The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jaechul Sung: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee
    Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:421-431 [Conf]
  2. Jaechul Sung, Deukjo Hong, Sangjin Lee
    Key Recovery Attacks on the RMAC, TMAC, and IACBC. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:265-273 [Conf]
  3. Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi
    Known-IV Attacks on Triple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:208-221 [Conf]
  4. Jaechul Sung, Sangjin Lee, Jong In Lim, Seokhie Hong, Sangjoon Park
    Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:274-288 [Conf]
  5. Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee
    HIGHT: A New Block Cipher Suitable for Low-Resource Device. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:46-59 [Conf]
  6. Seokhie Hong, Sangjin Lee, Jongin Lim, Jaechul Sung, Dong Hyeon Cheon, Inho Cho
    Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:273-283 [Conf]
  7. Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim
    Impossible Differential Cryptanalysis of Zodiac. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:300-311 [Conf]
  8. Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon, Sungtaek Chee
    A New Dedicated 256-Bit Hash Function: FORK-256. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:195-209 [Conf]
  9. Jaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee, Jongin Lim
    Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:567-576 [Conf]
  10. Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee
    Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:446-455 [Conf]
  11. Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong
    Padding Oracle Attacks on Multiple Modes of Operation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:343-351 [Conf]
  12. Jaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi
    Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:103-113 [Conf]
  13. Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon
    Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:201-219 [Conf]
  14. Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee
    Impossible Differential Attack on 30-Round SHACAL-2. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:97-106 [Conf]
  15. Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee
    How to Construct Universal One-Way Hash Functions of Order r. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:63-76 [Conf]
  16. Jongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee
    Impossible Differential Cryptanalysis for Block Cipher Structures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:82-96 [Conf]
  17. Youngdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee
    Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:191-205 [Conf]
  18. Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee, Soo Hak Sung
    Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:328-342 [Conf]
  19. Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee
    Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:244-262 [Conf]
  20. Donghoon Chang, Jaechul Sung, Soo Hak Sung, Sangjin Lee, Jongin Lim
    Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:160-174 [Conf]
  21. Jaechul Sung, Jongsung Kim, Changhoon Lee, Seokhie Hong
    Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds. [Citation Graph (0, 0)][DBLP]
    WEWoRC, 2005, pp:64-75 [Conf]
  22. Kitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jaeheon Kim, Deukjo Hong
    Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:260-270 [Conf]
  23. Seokhie Hong, Jaechul Sung, Sangjin Lee, Jongin Lim, JongSu Kim
    Provable security for 13 round Skipjack-like structure. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2002, v:82, n:5, pp:243-246 [Journal]
  24. Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi
    Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2006, v:19, n:4, pp:441-462 [Journal]
  25. Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee
    Preimage Attack on the Parallel FFT-Hashing Function. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:59-67 [Conf]
  26. Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim
    Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:143-157 [Conf]
  27. Jaechul Sung, Deukjo Hong, Seokhie Hong
    Cryptanalysis of an involutional block cipher using cellular automata. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2007, v:104, n:5, pp:183-185 [Journal]

  28. Related-Key Chosen IV Attacks on Grain-v1 and Grain-128. [Citation Graph (, )][DBLP]


  29. Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. [Citation Graph (, )][DBLP]


  30. Update on SEED: SEED-192/256. [Citation Graph (, )][DBLP]


  31. A New Double-Block-Length Hash Function Using Feistel Structure. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.306secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002