The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sangjin Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee, Hyungjin Yang
    A Practical Approach Defeating Blackmailing. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:464-481 [Conf]
  2. Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong
    The Related-Key Rectangle Attack - Application to SHACAL-1. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:123-136 [Conf]
  3. Youngdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee
    Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:137-148 [Conf]
  4. Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee
    Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:421-431 [Conf]
  5. Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai
    Pseudorandomness of SPN-Type Transformations. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:212-223 [Conf]
  6. YongSup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee
    Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:110-122 [Conf]
  7. Heajoung Yoo, Seokhie Hong, Sangjin Lee, Jong In Lim, Okyeon Yi, Maenghee Sung
    A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:41-48 [Conf]
  8. Jaechul Sung, Deukjo Hong, Sangjin Lee
    Key Recovery Attacks on the RMAC, TMAC, and IACBC. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:265-273 [Conf]
  9. Jong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, Laurence Tianruo Yang
    Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. [Citation Graph (0, 0)][DBLP]
    AINA, 2007, pp:311-316 [Conf]
  10. Jae Choon Cha, Ki Hyoung Ko, Sangjin Lee, Jae Woo Han, Jung Hee Cheon
    An Efficient Implementation of Braid Groups. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:144-156 [Conf]
  11. Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yung
    Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:283-298 [Conf]
  12. Seongtaek Chee, Sangjin Lee, Kwangjo Kim
    Semi-bent Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:107-118 [Conf]
  13. Seongtaek Chee, Sangjin Lee, Daiki Lee, Soo Hak Sung
    On the Correlation Immune Functions and Their Nonlinearity. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:232-243 [Conf]
  14. Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seokwon Jung
    Amplified Boomerang Attack against Reduced-Round SHACAL. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:243-253 [Conf]
  15. Deukjo Hong, Bart Preneel, Sangjin Lee
    Higher Order Universal One-Way Hash Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:201-213 [Conf]
  16. Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi
    Known-IV Attacks on Triple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:208-221 [Conf]
  17. Wonil Lee, Donghoon Chang, Sangjin Lee, Soo Hak Sung, Mridul Nandi
    New Parallel Domain Extenders for UOWHF. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:208-227 [Conf]
  18. Sangjin Lee, Seongtaek Chee, Sangjoon Park, Sung-Mo Park
    Conditional Correlation Attack on Nonlinear Filter Generators. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:360-367 [Conf]
  19. Jaechul Sung, Sangjin Lee, Jong In Lim, Seokhie Hong, Sangjoon Park
    Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:274-288 [Conf]
  20. Yongdae Kim, Sangjin Lee, Choonsik Park
    On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1996, pp:- [Conf]
  21. Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee
    HIGHT: A New Block Cipher Suitable for Low-Resource Device. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:46-59 [Conf]
  22. Jong Hyuk Park, Jun Choi, Sangjin Lee, Hye-Ung Park, Deok-Gyu Lee
    User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home. [Citation Graph (0, 0)][DBLP]
    CIS (1), 2005, pp:313-320 [Conf]
  23. Kwangsoo Lee, Changho Jung, Sangjin Lee, HyungJun Kim, Jongin Lim
    Applying LR Cube Analysis to JSteg Detection. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2005, pp:275-276 [Conf]
  24. Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo Han, Ju-Sung Kang, Choonsik Park
    New Public-Key Cryptosystem Using Braid Groups. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:166-183 [Conf]
  25. Eonkyung Lee, Sangjin Lee, Sang Geun Hahn
    Pseudorandomness from Braid Groups. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:486-502 [Conf]
  26. Sangjoon Park, Sangjin Lee, Seung-Cheol Goh
    On the Security of the Gollmann Cascades. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:148-156 [Conf]
  27. Jong Hyuk Park, Sangjin Lee, Sung Hee Hong
    C-iUMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:660-670 [Conf]
  28. Sangjin Lee, Eonkyung Lee
    Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:14-28 [Conf]
  29. Seokhie Hong, Jongsung Kim, Sangjin Lee, Bart Preneel
    Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:368-383 [Conf]
  30. Seokhie Hong, Sangjin Lee, Jongin Lim, Jaechul Sung, Dong Hyeon Cheon, Inho Cho
    Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:273-283 [Conf]
  31. Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim
    Impossible Differential Cryptanalysis of Zodiac. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:300-311 [Conf]
  32. Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim
    Saturation Attacks on Reduced Round Skipjack. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:100-111 [Conf]
  33. Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee, Ju-Sung Kang
    Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:299-316 [Conf]
  34. Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, Jongin Lim
    Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:49-60 [Conf]
  35. Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee
    Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:243-254 [Conf]
  36. Sangwoo Park, Soo Hak Sung, Sangjin Lee, Jongin Lim
    Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:247-260 [Conf]
  37. Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon, Sungtaek Chee
    A New Dedicated 256-Bit Hash Function: FORK-256. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:195-209 [Conf]
  38. Jong Hyuk Park, Sangjin Lee, Yeog Kim, Byoung-Soo Koh
    Design and Implementation of the IMS-IPMP System in Convergence Home-Network Environment. [Citation Graph (0, 0)][DBLP]
    ICADL, 2005, pp:465-466 [Conf]
  39. Jaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee, Jongin Lim
    Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:567-576 [Conf]
  40. Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim
    Color Cube Analysis for Detection of LSB Steganography in RGB Color Images. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:537-546 [Conf]
  41. Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee
    Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:446-455 [Conf]
  42. Jong Hyuk Park, Sangjin Lee, Byoung-Soo Koh
    A Flexible DRM System Considering Ubiquitous Environment. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:236-244 [Conf]
  43. Jong Hyuk Park, Jungsuk Song, Sangjin Lee, Byoung-Soo Koh, In-Hwa Hong
    User Centric Intelligent IPMPS in Ubi-Home. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:245-254 [Conf]
  44. Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee
    On the Security of Encryption Modes of MD4, MD5 and HAVAL. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:147-158 [Conf]
  45. Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, Jongin Lim
    A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:456-468 [Conf]
  46. Ju-Sung Kang, Choonsik Park, Sangjin Lee, Jong In Lim
    On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:38-52 [Conf]
  47. Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim
    On Security Notions for Steganalysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:440-454 [Conf]
  48. Jongsung Kim, Seokhie Hong, Sangjin Lee, Jung Hwan Song, Hyungjin Yang
    Truncated Differential Attacks on 8-Round CRYPTON. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:446-456 [Conf]
  49. Dong Hyeon Cheon, Seokhie Hong, Sangjin Lee, Sung Jae Lee, Kyung Hwan Park, Seonhee Yoon
    Difference Distribution Attack on DONUT and Improved DONUT. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:37-48 [Conf]
  50. Bonseok Koo, Dongwook Lee, Gwonho Ryu, TaeJoo Chang, Sangjin Lee
    High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:81-93 [Conf]
  51. Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong
    New Block Cipher: ARIA. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:432-445 [Conf]
  52. Seonhee Lee, Seokhie Hong, Sangjin Lee, Jongin Lim, Seonhee Yoon
    Truncated Differential Cryptanalysis of Camellia. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:32-38 [Conf]
  53. Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong
    Padding Oracle Attacks on Multiple Modes of Operation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:343-351 [Conf]
  54. Wonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee
    On the Pseudorandomness of a Modification of KASUMI Type Permutations. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:313-329 [Conf]
  55. Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee
    Differential Cryptanalysis of TEA and XTEA. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:402-417 [Conf]
  56. Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee, Jongin Lim
    Off-Line Authentication Using Watermarks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:200-213 [Conf]
  57. Jaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi
    Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:103-113 [Conf]
  58. Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim
    New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:312-326 [Conf]
  59. Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon
    Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:201-219 [Conf]
  60. Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee
    Impossible Differential Attack on 30-Round SHACAL-2. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:97-106 [Conf]
  61. Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee
    How to Construct Universal One-Way Hash Functions of Order r. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:63-76 [Conf]
  62. Jongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee
    Impossible Differential Cryptanalysis for Block Cipher Structures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:82-96 [Conf]
  63. Jongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, Jung Hwan Song
    Related-Key Attacks on Reduced Rounds of SHACAL-2. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:175-190 [Conf]
  64. Youngdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee
    Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:191-205 [Conf]
  65. Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee, Soo Hak Sung
    Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:328-342 [Conf]
  66. Dong Hyeon Cheon, Sangjin Lee, Jong In Lim, Sung Jae Lee
    New Block Cipher DONUT Using Pairwise Perfect Decorrelation. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:262-270 [Conf]
  67. Taeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim
    Covert Channel Detection in the ICMP Payload Using Support Vector Machine. [Citation Graph (0, 0)][DBLP]
    ISCIS, 2003, pp:828-835 [Conf]
  68. Hyejoung Yoo, Hyungwoo Lee, Sangjin Lee, Jongin Lim
    Designated Verification of Non-invertible Watermark. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:338-351 [Conf]
  69. Kisik Chang, Robert H. Deng, Feng Bao, Sangjin Lee, HyungJun Kim
    On Security Notions of Steganographic Systems. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:137-151 [Conf]
  70. Kisik Chang, Changho Jung, Sangjin Lee, Wooil Yang
    High Quality Perceptual Steganographic Techniques. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:518-531 [Conf]
  71. Kwangsoo Lee, Andreas Westfeld, Sangjin Lee
    Category Attack for LSB Steganalysis of JPEG Images. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:35-48 [Conf]
  72. Hwajong Oh, Kwangsoo Lee, Sangjin Lee
    Attack on JPEG2000 Steganography Using LRCA. [Citation Graph (0, 0)][DBLP]
    IWDW, 2006, pp:268-281 [Conf]
  73. Jeong Jae Yu, Jae Won Han, Kwang Su Lee, Seung Cheol O, Sangjin Lee, Il Hwan Park
    A Secure Steganographic Scheme against Statistical Analyses. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:497-507 [Conf]
  74. Jeong Jae Yu, Changho Jung, Seok-Koo Yoon, Sangjin Lee
    Steganographic Scheme Using a Block Cipher. [Citation Graph (0, 0)][DBLP]
    IWDW, 2004, pp:163-170 [Conf]
  75. Jong Hyuk Park, Sangjin Lee, Byoung-Soo Koh, Jae-Hyuk Jang
    uiH-PMAC Model Suitable for Ubi-Home Gateway in Ubiquitous Intelligent Environment. [Citation Graph (0, 0)][DBLP]
    KES (2), 2006, pp:777-784 [Conf]
  76. Jong Hyuk Park, Heung-Soo Park, Sangjin Lee, Jun Choi, Deok-Gyu Lee
    Intelligent Multimedia Service System Based on Context Awareness in Smart Home. [Citation Graph (0, 0)][DBLP]
    KES (1), 2005, pp:1146-1152 [Conf]
  77. Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim
    Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:298-307 [Conf]
  78. Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee
    Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:244-262 [Conf]
  79. KeunDuck Byun, Sangjin Lee, HyungJun Kim
    A Watermarking Method Using Quantization and Statistical Characteristics of Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    PDCAT, 2005, pp:689-693 [Conf]
  80. Young-Ho Park, Sangho Oh, Sangjin Lee, Jongin Lim, Maenghee Sung
    An Improved Method of Multiplication on Certain Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:310-322 [Conf]
  81. Sang Uk Shin, Kyung Hyune Rhee, Dae-Hyun Ryu, Sangjin Lee
    A New Hash Function Based on MDx-Family and Its Application to MAC. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:234-246 [Conf]
  82. Donghoon Chang, Jaechul Sung, Soo Hak Sung, Sangjin Lee, Jongin Lim
    Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:160-174 [Conf]
  83. Seokhee Lee, Hyunsang Kim, Sangjin Lee, Jongin Lim
    Digital evidence collection process in integrity and memory information gathering. [Citation Graph (0, 0)][DBLP]
    SADFE, 2005, pp:236-247 [Conf]
  84. Jong Hyuk Park, Ji-Sook Park, Sangjin Lee, Byoung-Soo Koh
    A DRBAC Model Based on Context for Smart and Secure Services in Intelligent Ubiquitous Home. [Citation Graph (0, 0)][DBLP]
    UIC, 2006, pp:893-901 [Conf]
  85. Kitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jaeheon Kim, Deukjo Hong
    Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:260-270 [Conf]
  86. Jong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, Laurence Tianruo Yang
    Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. [Citation Graph (0, 0)][DBLP]
    MUE, 2007, pp:1233-1238 [Conf]
  87. Jun Choi, Deukjo Hong, Seokhie Hong, Sangjin Lee
    Linear Attack Using Multiple Linear Approximations. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:2-8 [Journal]
  88. Wonil Lee, Donghoon Chang, Sangjin Lee, Soo Hak Sung, Mridul Nandi
    Construction of UOWHF: Two New Parallel Methods. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:49-58 [Journal]
  89. Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai
    PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:39-48 [Journal]
  90. Kilsoo Chun, Seungjoo Kim, Sangjin Lee, Soo Hak Sung, Seonhee Yoon
    Differential and linear cryptanalysis for 2-round SPNs. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2003, v:87, n:5, pp:277-282 [Journal]
  91. Seokhie Hong, Jaechul Sung, Sangjin Lee, Jongin Lim, JongSu Kim
    Provable security for 13 round Skipjack-like structure. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2002, v:82, n:5, pp:243-246 [Journal]
  92. Sung-Mo Park, Sangjin Lee, Soo Hak Sung, Kwangjo Kim
    Improving Bounds for the Number of Correlation Immune Boolean Functions. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1997, v:61, n:4, pp:209-212 [Journal]
  93. Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi
    Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2006, v:19, n:4, pp:441-462 [Journal]
  94. Changho Seo, Sangjin Lee, Yeoulouk Sung, Keunhee Han, Sangchoon Kim
    A lower bound on the linear span of an FCSR. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:2, pp:691-693 [Journal]
  95. Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee
    Preimage Attack on the Parallel FFT-Hashing Function. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:59-67 [Conf]

  96. Generalised Category Attack - Improving Histogram-Based Attack on JPEG LSB Embedding. [Citation Graph (, )][DBLP]


  97. Extraction of Residual Information in the Microsoft PowerPoint file from the Viewpoint of Digital Forensics considering PerCom Environment. [Citation Graph (, )][DBLP]


  98. Synchronization and Channel Estimation in Cyclic Postfix based OFDM System. [Citation Graph (, )][DBLP]


  99. Successive MAP Detection with Soft Interference Cancellation for Iterative Receivers in Hierarchical M-ary QAM Systems. [Citation Graph (, )][DBLP]


  100. Recovery of Damaged Compressed Files for Digital Forensic Purposes. [Citation Graph (, )][DBLP]


  101. Windows Pagefile Collection and Analysis for a Live Forensics Context. [Citation Graph (, )][DBLP]


  102. Discovering Methodology and Scenario to Detect Covert Database System. [Citation Graph (, )][DBLP]


  103. A Methodology for Forensic Analysis of Embedded Systems. [Citation Graph (, )][DBLP]


  104. A Field Guide to Hidden Accounting Information Detection. [Citation Graph (, )][DBLP]


  105. USB PassOn: Secure USB Thumb Drive Forensic Toolkit. [Citation Graph (, )][DBLP]


  106. A Scoring Function for Retrieving Photo Sets with Broad Topic Coverage. [Citation Graph (, )][DBLP]


  107. A Stepwise Methodology for Tracing Computer Usage. [Citation Graph (, )][DBLP]


  108. Analysis of Time Information for Digital Investigation. [Citation Graph (, )][DBLP]


  109. Data concealment and detection in Microsoft Office 2007 files. [Citation Graph (, )][DBLP]


  110. Forensic investigation of Microsoft PowerPoint files. [Citation Graph (, )][DBLP]


Search in 0.026secs, Finished in 0.035secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002