|
Search the dblp DataBase
Deukjo Hong:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Jaechul Sung, Deukjo Hong, Sangjin Lee
Key Recovery Attacks on the RMAC, TMAC, and IACBC. [Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:265-273 [Conf]
- Deukjo Hong, Bart Preneel, Sangjin Lee
Higher Order Universal One-Way Hash Functions. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2004, pp:201-213 [Conf]
- Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi
Known-IV Attacks on Triple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2001, pp:208-221 [Conf]
- Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee
HIGHT: A New Block Cipher Suitable for Low-Resource Device. [Citation Graph (0, 0)][DBLP] CHES, 2006, pp:46-59 [Conf]
- Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim
Impossible Differential Cryptanalysis of Zodiac. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:300-311 [Conf]
- Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon, Sungtaek Chee
A New Dedicated 256-Bit Hash Function: FORK-256. [Citation Graph (0, 0)][DBLP] FSE, 2006, pp:195-209 [Conf]
- Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, Jongin Lim
A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. [Citation Graph (0, 0)][DBLP] ICICS, 2002, pp:456-468 [Conf]
- Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee
Differential Cryptanalysis of TEA and XTEA. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:402-417 [Conf]
- Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee
How to Construct Universal One-Way Hash Functions of Order r. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2005, pp:63-76 [Conf]
- Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim
Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2003, pp:298-307 [Conf]
- Kitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jaeheon Kim, Deukjo Hong
Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators. [Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:260-270 [Conf]
- Eunjin Lee, Deukjo Hong, Donghoon Chang, Seokhie Hong, Jongin Lim
A Weak Key Class of XTEA for a Related-Key Rectangle Attack. [Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:286-297 [Conf]
- Jun Choi, Deukjo Hong, Seokhie Hong, Sangjin Lee
Linear Attack Using Multiple Linear Approximations. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2005, v:88, n:1, pp:2-8 [Journal]
- Young-Ho Park, Deukjo Hong, Hichun Eun
On the Linear Complexity of Some Generalized Cyclotomic Sequences. [Citation Graph (0, 0)][DBLP] IJAC, 2004, v:14, n:4, pp:431-439 [Journal]
- Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP] J. Cryptology, 2006, v:19, n:4, pp:441-462 [Journal]
- Jaechul Sung, Deukjo Hong, Seokhie Hong
Cryptanalysis of an involutional block cipher using cellular automata. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2007, v:104, n:5, pp:183-185 [Journal]
Improved Preimage Attack for 68-Step HAS-160. [Citation Graph (, )][DBLP]
Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|