Dong Hoon Lee, Yongjin Yeom, Daewan Han
    A New Class of Single Cycle T-Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:68-82 [Conf]
  4. Jin Hong, Dong Hoon Lee, Seongtaek Chee, Palash Sarkar
    Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:193-209 [Conf]
  5. Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, Dukjae Moon
    Algebraic Attacks on Summation Generators. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:34-48 [Conf]
  6. Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong
    New Block Cipher: ARIA. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:432-445 [Conf]
  7. Jin Hong
    Period of Streamcipher Edon80. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:23-34 [Conf]
  8. Jin Hong, Woo-Hwan Kim
    TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:169-182 [Conf]
  9. Jin Hong, Dong Hyun Jeong, Christopher D. Shaw, William Ribarsky, Mark Borodovsky, Chang Geun Song
    GVis: A Scalable Visualization Framework for Genomic Data. [Citation Graph (0, 0)][DBLP]
    EuroVis, 2005, pp:191-198 [Conf]

  10. Speeding Up the Pollard Rho Method on Prime Fields. [Citation Graph (, )][DBLP]


  11. Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs. [Citation Graph (, )][DBLP]


  12. Subset-Restricted Random Walks for Pollard rho Method on Fpm. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002