The SCEAS System
Navigation Menu

Search the dblp DataBase


Deukjo Hong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jaechul Sung, Deukjo Hong, Sangjin Lee
    Key Recovery Attacks on the RMAC, TMAC, and IACBC. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:265-273 [Conf]
  2. Deukjo Hong, Bart Preneel, Sangjin Lee
    Higher Order Universal One-Way Hash Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:201-213 [Conf]
  3. Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi
    Known-IV Attacks on Triple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:208-221 [Conf]
  4. Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee
    HIGHT: A New Block Cipher Suitable for Low-Resource Device. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:46-59 [Conf]
  5. Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim
    Impossible Differential Cryptanalysis of Zodiac. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:300-311 [Conf]
  6. Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon, Sungtaek Chee
    A New Dedicated 256-Bit Hash Function: FORK-256. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:195-209 [Conf]
  7. Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, Jongin Lim
    A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:456-468 [Conf]
  8. Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee
    Differential Cryptanalysis of TEA and XTEA. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:402-417 [Conf]
  9. Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee
    How to Construct Universal One-Way Hash Functions of Order r. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:63-76 [Conf]
  10. Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim
    Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:298-307 [Conf]
  11. Kitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jaeheon Kim, Deukjo Hong
    Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:260-270 [Conf]
  12. Eunjin Lee, Deukjo Hong, Donghoon Chang, Seokhie Hong, Jongin Lim
    A Weak Key Class of XTEA for a Related-Key Rectangle Attack. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:286-297 [Conf]
  13. Jun Choi, Deukjo Hong, Seokhie Hong, Sangjin Lee
    Linear Attack Using Multiple Linear Approximations. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:2-8 [Journal]
  14. Young-Ho Park, Deukjo Hong, Hichun Eun
    On the Linear Complexity of Some Generalized Cyclotomic Sequences. [Citation Graph (0, 0)][DBLP]
    IJAC, 2004, v:14, n:4, pp:431-439 [Journal]
  15. Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi
    Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2006, v:19, n:4, pp:441-462 [Journal]
  16. Jaechul Sung, Deukjo Hong, Seokhie Hong
    Cryptanalysis of an involutional block cipher using cellular automata. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2007, v:104, n:5, pp:183-185 [Journal]

  17. Improved Preimage Attack for 68-Step HAS-160. [Citation Graph (, )][DBLP]

  18. Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002