2008 |
17 | EE | Eunjin Lee,
Jongsung Kim,
Deukjo Hong,
Changhoon Lee,
Jaechul Sung,
Seokhie Hong,
Jongin Lim:
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks.
IEICE Transactions 91-A(2): 642-649 (2008) |
2007 |
16 | EE | Jaechul Sung,
Deukjo Hong,
Seokhie Hong:
Cryptanalysis of an involutional block cipher using cellular automata.
Inf. Process. Lett. 104(5): 183-185 (2007) |
2006 |
15 | EE | Deukjo Hong,
Jaechul Sung,
Seokhie Hong,
Jongin Lim,
Sangjin Lee,
Bonseok Koo,
Changhoon Lee,
Donghoon Chang,
Jaesang Lee,
Kitae Jeong,
Hyun Kim,
Jongsung Kim,
Seongtaek Chee:
HIGHT: A New Block Cipher Suitable for Low-Resource Device.
CHES 2006: 46-59 |
14 | EE | Deukjo Hong,
Donghoon Chang,
Jaechul Sung,
Sangjin Lee,
Seokhie Hong,
Jaesang Lee,
Dukjae Moon,
Sungtaek Chee:
A New Dedicated 256-Bit Hash Function: FORK-256.
FSE 2006: 195-209 |
13 | EE | Kitae Jeong,
Jaechul Sung,
Seokhie Hong,
Sangjin Lee,
Jaeheon Kim,
Deukjo Hong:
Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators.
VIETCRYPT 2006: 260-270 |
12 | EE | Eunjin Lee,
Deukjo Hong,
Donghoon Chang,
Seokhie Hong,
Jongin Lim:
A Weak Key Class of XTEA for a Related-Key Rectangle Attack.
VIETCRYPT 2006: 286-297 |
11 | EE | Deukjo Hong,
Seokhie Hong,
Wonil Lee,
Sangjin Lee,
Jongin Lim,
Jaechul Sung,
Okyeon Yi:
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.
J. Cryptology 19(4): 441-462 (2006) |
2005 |
10 | EE | Deukjo Hong,
Jaechul Sung,
Seokhie Hong,
Sangjin Lee:
How to Construct Universal One-Way Hash Functions of Order r.
INDOCRYPT 2005: 63-76 |
9 | EE | Jun Choi,
Deukjo Hong,
Seokhie Hong,
Sangjin Lee:
Linear Attack Using Multiple Linear Approximations.
IEICE Transactions 88-A(1): 2-8 (2005) |
2004 |
8 | EE | Deukjo Hong,
Bart Preneel,
Sangjin Lee:
Higher Order Universal One-Way Hash Functions.
ASIACRYPT 2004: 201-213 |
7 | EE | Young-Ho Park,
Deukjo Hong,
Hichun Eun:
On the Linear Complexity of Some Generalized Cyclotomic Sequences.
IJAC 14(4): 431-439 (2004) |
2003 |
6 | EE | Jaechul Sung,
Deukjo Hong,
Sangjin Lee:
Key Recovery Attacks on the RMAC, TMAC, and IACBC.
ACISP 2003: 265-273 |
5 | EE | Seokhie Hong,
Deukjo Hong,
Youngdai Ko,
Donghoon Chang,
Wonil Lee,
Sangjin Lee:
Differential Cryptanalysis of TEA and XTEA.
ICISC 2003: 402-417 |
4 | EE | Youngdai Ko,
Deukjo Hong,
Seokhie Hong,
Sangjin Lee,
Jongin Lim:
Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property.
MMM-ACNS 2003: 298-307 |
2002 |
3 | EE | Changhoon Lee,
Deukjo Hong,
Sungjae Lee,
Sangjin Lee,
Hyungjin Yang,
Jongin Lim:
A Chosen Plaintext Linear Attack on Block Cipher CIKS-1.
ICICS 2002: 456-468 |
2001 |
2 | EE | Deukjo Hong,
Jaechul Sung,
Seokhie Hong,
Wonil Lee,
Sangjin Lee,
Jongin Lim,
Okyeon Yi:
Known-IV Attacks on Triple Modes of Operation of Block Ciphers.
ASIACRYPT 2001: 208-221 |
1 | EE | Deukjo Hong,
Jaechul Sung,
Shiho Moriai,
Sangjin Lee,
Jongin Lim:
Impossible Differential Cryptanalysis of Zodiac.
FSE 2001: 300-311 |