| 2006 |
| 9 | EE | Ku-Young Chang,
Ju-Sung Kang,
Mun-Kyu Lee,
Hangrok Lee,
Dowon Hong:
New Variant of the Self-Shrinking Generator and Its Cryptographic Properties.
ICISC 2006: 41-50 |
| 2004 |
| 8 | EE | Youngdai Ko,
Seokhie Hong,
Wonil Lee,
Sangjin Lee,
Ju-Sung Kang:
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST.
FSE 2004: 299-316 |
| 7 | EE | Ku-Young Chang,
Howon Kim,
Ju-Sung Kang,
Hyun-Sook Cho:
An extension of TYT algorithm for GF((2n)m) using precomputation.
Inf. Process. Lett. 92(5): 231-234 (2004) |
| 2003 |
| 6 | EE | Dowon Hong,
Ju-Sung Kang,
Bart Preneel,
Heuisu Ryu:
A Concrete Security Analysis for 3GPP-MAC.
FSE 2003: 154-169 |
| 2001 |
| 5 | EE | Ju-Sung Kang,
Okyeon Yi,
Dowon Hong,
Hyun-Sook Cho:
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI.
ACISP 2001: 60-73 |
| 4 | EE | Ju-Sung Kang,
Sang Uk Shin,
Dowon Hong,
Okyeon Yi:
Provable Security of KASUMI and 3GPP Encryption Mode f8.
ASIACRYPT 2001: 255-271 |
| 2000 |
| 3 | EE | Ki Hyoung Ko,
Sangjin Lee,
Jung Hee Cheon,
Jae Woo Han,
Ju-Sung Kang,
Choonsik Park:
New Public-Key Cryptosystem Using Braid Groups.
CRYPTO 2000: 166-183 |
| 2 | EE | Ju-Sung Kang,
Seongtaek Chee,
Choonsik Park:
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures.
ICISC 2000: 1-13 |
| 1999 |
| 1 | | Ju-Sung Kang,
Choonsik Park,
Sangjin Lee,
Jong In Lim:
On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis.
ICISC 1999: 38-52 |