The SCEAS System
Navigation Menu

Search the dblp DataBase


Daesung Kwon: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon
    Key Recovery Attacks on NTRU without Ciphertext Validation Routine. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:274-284 [Conf]
  2. In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nahm, Nam-Seok Kwak, Yoo-Jin Baek
    On the Security of MOR Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:387-400 [Conf]
  3. Daesung Kwon, Daewan Han, JooYoung Lee, Yongjin Yeom
    Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:262-270 [Conf]
  4. Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim
    New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:21-32 [Conf]
  5. Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong
    New Block Cipher: ARIA. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:432-445 [Conf]

  6. Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash. [Citation Graph (, )][DBLP]

Search in 0.003secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002