2006 |
9 | EE | Ku-Young Chang,
Ju-Sung Kang,
Mun-Kyu Lee,
Hangrok Lee,
Dowon Hong:
New Variant of the Self-Shrinking Generator and Its Cryptographic Properties.
ICISC 2006: 41-50 |
2004 |
8 | EE | Youngdai Ko,
Seokhie Hong,
Wonil Lee,
Sangjin Lee,
Ju-Sung Kang:
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST.
FSE 2004: 299-316 |
7 | EE | Ku-Young Chang,
Howon Kim,
Ju-Sung Kang,
Hyun-Sook Cho:
An extension of TYT algorithm for GF((2n)m) using precomputation.
Inf. Process. Lett. 92(5): 231-234 (2004) |
2003 |
6 | EE | Dowon Hong,
Ju-Sung Kang,
Bart Preneel,
Heuisu Ryu:
A Concrete Security Analysis for 3GPP-MAC.
FSE 2003: 154-169 |
2001 |
5 | EE | Ju-Sung Kang,
Okyeon Yi,
Dowon Hong,
Hyun-Sook Cho:
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI.
ACISP 2001: 60-73 |
4 | EE | Ju-Sung Kang,
Sang Uk Shin,
Dowon Hong,
Okyeon Yi:
Provable Security of KASUMI and 3GPP Encryption Mode f8.
ASIACRYPT 2001: 255-271 |
2000 |
3 | EE | Ki Hyoung Ko,
Sangjin Lee,
Jung Hee Cheon,
Jae Woo Han,
Ju-Sung Kang,
Choonsik Park:
New Public-Key Cryptosystem Using Braid Groups.
CRYPTO 2000: 166-183 |
2 | EE | Ju-Sung Kang,
Seongtaek Chee,
Choonsik Park:
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures.
ICISC 2000: 1-13 |
1999 |
1 | | Ju-Sung Kang,
Choonsik Park,
Sangjin Lee,
Jong In Lim:
On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis.
ICISC 1999: 38-52 |