2008 |
6 | EE | Dong Hoon Lee,
Je Hong Park,
Jae Woo Han:
Security Analysis of a Variant of Self-Shrinking Generator.
IEICE Transactions 91-A(7): 1824-1827 (2008) |
2005 |
5 | EE | Je Hong Park,
Bo Gyeong Kang,
Jae Woo Han:
Cryptanalysis of Zhou et al.'s proxy-protected signature schemes.
Applied Mathematics and Computation 169(1): 192-197 (2005) |
2004 |
4 | EE | Dong Hoon Lee,
Jaeheon Kim,
Jin Hong,
Jae Woo Han,
Dukjae Moon:
Algebraic Attacks on Summation Generators.
FSE 2004: 34-48 |
2003 |
3 | EE | Daewan Han,
Jin Hong,
Jae Woo Han,
Daesung Kwon:
Key Recovery Attacks on NTRU without Ciphertext Validation Routine.
ACISP 2003: 274-284 |
2001 |
2 | EE | Jae Choon Cha,
Ki Hyoung Ko,
Sangjin Lee,
Jae Woo Han,
Jung Hee Cheon:
An Efficient Implementation of Braid Groups.
ASIACRYPT 2001: 144-156 |
2000 |
1 | EE | Ki Hyoung Ko,
Sangjin Lee,
Jung Hee Cheon,
Jae Woo Han,
Ju-Sung Kang,
Choonsik Park:
New Public-Key Cryptosystem Using Braid Groups.
CRYPTO 2000: 166-183 |