| 2008 |
| 17 | EE | Eunjin Lee,
Jongsung Kim,
Deukjo Hong,
Changhoon Lee,
Jaechul Sung,
Seokhie Hong,
Jongin Lim:
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks.
IEICE Transactions 91-A(2): 642-649 (2008) |
| 2007 |
| 16 | EE | Jaechul Sung,
Deukjo Hong,
Seokhie Hong:
Cryptanalysis of an involutional block cipher using cellular automata.
Inf. Process. Lett. 104(5): 183-185 (2007) |
| 2006 |
| 15 | EE | Deukjo Hong,
Jaechul Sung,
Seokhie Hong,
Jongin Lim,
Sangjin Lee,
Bonseok Koo,
Changhoon Lee,
Donghoon Chang,
Jaesang Lee,
Kitae Jeong,
Hyun Kim,
Jongsung Kim,
Seongtaek Chee:
HIGHT: A New Block Cipher Suitable for Low-Resource Device.
CHES 2006: 46-59 |
| 14 | EE | Deukjo Hong,
Donghoon Chang,
Jaechul Sung,
Sangjin Lee,
Seokhie Hong,
Jaesang Lee,
Dukjae Moon,
Sungtaek Chee:
A New Dedicated 256-Bit Hash Function: FORK-256.
FSE 2006: 195-209 |
| 13 | EE | Kitae Jeong,
Jaechul Sung,
Seokhie Hong,
Sangjin Lee,
Jaeheon Kim,
Deukjo Hong:
Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators.
VIETCRYPT 2006: 260-270 |
| 12 | EE | Eunjin Lee,
Deukjo Hong,
Donghoon Chang,
Seokhie Hong,
Jongin Lim:
A Weak Key Class of XTEA for a Related-Key Rectangle Attack.
VIETCRYPT 2006: 286-297 |
| 11 | EE | Deukjo Hong,
Seokhie Hong,
Wonil Lee,
Sangjin Lee,
Jongin Lim,
Jaechul Sung,
Okyeon Yi:
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.
J. Cryptology 19(4): 441-462 (2006) |
| 2005 |
| 10 | EE | Deukjo Hong,
Jaechul Sung,
Seokhie Hong,
Sangjin Lee:
How to Construct Universal One-Way Hash Functions of Order r.
INDOCRYPT 2005: 63-76 |
| 9 | EE | Jun Choi,
Deukjo Hong,
Seokhie Hong,
Sangjin Lee:
Linear Attack Using Multiple Linear Approximations.
IEICE Transactions 88-A(1): 2-8 (2005) |
| 2004 |
| 8 | EE | Deukjo Hong,
Bart Preneel,
Sangjin Lee:
Higher Order Universal One-Way Hash Functions.
ASIACRYPT 2004: 201-213 |
| 7 | EE | Young-Ho Park,
Deukjo Hong,
Hichun Eun:
On the Linear Complexity of Some Generalized Cyclotomic Sequences.
IJAC 14(4): 431-439 (2004) |
| 2003 |
| 6 | EE | Jaechul Sung,
Deukjo Hong,
Sangjin Lee:
Key Recovery Attacks on the RMAC, TMAC, and IACBC.
ACISP 2003: 265-273 |
| 5 | EE | Seokhie Hong,
Deukjo Hong,
Youngdai Ko,
Donghoon Chang,
Wonil Lee,
Sangjin Lee:
Differential Cryptanalysis of TEA and XTEA.
ICISC 2003: 402-417 |
| 4 | EE | Youngdai Ko,
Deukjo Hong,
Seokhie Hong,
Sangjin Lee,
Jongin Lim:
Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property.
MMM-ACNS 2003: 298-307 |
| 2002 |
| 3 | EE | Changhoon Lee,
Deukjo Hong,
Sungjae Lee,
Sangjin Lee,
Hyungjin Yang,
Jongin Lim:
A Chosen Plaintext Linear Attack on Block Cipher CIKS-1.
ICICS 2002: 456-468 |
| 2001 |
| 2 | EE | Deukjo Hong,
Jaechul Sung,
Seokhie Hong,
Wonil Lee,
Sangjin Lee,
Jongin Lim,
Okyeon Yi:
Known-IV Attacks on Triple Modes of Operation of Block Ciphers.
ASIACRYPT 2001: 208-221 |
| 1 | EE | Deukjo Hong,
Jaechul Sung,
Shiho Moriai,
Sangjin Lee,
Jongin Lim:
Impossible Differential Cryptanalysis of Zodiac.
FSE 2001: 300-311 |