Search the dblp DataBase
Sangjin Lee :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Dong-Guk Han , Hye-Young Park , Young-Ho Park , Sangjin Lee , Dong Hoon Lee , Hyungjin Yang A Practical Approach Defeating Blackmailing. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:464-481 [Conf ] Jongsung Kim , Guil Kim , Seokhie Hong , Sangjin Lee , Dowon Hong The Related-Key Rectangle Attack - Application to SHACAL-1. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:123-136 [Conf ] Youngdai Ko , Changhoon Lee , Seokhie Hong , Sangjin Lee Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:137-148 [Conf ] Changhoon Lee , Jongsung Kim , Jaechul Sung , Seokhie Hong , Sangjin Lee Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:421-431 [Conf ] Wonil Lee , Mridul Nandi , Palash Sarkar , Donghoon Chang , Sangjin Lee , Kouichi Sakurai Pseudorandomness of SPN-Type Transformations. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:212-223 [Conf ] YongSup Shin , Jongsung Kim , Guil Kim , Seokhie Hong , Sangjin Lee Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:110-122 [Conf ] Heajoung Yoo , Seokhie Hong , Sangjin Lee , Jong In Lim , Okyeon Yi , Maenghee Sung A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:41-48 [Conf ] Jaechul Sung , Deukjo Hong , Sangjin Lee Key Recovery Attacks on the RMAC, TMAC, and IACBC. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:265-273 [Conf ] Jong Hyuk Park , Sangjin Lee , Dong Hoon Lee , Jongin Lim , In-Hwa Hong , Laurence Tianruo Yang Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. [Citation Graph (0, 0)][DBLP ] AINA, 2007, pp:311-316 [Conf ] Jae Choon Cha , Ki Hyoung Ko , Sangjin Lee , Jae Woo Han , Jung Hee Cheon An Efficient Implementation of Braid Groups. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:144-156 [Conf ] Donghoon Chang , Sangjin Lee , Mridul Nandi , Moti Yung Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:283-298 [Conf ] Seongtaek Chee , Sangjin Lee , Kwangjo Kim Semi-bent Functions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:107-118 [Conf ] Seongtaek Chee , Sangjin Lee , Daiki Lee , Soo Hak Sung On the Correlation Immune Functions and Their Nonlinearity. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1996, pp:232-243 [Conf ] Jongsung Kim , Dukjae Moon , Wonil Lee , Seokhie Hong , Sangjin Lee , Seokwon Jung Amplified Boomerang Attack against Reduced-Round SHACAL. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:243-253 [Conf ] Deukjo Hong , Bart Preneel , Sangjin Lee Higher Order Universal One-Way Hash Functions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:201-213 [Conf ] Deukjo Hong , Jaechul Sung , Seokhie Hong , Wonil Lee , Sangjin Lee , Jongin Lim , Okyeon Yi Known-IV Attacks on Triple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:208-221 [Conf ] Wonil Lee , Donghoon Chang , Sangjin Lee , Soo Hak Sung , Mridul Nandi New Parallel Domain Extenders for UOWHF. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:208-227 [Conf ] Sangjin Lee , Seongtaek Chee , Sangjoon Park , Sung-Mo Park Conditional Correlation Attack on Nonlinear Filter Generators. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1996, pp:360-367 [Conf ] Jaechul Sung , Sangjin Lee , Jong In Lim , Seokhie Hong , Sangjoon Park Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:274-288 [Conf ] Yongdae Kim , Sangjin Lee , Choonsik Park On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications. [Citation Graph (0, 0)][DBLP ] CARDIS, 1996, pp:- [Conf ] Deukjo Hong , Jaechul Sung , Seokhie Hong , Jongin Lim , Sangjin Lee , Bonseok Koo , Changhoon Lee , Donghoon Chang , Jesang Lee , Kitae Jeong , Hyun Kim , Jongsung Kim , Seongtaek Chee HIGHT: A New Block Cipher Suitable for Low-Resource Device. [Citation Graph (0, 0)][DBLP ] CHES, 2006, pp:46-59 [Conf ] Jong Hyuk Park , Jun Choi , Sangjin Lee , Hye-Ung Park , Deok-Gyu Lee User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home. [Citation Graph (0, 0)][DBLP ] CIS (1), 2005, pp:313-320 [Conf ] Kwangsoo Lee , Changho Jung , Sangjin Lee , HyungJun Kim , Jongin Lim Applying LR Cube Analysis to JSteg Detection. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2005, pp:275-276 [Conf ] Ki Hyoung Ko , Sangjin Lee , Jung Hee Cheon , Jae Woo Han , Ju-Sung Kang , Choonsik Park New Public-Key Cryptosystem Using Braid Groups. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2000, pp:166-183 [Conf ] Eonkyung Lee , Sangjin Lee , Sang Geun Hahn Pseudorandomness from Braid Groups. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2001, pp:486-502 [Conf ] Sangjoon Park , Sangjin Lee , Seung-Cheol Goh On the Security of the Gollmann Cascades. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:148-156 [Conf ] Jong Hyuk Park , Sangjin Lee , Sung Hee Hong C-i UMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home. [Citation Graph (0, 0)][DBLP ] EUC Workshops, 2006, pp:660-670 [Conf ] Sangjin Lee , Eonkyung Lee Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:14-28 [Conf ] Seokhie Hong , Jongsung Kim , Sangjin Lee , Bart Preneel Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192. [Citation Graph (0, 0)][DBLP ] FSE, 2005, pp:368-383 [Conf ] Seokhie Hong , Sangjin Lee , Jongin Lim , Jaechul Sung , Dong Hyeon Cheon , Inho Cho Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. [Citation Graph (0, 0)][DBLP ] FSE, 2000, pp:273-283 [Conf ] Deukjo Hong , Jaechul Sung , Shiho Moriai , Sangjin Lee , Jongin Lim Impossible Differential Cryptanalysis of Zodiac. [Citation Graph (0, 0)][DBLP ] FSE, 2001, pp:300-311 [Conf ] Kyungdeok Hwang , Wonil Lee , Sungjae Lee , Sangjin Lee , Jongin Lim Saturation Attacks on Reduced Round Skipjack. [Citation Graph (0, 0)][DBLP ] FSE, 2002, pp:100-111 [Conf ] Youngdai Ko , Seokhie Hong , Wonil Lee , Sangjin Lee , Ju-Sung Kang Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. [Citation Graph (0, 0)][DBLP ] FSE, 2004, pp:299-316 [Conf ] Dukjae Moon , Kyungdeok Hwang , Wonil Lee , Sangjin Lee , Jongin Lim Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA. [Citation Graph (0, 0)][DBLP ] FSE, 2002, pp:49-60 [Conf ] Mridul Nandi , Wonil Lee , Kouichi Sakurai , Sangjin Lee Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model. [Citation Graph (0, 0)][DBLP ] FSE, 2005, pp:243-254 [Conf ] Sangwoo Park , Soo Hak Sung , Sangjin Lee , Jongin Lim Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES. [Citation Graph (0, 0)][DBLP ] FSE, 2003, pp:247-260 [Conf ] Deukjo Hong , Donghoon Chang , Jaechul Sung , Sangjin Lee , Seokhie Hong , Jaesang Lee , Dukjae Moon , Sungtaek Chee A New Dedicated 256-Bit Hash Function: FORK-256. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:195-209 [Conf ] Jong Hyuk Park , Sangjin Lee , Yeog Kim , Byoung-Soo Koh Design and Implementation of the IMS-IPMP System in Convergence Home-Network Environment. [Citation Graph (0, 0)][DBLP ] ICADL, 2005, pp:465-466 [Conf ] Jaemin Choi , Jongsung Kim , Jaechul Sung , Sangjin Lee , Jongin Lim Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:567-576 [Conf ] Kwangsoo Lee , Changho Jung , Sangjin Lee , Jongin Lim Color Cube Analysis for Detection of LSB Steganography in RGB Color Images. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:537-546 [Conf ] Changhoon Lee , Jongsung Kim , Jaechul Sung , Seokhie Hong , Sangjin Lee Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP ] ICCSA (3), 2006, pp:446-455 [Conf ] Jong Hyuk Park , Sangjin Lee , Byoung-Soo Koh A Flexible DRM System Considering Ubiquitous Environment. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:236-244 [Conf ] Jong Hyuk Park , Jungsuk Song , Sangjin Lee , Byoung-Soo Koh , In-Hwa Hong User Centric Intelligent IPMPS in Ubi-Home. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:245-254 [Conf ] Jongsung Kim , Alex Biryukov , Bart Preneel , Sangjin Lee On the Security of Encryption Modes of MD4, MD5 and HAVAL. [Citation Graph (0, 0)][DBLP ] ICICS, 2005, pp:147-158 [Conf ] Changhoon Lee , Deukjo Hong , Sungjae Lee , Sangjin Lee , Hyungjin Yang , Jongin Lim A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:456-468 [Conf ] Ju-Sung Kang , Choonsik Park , Sangjin Lee , Jong In Lim On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:38-52 [Conf ] Kisik Chang , Robert H. Deng , Feng Bao , Sangjin Lee , HyungJun Kim , Jongin Lim On Security Notions for Steganalysis. [Citation Graph (0, 0)][DBLP ] ICISC, 2004, pp:440-454 [Conf ] Jongsung Kim , Seokhie Hong , Sangjin Lee , Jung Hwan Song , Hyungjin Yang Truncated Differential Attacks on 8-Round CRYPTON. [Citation Graph (0, 0)][DBLP ] ICISC, 2003, pp:446-456 [Conf ] Dong Hyeon Cheon , Seokhie Hong , Sangjin Lee , Sung Jae Lee , Kyung Hwan Park , Seonhee Yoon Difference Distribution Attack on DONUT and Improved DONUT. [Citation Graph (0, 0)][DBLP ] ICISC, 2000, pp:37-48 [Conf ] Bonseok Koo , Dongwook Lee , Gwonho Ryu , TaeJoo Chang , Sangjin Lee High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:81-93 [Conf ] Daesung Kwon , Jaesung Kim , Sangwoo Park , Soo Hak Sung , Yaekwon Sohn , Jung Hwan Song , Yongjin Yeom , E-Joong Yoon , Sangjin Lee , Jaewon Lee , Seongtaek Chee , Daewan Han , Jin Hong New Block Cipher: ARIA. [Citation Graph (0, 0)][DBLP ] ICISC, 2003, pp:432-445 [Conf ] Seonhee Lee , Seokhie Hong , Sangjin Lee , Jongin Lim , Seonhee Yoon Truncated Differential Cryptanalysis of Camellia. [Citation Graph (0, 0)][DBLP ] ICISC, 2001, pp:32-38 [Conf ] Taekeon Lee , Jongsung Kim , Changhoon Lee , Jaechul Sung , Sangjin Lee , Dowon Hong Padding Oracle Attacks on Multiple Modes of Operation. [Citation Graph (0, 0)][DBLP ] ICISC, 2004, pp:343-351 [Conf ] Wonil Lee , Kouichi Sakurai , Seokhie Hong , Sangjin Lee On the Pseudorandomness of a Modification of KASUMI Type Permutations. [Citation Graph (0, 0)][DBLP ] ICISC, 2004, pp:313-329 [Conf ] Seokhie Hong , Deukjo Hong , Youngdai Ko , Donghoon Chang , Wonil Lee , Sangjin Lee Differential Cryptanalysis of TEA and XTEA. [Citation Graph (0, 0)][DBLP ] ICISC, 2003, pp:402-417 [Conf ] Hyejoung Yoo , Kwangsoo Lee , Sangjin Lee , Jongin Lim Off-Line Authentication Using Watermarks. [Citation Graph (0, 0)][DBLP ] ICISC, 2001, pp:200-213 [Conf ] Jaechul Sung , Sangjin Lee , Jong In Lim , Wonil Lee , Okyeon Yi Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. [Citation Graph (0, 0)][DBLP ] ICISC, 2001, pp:103-113 [Conf ] Kwangsoo Lee , Changho Jung , Sangjin Lee , Jongin Lim New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography. [Citation Graph (0, 0)][DBLP ] Information Hiding, 2005, pp:312-326 [Conf ] Changhoon Lee , Jongsung Kim , Jaechul Sung , Seokhie Hong , Sangjin Lee , Dukjae Moon Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2005, pp:201-219 [Conf ] Seokhie Hong , Jongsung Kim , Guil Kim , Jaechul Sung , Changhoon Lee , Sangjin Lee Impossible Differential Attack on 30-Round SHACAL-2. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2003, pp:97-106 [Conf ] Deukjo Hong , Jaechul Sung , Seokhie Hong , Sangjin Lee How to Construct Universal One-Way Hash Functions of Order r . [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:63-76 [Conf ] Jongsung Kim , Seokhie Hong , Jaechul Sung , Changhoon Lee , Sangjin Lee Impossible Differential Cryptanalysis for Block Cipher Structures. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2003, pp:82-96 [Conf ] Jongsung Kim , Guil Kim , Sangjin Lee , Jongin Lim , Jung Hwan Song Related-Key Attacks on Reduced Rounds of SHACAL-2. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:175-190 [Conf ] Youngdai Ko , Changhoon Lee , Seokhie Hong , Jaechul Sung , Sangjin Lee Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:191-205 [Conf ] Donghoon Chang , Wonil Lee , Seokhie Hong , Jaechul Sung , Sangjin Lee , Soo Hak Sung Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:328-342 [Conf ] Dong Hyeon Cheon , Sangjin Lee , Jong In Lim , Sung Jae Lee New Block Cipher DONUT Using Pairwise Perfect Decorrelation. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:262-270 [Conf ] Taeshik Shon , Jongsub Moon , Sangjin Lee , Dong Hoon Lee , Jongin Lim Covert Channel Detection in the ICMP Payload Using Support Vector Machine. [Citation Graph (0, 0)][DBLP ] ISCIS, 2003, pp:828-835 [Conf ] Hyejoung Yoo , Hyungwoo Lee , Sangjin Lee , Jongin Lim Designated Verification of Non-invertible Watermark. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:338-351 [Conf ] Kisik Chang , Robert H. Deng , Feng Bao , Sangjin Lee , HyungJun Kim On Security Notions of Steganographic Systems. [Citation Graph (0, 0)][DBLP ] IWDW, 2004, pp:137-151 [Conf ] Kisik Chang , Changho Jung , Sangjin Lee , Wooil Yang High Quality Perceptual Steganographic Techniques. [Citation Graph (0, 0)][DBLP ] IWDW, 2003, pp:518-531 [Conf ] Kwangsoo Lee , Andreas Westfeld , Sangjin Lee Category Attack for LSB Steganalysis of JPEG Images. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:35-48 [Conf ] Hwajong Oh , Kwangsoo Lee , Sangjin Lee Attack on JPEG2000 Steganography Using LRCA. [Citation Graph (0, 0)][DBLP ] IWDW, 2006, pp:268-281 [Conf ] Jeong Jae Yu , Jae Won Han , Kwang Su Lee , Seung Cheol O , Sangjin Lee , Il Hwan Park A Secure Steganographic Scheme against Statistical Analyses. [Citation Graph (0, 0)][DBLP ] IWDW, 2003, pp:497-507 [Conf ] Jeong Jae Yu , Changho Jung , Seok-Koo Yoon , Sangjin Lee Steganographic Scheme Using a Block Cipher. [Citation Graph (0, 0)][DBLP ] IWDW, 2004, pp:163-170 [Conf ] Jong Hyuk Park , Sangjin Lee , Byoung-Soo Koh , Jae-Hyuk Jang ui H-PMAC Model Suitable for Ubi-Home Gateway in Ubiquitous Intelligent Environment. [Citation Graph (0, 0)][DBLP ] KES (2), 2006, pp:777-784 [Conf ] Jong Hyuk Park , Heung-Soo Park , Sangjin Lee , Jun Choi , Deok-Gyu Lee Intelligent Multimedia Service System Based on Context Awareness in Smart Home. [Citation Graph (0, 0)][DBLP ] KES (1), 2005, pp:1146-1152 [Conf ] Youngdai Ko , Deukjo Hong , Seokhie Hong , Sangjin Lee , Jongin Lim Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2003, pp:298-307 [Conf ] Changhoon Lee , Jongsung Kim , Seokhie Hong , Jaechul Sung , Sangjin Lee Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:244-262 [Conf ] KeunDuck Byun , Sangjin Lee , HyungJun Kim A Watermarking Method Using Quantization and Statistical Characteristics of Wavelet Transform. [Citation Graph (0, 0)][DBLP ] PDCAT, 2005, pp:689-693 [Conf ] Young-Ho Park , Sangho Oh , Sangjin Lee , Jongin Lim , Maenghee Sung An Improved Method of Multiplication on Certain Elliptic Curves. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:310-322 [Conf ] Sang Uk Shin , Kyung Hyune Rhee , Dae-Hyun Ryu , Sangjin Lee A New Hash Function Based on MDx-Family and Its Application to MAC. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1998, pp:234-246 [Conf ] Donghoon Chang , Jaechul Sung , Soo Hak Sung , Sangjin Lee , Jongin Lim Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:160-174 [Conf ] Seokhee Lee , Hyunsang Kim , Sangjin Lee , Jongin Lim Digital evidence collection process in integrity and memory information gathering. [Citation Graph (0, 0)][DBLP ] SADFE, 2005, pp:236-247 [Conf ] Jong Hyuk Park , Ji-Sook Park , Sangjin Lee , Byoung-Soo Koh A DRBAC Model Based on Context for Smart and Secure Services in Intelligent Ubiquitous Home. [Citation Graph (0, 0)][DBLP ] UIC, 2006, pp:893-901 [Conf ] Kitae Jeong , Jaechul Sung , Seokhie Hong , Sangjin Lee , Jaeheon Kim , Deukjo Hong Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators. [Citation Graph (0, 0)][DBLP ] VIETCRYPT, 2006, pp:260-270 [Conf ] Jong Hyuk Park , Sangjin Lee , Dong Hoon Lee , Jongin Lim , In-Hwa Hong , Laurence Tianruo Yang Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. [Citation Graph (0, 0)][DBLP ] MUE, 2007, pp:1233-1238 [Conf ] Jun Choi , Deukjo Hong , Seokhie Hong , Sangjin Lee Linear Attack Using Multiple Linear Approximations. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:2-8 [Journal ] Wonil Lee , Donghoon Chang , Sangjin Lee , Soo Hak Sung , Mridul Nandi Construction of UOWHF: Two New Parallel Methods. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:49-58 [Journal ] Wonil Lee , Mridul Nandi , Palash Sarkar , Donghoon Chang , Sangjin Lee , Kouichi Sakurai PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:39-48 [Journal ] Kilsoo Chun , Seungjoo Kim , Sangjin Lee , Soo Hak Sung , Seonhee Yoon Differential and linear cryptanalysis for 2-round SPNs. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2003, v:87, n:5, pp:277-282 [Journal ] Seokhie Hong , Jaechul Sung , Sangjin Lee , Jongin Lim , JongSu Kim Provable security for 13 round Skipjack-like structure. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2002, v:82, n:5, pp:243-246 [Journal ] Sung-Mo Park , Sangjin Lee , Soo Hak Sung , Kwangjo Kim Improving Bounds for the Number of Correlation Immune Boolean Functions. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1997, v:61, n:4, pp:209-212 [Journal ] Deukjo Hong , Seokhie Hong , Wonil Lee , Sangjin Lee , Jongin Lim , Jaechul Sung , Okyeon Yi Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2006, v:19, n:4, pp:441-462 [Journal ] Changho Seo , Sangjin Lee , Yeoulouk Sung , Keunhee Han , Sangchoon Kim A lower bound on the linear span of an FCSR. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2000, v:46, n:2, pp:691-693 [Journal ] Donghoon Chang , Moti Yung , Jaechul Sung , Seokhie Hong , Sangjin Lee Preimage Attack on the Parallel FFT-Hashing Function. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:59-67 [Conf ] Generalised Category Attack - Improving Histogram-Based Attack on JPEG LSB Embedding. [Citation Graph (, )][DBLP ] Extraction of Residual Information in the Microsoft PowerPoint file from the Viewpoint of Digital Forensics considering PerCom Environment. [Citation Graph (, )][DBLP ] Synchronization and Channel Estimation in Cyclic Postfix based OFDM System. [Citation Graph (, )][DBLP ] Successive MAP Detection with Soft Interference Cancellation for Iterative Receivers in Hierarchical M-ary QAM Systems. [Citation Graph (, )][DBLP ] Recovery of Damaged Compressed Files for Digital Forensic Purposes. [Citation Graph (, )][DBLP ] Windows Pagefile Collection and Analysis for a Live Forensics Context. [Citation Graph (, )][DBLP ] Discovering Methodology and Scenario to Detect Covert Database System. [Citation Graph (, )][DBLP ] A Methodology for Forensic Analysis of Embedded Systems. [Citation Graph (, )][DBLP ] A Field Guide to Hidden Accounting Information Detection. [Citation Graph (, )][DBLP ] USB PassOn: Secure USB Thumb Drive Forensic Toolkit. [Citation Graph (, )][DBLP ] A Scoring Function for Retrieving Photo Sets with Broad Topic Coverage. [Citation Graph (, )][DBLP ] A Stepwise Methodology for Tracing Computer Usage. [Citation Graph (, )][DBLP ] Analysis of Time Information for Digital Investigation. [Citation Graph (, )][DBLP ] Data concealment and detection in Microsoft Office 2007 files. [Citation Graph (, )][DBLP ] Forensic investigation of Microsoft PowerPoint files. [Citation Graph (, )][DBLP ] Search in 0.008secs, Finished in 0.017secs