|
Search the dblp DataBase
Daesung Kwon:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon
Key Recovery Attacks on NTRU without Ciphertext Validation Routine. [Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:274-284 [Conf]
- In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nahm, Nam-Seok Kwak, Yoo-Jin Baek
On the Security of MOR Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2004, pp:387-400 [Conf]
- Daesung Kwon, Daewan Han, JooYoung Lee, Yongjin Yeom
Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2006, pp:262-270 [Conf]
- Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim
New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:21-32 [Conf]
- Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong
New Block Cipher: ARIA. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:432-445 [Conf]
Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|