dblp.uni-trier.dewww.uni-trier.de

Deukjo Hong

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
17EEEunjin Lee, Jongsung Kim, Deukjo Hong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim: Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks. IEICE Transactions 91-A(2): 642-649 (2008)
2007
16EEJaechul Sung, Deukjo Hong, Seokhie Hong: Cryptanalysis of an involutional block cipher using cellular automata. Inf. Process. Lett. 104(5): 183-185 (2007)
2006
15EEDeukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jaesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee: HIGHT: A New Block Cipher Suitable for Low-Resource Device. CHES 2006: 46-59
14EEDeukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon, Sungtaek Chee: A New Dedicated 256-Bit Hash Function: FORK-256. FSE 2006: 195-209
13EEKitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jaeheon Kim, Deukjo Hong: Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators. VIETCRYPT 2006: 260-270
12EEEunjin Lee, Deukjo Hong, Donghoon Chang, Seokhie Hong, Jongin Lim: A Weak Key Class of XTEA for a Related-Key Rectangle Attack. VIETCRYPT 2006: 286-297
11EEDeukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi: Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. J. Cryptology 19(4): 441-462 (2006)
2005
10EEDeukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee: How to Construct Universal One-Way Hash Functions of Order r. INDOCRYPT 2005: 63-76
9EEJun Choi, Deukjo Hong, Seokhie Hong, Sangjin Lee: Linear Attack Using Multiple Linear Approximations. IEICE Transactions 88-A(1): 2-8 (2005)
2004
8EEDeukjo Hong, Bart Preneel, Sangjin Lee: Higher Order Universal One-Way Hash Functions. ASIACRYPT 2004: 201-213
7EEYoung-Ho Park, Deukjo Hong, Hichun Eun: On the Linear Complexity of Some Generalized Cyclotomic Sequences. IJAC 14(4): 431-439 (2004)
2003
6EEJaechul Sung, Deukjo Hong, Sangjin Lee: Key Recovery Attacks on the RMAC, TMAC, and IACBC. ACISP 2003: 265-273
5EESeokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee: Differential Cryptanalysis of TEA and XTEA. ICISC 2003: 402-417
4EEYoungdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim: Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property. MMM-ACNS 2003: 298-307
2002
3EEChanghoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, Jongin Lim: A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. ICICS 2002: 456-468
2001
2EEDeukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi: Known-IV Attacks on Triple Modes of Operation of Block Ciphers. ASIACRYPT 2001: 208-221
1EEDeukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim: Impossible Differential Cryptanalysis of Zodiac. FSE 2001: 300-311

Coauthor Index

1Donghoon Chang [5] [12] [14] [15]
2Seongtaek Chee [15]
3Sungtaek Chee [14]
4Jun Choi [9]
5Hichun Eun [7]
6Seokhie Hong [2] [4] [5] [9] [10] [11] [12] [13] [14] [15] [16] [17]
7Kitae Jeong [13] [15]
8Hyun Kim [15]
9Jaeheon Kim [13]
10Jongsung Kim [15] [17]
11Youngdai Ko [4] [5]
12Bonseok Koo [15]
13Changhoon Lee [3] [15] [17]
14Eunjin Lee [12] [17]
15Jaesang Lee [14] [15]
16Sangjin Lee [1] [2] [3] [4] [5] [6] [8] [9] [10] [11] [13] [14] [15]
17Sungjae Lee [3]
18Wonil Lee [2] [5] [11]
19Jongin Lim (Jong In Lim) [1] [2] [3] [4] [11] [12] [15] [17]
20Dukjae Moon [14]
21Shiho Moriai [1]
22Young-Ho Park [7]
23Bart Preneel [8]
24Jaechul Sung [1] [2] [6] [10] [11] [13] [14] [15] [16] [17]
25Hyungjin Yang [3]
26Okyeon Yi [2] [11]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)