2008 |
46 | EE | Yuseop Lee,
Kitae Jeong,
Jaechul Sung,
Seokhie Hong:
Related-Key Chosen IV Attacks on Grain-v1 and Grain-128.
ACISP 2008: 321-335 |
45 | EE | Eunjin Lee,
Donghoon Chang,
Jongsung Kim,
Jaechul Sung,
Seokhie Hong:
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL.
FSE 2008: 189-206 |
44 | EE | Jungheum Park,
Bora Park,
Sangjin Lee,
Seokhie Hong,
Jong Hyuk Park:
Extraction of Residual Information in the Microsoft PowerPoint file from the Viewpoint of Digital Forensics considering PerCom Environment.
PerCom 2008: 584-589 |
43 | EE | Eunjin Lee,
Jongsung Kim,
Deukjo Hong,
Changhoon Lee,
Jaechul Sung,
Seokhie Hong,
Jongin Lim:
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks.
IEICE Transactions 91-A(2): 642-649 (2008) |
42 | EE | Donghoon Chang,
Mridul Nandi,
Jesang Lee,
Jaechul Sung,
Seokhie Hong,
Jongin Lim,
Haeryong Park,
Kilsoo Chun:
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function.
IEICE Transactions 91-A(9): 2607-2614 (2008) |
41 | EE | Seog Chung Seo,
Dong-Guk Han,
Hyung Chan Kim,
Seokhie Hong:
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote.
IEICE Transactions 91-D(5): 1338-1347 (2008) |
40 | EE | Changhoon Lee,
Jongsung Kim,
Seokhie Hong,
Jaechul Sung,
Sangjin Lee:
Security analysis of the full-round DDO-64 block cipher.
Journal of Systems and Software 81(12): 2328-2335 (2008) |
2007 |
39 | EE | Kitae Jeong,
Changhoon Lee,
Jaechul Sung,
Seokhie Hong,
Jongin Lim:
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128.
ACISP 2007: 143-157 |
38 | EE | Donghoon Chang,
Moti Yung,
Jaechul Sung,
Seokhie Hong,
Sangjin Lee:
Preimage Attack on the Parallel FFT-Hashing Function.
ACISP 2007: 59-67 |
37 | EE | Jongsung Kim,
Seokhie Hong,
Bart Preneel:
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256.
FSE 2007: 225-241 |
36 | EE | Jaechul Sung,
Deukjo Hong,
Seokhie Hong:
Cryptanalysis of an involutional block cipher using cellular automata.
Inf. Process. Lett. 104(5): 183-185 (2007) |
2006 |
35 | EE | Changhoon Lee,
Jongsung Kim,
Jaechul Sung,
Seokhie Hong,
Sangjin Lee:
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant.
ACISP 2006: 421-431 |
34 | EE | Deukjo Hong,
Jaechul Sung,
Seokhie Hong,
Jongin Lim,
Sangjin Lee,
Bonseok Koo,
Changhoon Lee,
Donghoon Chang,
Jaesang Lee,
Kitae Jeong,
Hyun Kim,
Jongsung Kim,
Seongtaek Chee:
HIGHT: A New Block Cipher Suitable for Low-Resource Device.
CHES 2006: 46-59 |
33 | EE | Deukjo Hong,
Donghoon Chang,
Jaechul Sung,
Sangjin Lee,
Seokhie Hong,
Jaesang Lee,
Dukjae Moon,
Sungtaek Chee:
A New Dedicated 256-Bit Hash Function: FORK-256.
FSE 2006: 195-209 |
32 | EE | Changhoon Lee,
Jongsung Kim,
Jaechul Sung,
Seokhie Hong,
Sangjin Lee:
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis.
ICCSA (3) 2006: 446-455 |
31 | EE | Jongsung Kim,
Alex Biryukov,
Bart Preneel,
Seokhie Hong:
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract).
SCN 2006: 242-256 |
30 | EE | Kitae Jeong,
Jaechul Sung,
Seokhie Hong,
Sangjin Lee,
Jaeheon Kim,
Deukjo Hong:
Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators.
VIETCRYPT 2006: 260-270 |
29 | EE | Eunjin Lee,
Deukjo Hong,
Donghoon Chang,
Seokhie Hong,
Jongin Lim:
A Weak Key Class of XTEA for a Related-Key Rectangle Attack.
VIETCRYPT 2006: 286-297 |
28 | EE | Deukjo Hong,
Seokhie Hong,
Wonil Lee,
Sangjin Lee,
Jongin Lim,
Jaechul Sung,
Okyeon Yi:
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.
J. Cryptology 19(4): 441-462 (2006) |
2005 |
27 | EE | Seokhie Hong,
Jongsung Kim,
Sangjin Lee,
Bart Preneel:
Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192.
FSE 2005: 368-383 |
26 | EE | Aaram Yun,
Soo Hak Sung,
Sangwoo Park,
Donghoon Chang,
Seokhie Hong,
Hong-Su Cho:
Finding Collision on 45-Step HAS-160.
ICISC 2005: 146-155 |
25 | EE | Changhoon Lee,
Jongsung Kim,
Jaechul Sung,
Seokhie Hong,
Sangjin Lee,
Dukjae Moon:
Related-Key Differential Attacks on Cobra-H64 and Cobra-H128.
IMA Int. Conf. 2005: 201-219 |
24 | EE | Deukjo Hong,
Jaechul Sung,
Seokhie Hong,
Sangjin Lee:
How to Construct Universal One-Way Hash Functions of Order r.
INDOCRYPT 2005: 63-76 |
23 | EE | Changhoon Lee,
Jongsung Kim,
Seokhie Hong,
Jaechul Sung,
Sangjin Lee:
Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b.
Mycrypt 2005: 244-262 |
22 | | Jaechul Sung,
Jongsung Kim,
Changhoon Lee,
Seokhie Hong:
Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds.
WEWoRC 2005: 64-75 |
21 | EE | Jun Choi,
Deukjo Hong,
Seokhie Hong,
Sangjin Lee:
Linear Attack Using Multiple Linear Approximations.
IEICE Transactions 88-A(1): 2-8 (2005) |
2004 |
20 | EE | YongSup Shin,
Jongsung Kim,
Guil Kim,
Seokhie Hong,
Sangjin Lee:
Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2.
ACISP 2004: 110-122 |
19 | EE | Jongsung Kim,
Guil Kim,
Seokhie Hong,
Sangjin Lee,
Dowon Hong:
The Related-Key Rectangle Attack - Application to SHACAL-1.
ACISP 2004: 123-136 |
18 | EE | Youngdai Ko,
Changhoon Lee,
Seokhie Hong,
Sangjin Lee:
Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1.
ACISP 2004: 137-148 |
17 | EE | Youngdai Ko,
Seokhie Hong,
Wonil Lee,
Sangjin Lee,
Ju-Sung Kang:
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST.
FSE 2004: 299-316 |
16 | EE | Wonil Lee,
Kouichi Sakurai,
Seokhie Hong,
Sangjin Lee:
On the Pseudorandomness of a Modification of KASUMI Type Permutations.
ICISC 2004: 313-329 |
15 | EE | Youngdai Ko,
Changhoon Lee,
Seokhie Hong,
Jaechul Sung,
Sangjin Lee:
Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H.
INDOCRYPT 2004: 191-205 |
14 | EE | Donghoon Chang,
Wonil Lee,
Seokhie Hong,
Jaechul Sung,
Sangjin Lee,
Soo Hak Sung:
Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA.
INDOCRYPT 2004: 328-342 |
2003 |
13 | EE | Seokhie Hong,
Deukjo Hong,
Youngdai Ko,
Donghoon Chang,
Wonil Lee,
Sangjin Lee:
Differential Cryptanalysis of TEA and XTEA.
ICISC 2003: 402-417 |
12 | EE | Jongsung Kim,
Seokhie Hong,
Sangjin Lee,
Jung Hwan Song,
Hyungjin Yang:
Truncated Differential Attacks on 8-Round CRYPTON.
ICISC 2003: 446-456 |
11 | EE | Jongsung Kim,
Seokhie Hong,
Jaechul Sung,
Changhoon Lee,
Sangjin Lee:
Impossible Differential Cryptanalysis for Block Cipher Structures.
INDOCRYPT 2003: 82-96 |
10 | EE | Seokhie Hong,
Jongsung Kim,
Guil Kim,
Jaechul Sung,
Changhoon Lee,
Sangjin Lee:
Impossible Differential Attack on 30-Round SHACAL-2.
INDOCRYPT 2003: 97-106 |
9 | EE | Youngdai Ko,
Deukjo Hong,
Seokhie Hong,
Sangjin Lee,
Jongin Lim:
Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property.
MMM-ACNS 2003: 298-307 |
2002 |
8 | EE | Jongsung Kim,
Dukjae Moon,
Wonil Lee,
Seokhie Hong,
Sangjin Lee,
Seokwon Jung:
Amplified Boomerang Attack against Reduced-Round SHACAL.
ASIACRYPT 2002: 243-253 |
7 | EE | Seokhie Hong,
Jaechul Sung,
Sangjin Lee,
Jongin Lim,
Jongsu Kim:
Provable security for 13 round Skipjack-like structure.
Inf. Process. Lett. 82(5): 243-246 (2002) |
2001 |
6 | EE | Deukjo Hong,
Jaechul Sung,
Seokhie Hong,
Wonil Lee,
Sangjin Lee,
Jongin Lim,
Okyeon Yi:
Known-IV Attacks on Triple Modes of Operation of Block Ciphers.
ASIACRYPT 2001: 208-221 |
5 | EE | Seonhee Lee,
Seokhie Hong,
Sangjin Lee,
Jongin Lim,
Seonhee Yoon:
Truncated Differential Cryptanalysis of Camellia.
ICISC 2001: 32-38 |
2000 |
4 | | Heajoung Yoo,
Seokhie Hong,
Sangjin Lee,
Jong In Lim,
Okyeon Yi,
Maenghee Sung:
A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring.
ACISP 2000: 41-48 |
3 | EE | Jaechul Sung,
Sangjin Lee,
Jong In Lim,
Seokhie Hong,
Sangjoon Park:
Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis.
ASIACRYPT 2000: 274-288 |
2 | EE | Seokhie Hong,
Sangjin Lee,
Jongin Lim,
Jaechul Sung,
Dong Hyeon Cheon,
Inho Cho:
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure.
FSE 2000: 273-283 |
1 | EE | Dong Hyeon Cheon,
Seokhie Hong,
Sangjin Lee,
Sung Jae Lee,
Kyung Hwan Park,
Seonhee Yoon:
Difference Distribution Attack on DONUT and Improved DONUT.
ICISC 2000: 37-48 |