2009 |
12 | EE | Minkyu Kim,
Jung Hee Cheon,
Jin Hong:
Subset-Restricted Random Walks for Pollard rho Method on Fpm.
Public Key Cryptography 2009: 54-67 |
2008 |
11 | EE | Jung Hee Cheon,
Jin Hong,
Minkyu Kim:
Speeding Up the Pollard Rho Method on Prime Fields.
ASIACRYPT 2008: 471-488 |
10 | EE | Jin Hong,
Kyung Chul Jeong,
Eun Young Kwon,
In-Sok Lee,
Daegun Ma:
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs.
ISPEC 2008: 131-145 |
2005 |
9 | EE | Jin Hong,
Palash Sarkar:
New Applications of Time Memory Data Tradeoffs.
ASIACRYPT 2005: 353-372 |
8 | EE | Jin Hong,
Dong Hyun Jeong,
Christopher D. Shaw,
William Ribarsky,
Mark Borodovsky,
Chang Geun Song:
GVis: A Scalable Visualization Framework for Genomic Data.
EuroVis 2005: 191-198 |
7 | EE | Jin Hong,
Dong Hoon Lee,
Yongjin Yeom,
Daewan Han:
A New Class of Single Cycle T-Functions.
FSE 2005: 68-82 |
6 | EE | Jin Hong,
Woo-Hwan Kim:
TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY.
INDOCRYPT 2005: 169-182 |
5 | EE | Jin Hong:
Period of Streamcipher Edon80.
INDOCRYPT 2005: 23-34 |
2004 |
4 | EE | Jin Hong,
Dong Hoon Lee,
Seongtaek Chee,
Palash Sarkar:
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines.
FSE 2004: 193-209 |
3 | EE | Dong Hoon Lee,
Jaeheon Kim,
Jin Hong,
Jae Woo Han,
Dukjae Moon:
Algebraic Attacks on Summation Generators.
FSE 2004: 34-48 |
2003 |
2 | EE | Daewan Han,
Jin Hong,
Jae Woo Han,
Daesung Kwon:
Key Recovery Attacks on NTRU without Ciphertext Validation Routine.
ACISP 2003: 274-284 |
1 | EE | Daesung Kwon,
Jaesung Kim,
Sangwoo Park,
Soo Hak Sung,
Yaekwon Sohn,
Jung Hwan Song,
Yongjin Yeom,
E-Joong Yoon,
Sangjin Lee,
Jaewon Lee,
Seongtaek Chee,
Daewan Han,
Jin Hong:
New Block Cipher: ARIA.
ICISC 2003: 432-445 |