dblp.uni-trier.dewww.uni-trier.de

Seokhie Hong

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
46EEYuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong: Related-Key Chosen IV Attacks on Grain-v1 and Grain-128. ACISP 2008: 321-335
45EEEunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong: Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. FSE 2008: 189-206
44EEJungheum Park, Bora Park, Sangjin Lee, Seokhie Hong, Jong Hyuk Park: Extraction of Residual Information in the Microsoft PowerPoint file from the Viewpoint of Digital Forensics considering PerCom Environment. PerCom 2008: 584-589
43EEEunjin Lee, Jongsung Kim, Deukjo Hong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim: Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks. IEICE Transactions 91-A(2): 642-649 (2008)
42EEDonghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong, Jongin Lim, Haeryong Park, Kilsoo Chun: Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function. IEICE Transactions 91-A(9): 2607-2614 (2008)
41EESeog Chung Seo, Dong-Guk Han, Hyung Chan Kim, Seokhie Hong: TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote. IEICE Transactions 91-D(5): 1338-1347 (2008)
40EEChanghoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee: Security analysis of the full-round DDO-64 block cipher. Journal of Systems and Software 81(12): 2328-2335 (2008)
2007
39EEKitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim: Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. ACISP 2007: 143-157
38EEDonghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee: Preimage Attack on the Parallel FFT-Hashing Function. ACISP 2007: 59-67
37EEJongsung Kim, Seokhie Hong, Bart Preneel: Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. FSE 2007: 225-241
36EEJaechul Sung, Deukjo Hong, Seokhie Hong: Cryptanalysis of an involutional block cipher using cellular automata. Inf. Process. Lett. 104(5): 183-185 (2007)
2006
35EEChanghoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee: Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. ACISP 2006: 421-431
34EEDeukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jaesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee: HIGHT: A New Block Cipher Suitable for Low-Resource Device. CHES 2006: 46-59
33EEDeukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon, Sungtaek Chee: A New Dedicated 256-Bit Hash Function: FORK-256. FSE 2006: 195-209
32EEChanghoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee: Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. ICCSA (3) 2006: 446-455
31EEJongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong: On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). SCN 2006: 242-256
30EEKitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jaeheon Kim, Deukjo Hong: Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators. VIETCRYPT 2006: 260-270
29EEEunjin Lee, Deukjo Hong, Donghoon Chang, Seokhie Hong, Jongin Lim: A Weak Key Class of XTEA for a Related-Key Rectangle Attack. VIETCRYPT 2006: 286-297
28EEDeukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi: Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. J. Cryptology 19(4): 441-462 (2006)
2005
27EESeokhie Hong, Jongsung Kim, Sangjin Lee, Bart Preneel: Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192. FSE 2005: 368-383
26EEAaram Yun, Soo Hak Sung, Sangwoo Park, Donghoon Chang, Seokhie Hong, Hong-Su Cho: Finding Collision on 45-Step HAS-160. ICISC 2005: 146-155
25EEChanghoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon: Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. IMA Int. Conf. 2005: 201-219
24EEDeukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee: How to Construct Universal One-Way Hash Functions of Order r. INDOCRYPT 2005: 63-76
23EEChanghoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee: Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. Mycrypt 2005: 244-262
22 Jaechul Sung, Jongsung Kim, Changhoon Lee, Seokhie Hong: Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds. WEWoRC 2005: 64-75
21EEJun Choi, Deukjo Hong, Seokhie Hong, Sangjin Lee: Linear Attack Using Multiple Linear Approximations. IEICE Transactions 88-A(1): 2-8 (2005)
2004
20EEYongSup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee: Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2. ACISP 2004: 110-122
19EEJongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong: The Related-Key Rectangle Attack - Application to SHACAL-1. ACISP 2004: 123-136
18EEYoungdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee: Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1. ACISP 2004: 137-148
17EEYoungdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee, Ju-Sung Kang: Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. FSE 2004: 299-316
16EEWonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee: On the Pseudorandomness of a Modification of KASUMI Type Permutations. ICISC 2004: 313-329
15EEYoungdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee: Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H. INDOCRYPT 2004: 191-205
14EEDonghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee, Soo Hak Sung: Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. INDOCRYPT 2004: 328-342
2003
13EESeokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee: Differential Cryptanalysis of TEA and XTEA. ICISC 2003: 402-417
12EEJongsung Kim, Seokhie Hong, Sangjin Lee, Jung Hwan Song, Hyungjin Yang: Truncated Differential Attacks on 8-Round CRYPTON. ICISC 2003: 446-456
11EEJongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee: Impossible Differential Cryptanalysis for Block Cipher Structures. INDOCRYPT 2003: 82-96
10EESeokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee: Impossible Differential Attack on 30-Round SHACAL-2. INDOCRYPT 2003: 97-106
9EEYoungdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim: Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property. MMM-ACNS 2003: 298-307
2002
8EEJongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seokwon Jung: Amplified Boomerang Attack against Reduced-Round SHACAL. ASIACRYPT 2002: 243-253
7EESeokhie Hong, Jaechul Sung, Sangjin Lee, Jongin Lim, Jongsu Kim: Provable security for 13 round Skipjack-like structure. Inf. Process. Lett. 82(5): 243-246 (2002)
2001
6EEDeukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi: Known-IV Attacks on Triple Modes of Operation of Block Ciphers. ASIACRYPT 2001: 208-221
5EESeonhee Lee, Seokhie Hong, Sangjin Lee, Jongin Lim, Seonhee Yoon: Truncated Differential Cryptanalysis of Camellia. ICISC 2001: 32-38
2000
4 Heajoung Yoo, Seokhie Hong, Sangjin Lee, Jong In Lim, Okyeon Yi, Maenghee Sung: A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring. ACISP 2000: 41-48
3EEJaechul Sung, Sangjin Lee, Jong In Lim, Seokhie Hong, Sangjoon Park: Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. ASIACRYPT 2000: 274-288
2EESeokhie Hong, Sangjin Lee, Jongin Lim, Jaechul Sung, Dong Hyeon Cheon, Inho Cho: Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. FSE 2000: 273-283
1EEDong Hyeon Cheon, Seokhie Hong, Sangjin Lee, Sung Jae Lee, Kyung Hwan Park, Seonhee Yoon: Difference Distribution Attack on DONUT and Improved DONUT. ICISC 2000: 37-48

Coauthor Index

1Alex Biryukov [31]
2Donghoon Chang [13] [14] [26] [29] [33] [34] [38] [42] [45]
3Seongtaek Chee [34]
4Sungtaek Chee [33]
5Dong Hyeon Cheon [1] [2]
6Hong-Su Cho [26]
7Inho Cho [2]
8Jun Choi [21]
9Kilsoo Chun [42]
10Dong-Guk Han [41]
11Deukjo Hong [6] [9] [13] [21] [24] [28] [29] [30] [33] [34] [36] [43]
12Dowon Hong [19]
13Kitae Jeong [30] [34] [39] [46]
14Seokwon Jung [8]
15Ju-Sung Kang [17]
16Guil Kim [10] [19] [20]
17Hyun Kim [34]
18Hyung Chan Kim [41]
19Jaeheon Kim [30]
20Jongsu Kim [7]
21Jongsung Kim [8] [10] [11] [12] [19] [20] [22] [23] [25] [27] [31] [32] [34] [35] [37] [40] [43] [45]
22Youngdai Ko [9] [13] [15] [17] [18]
23Bonseok Koo [34]
24Changhoon Lee [10] [11] [15] [18] [22] [23] [25] [32] [34] [35] [39] [40] [43]
25Eunjin Lee [29] [43] [45]
26Jaesang Lee [33] [34]
27Jesang Lee [42]
28Sangjin Lee [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [23] [24] [25] [27] [28] [30] [32] [33] [34] [35] [38] [40] [44]
29Seonhee Lee [5]
30Sung Jae Lee [1]
31Wonil Lee [6] [8] [13] [14] [16] [17] [28]
32Yuseop Lee [46]
33Jongin Lim (Jong In Lim) [2] [3] [4] [5] [6] [7] [9] [28] [29] [34] [39] [42] [43]
34Dukjae Moon [8] [25] [33]
35Mridul Nandi [42]
36Bora Park [44]
37Haeryong Park [42]
38Jong Hyuk Park [44]
39Jungheum Park [44]
40Kyung Hwan Park [1]
41Sangjoon Park [3]
42Sangwoo Park [26]
43Bart Preneel [27] [31] [37]
44Kouichi Sakurai [16]
45Seog Chung Seo [41]
46YongSup Shin [20]
47Jung Hwan Song [12]
48Jaechul Sung [2] [3] [6] [7] [10] [11] [14] [15] [22] [23] [24] [25] [28] [30] [32] [33] [34] [35] [36] [38] [39] [40] [42] [43] [45] [46]
49Maenghee Sung [4]
50Soo Hak Sung [14] [26]
51Hyungjin Yang [12]
52Okyeon Yi [4] [6] [28]
53Heajoung Yoo [4]
54Seonhee Yoon [1] [5]
55Aaram Yun [26]
56Moti Yung (Mordechai M. Yung) [38]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)