|
Search the dblp DataBase
Jaechul Sung:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. [Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:421-431 [Conf]
- Jaechul Sung, Deukjo Hong, Sangjin Lee
Key Recovery Attacks on the RMAC, TMAC, and IACBC. [Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:265-273 [Conf]
- Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi
Known-IV Attacks on Triple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2001, pp:208-221 [Conf]
- Jaechul Sung, Sangjin Lee, Jong In Lim, Seokhie Hong, Sangjoon Park
Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2000, pp:274-288 [Conf]
- Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee
HIGHT: A New Block Cipher Suitable for Low-Resource Device. [Citation Graph (0, 0)][DBLP] CHES, 2006, pp:46-59 [Conf]
- Seokhie Hong, Sangjin Lee, Jongin Lim, Jaechul Sung, Dong Hyeon Cheon, Inho Cho
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:273-283 [Conf]
- Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim
Impossible Differential Cryptanalysis of Zodiac. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:300-311 [Conf]
- Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon, Sungtaek Chee
A New Dedicated 256-Bit Hash Function: FORK-256. [Citation Graph (0, 0)][DBLP] FSE, 2006, pp:195-209 [Conf]
- Jaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee, Jongin Lim
Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:567-576 [Conf]
- Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:446-455 [Conf]
- Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong
Padding Oracle Attacks on Multiple Modes of Operation. [Citation Graph (0, 0)][DBLP] ICISC, 2004, pp:343-351 [Conf]
- Jaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:103-113 [Conf]
- Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon
Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. [Citation Graph (0, 0)][DBLP] IMA Int. Conf., 2005, pp:201-219 [Conf]
- Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee
Impossible Differential Attack on 30-Round SHACAL-2. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2003, pp:97-106 [Conf]
- Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee
How to Construct Universal One-Way Hash Functions of Order r. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2005, pp:63-76 [Conf]
- Jongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee
Impossible Differential Cryptanalysis for Block Cipher Structures. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2003, pp:82-96 [Conf]
- Youngdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee
Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:191-205 [Conf]
- Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee, Soo Hak Sung
Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2004, pp:328-342 [Conf]
- Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee
Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. [Citation Graph (0, 0)][DBLP] Mycrypt, 2005, pp:244-262 [Conf]
- Donghoon Chang, Jaechul Sung, Soo Hak Sung, Sangjin Lee, Jongin Lim
Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2002, pp:160-174 [Conf]
- Jaechul Sung, Jongsung Kim, Changhoon Lee, Seokhie Hong
Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds. [Citation Graph (0, 0)][DBLP] WEWoRC, 2005, pp:64-75 [Conf]
- Kitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jaeheon Kim, Deukjo Hong
Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators. [Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:260-270 [Conf]
- Seokhie Hong, Jaechul Sung, Sangjin Lee, Jongin Lim, JongSu Kim
Provable security for 13 round Skipjack-like structure. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2002, v:82, n:5, pp:243-246 [Journal]
- Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2006, v:19, n:4, pp:441-462 [Journal]
- Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee
Preimage Attack on the Parallel FFT-Hashing Function. [Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:59-67 [Conf]
- Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. [Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:143-157 [Conf]
- Jaechul Sung, Deukjo Hong, Seokhie Hong
Cryptanalysis of an involutional block cipher using cellular automata. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2007, v:104, n:5, pp:183-185 [Journal]
Related-Key Chosen IV Attacks on Grain-v1 and Grain-128. [Citation Graph (, )][DBLP]
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. [Citation Graph (, )][DBLP]
Update on SEED: SEED-192/256. [Citation Graph (, )][DBLP]
A New Double-Block-Length Hash Function Using Feistel Structure. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.306secs
|