2008 |
30 | EE | Jiqiang Lu,
Jongsung Kim,
Nathan Keller,
Orr Dunkelman:
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1.
CT-RSA 2008: 370-386 |
29 | EE | Eunjin Lee,
Donghoon Chang,
Jongsung Kim,
Jaechul Sung,
Seokhie Hong:
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL.
FSE 2008: 189-206 |
28 | EE | Jiqiang Lu,
Orr Dunkelman,
Nathan Keller,
Jongsung Kim:
New Impossible Differential Attacks on AES.
INDOCRYPT 2008: 279-293 |
27 | EE | Eunjin Lee,
Jongsung Kim,
Deukjo Hong,
Changhoon Lee,
Jaechul Sung,
Seokhie Hong,
Jongin Lim:
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks.
IEICE Transactions 91-A(2): 642-649 (2008) |
26 | EE | Jiqiang Lu,
Jongsung Kim:
Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis.
IEICE Transactions 91-A(9): 2588-2596 (2008) |
25 | EE | Changhoon Lee,
Jongsung Kim,
Seokhie Hong,
Jaechul Sung,
Sangjin Lee:
Security analysis of the full-round DDO-64 block cipher.
Journal of Systems and Software 81(12): 2328-2335 (2008) |
2007 |
24 | EE | Jongsung Kim,
Seokhie Hong,
Bart Preneel:
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256.
FSE 2007: 225-241 |
2006 |
23 | EE | Changhoon Lee,
Jongsung Kim,
Jaechul Sung,
Seokhie Hong,
Sangjin Lee:
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant.
ACISP 2006: 421-431 |
22 | EE | Deukjo Hong,
Jaechul Sung,
Seokhie Hong,
Jongin Lim,
Sangjin Lee,
Bonseok Koo,
Changhoon Lee,
Donghoon Chang,
Jaesang Lee,
Kitae Jeong,
Hyun Kim,
Jongsung Kim,
Seongtaek Chee:
HIGHT: A New Block Cipher Suitable for Low-Resource Device.
CHES 2006: 46-59 |
21 | EE | Changhoon Lee,
Jongsung Kim,
Jaechul Sung,
Seokhie Hong,
Sangjin Lee:
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis.
ICCSA (3) 2006: 446-455 |
20 | EE | Jiqiang Lu,
Jongsung Kim,
Nathan Keller,
Orr Dunkelman:
Differential and Rectangle Attacks on Reduced-Round SHACAL-1.
INDOCRYPT 2006: 17-31 |
19 | EE | Jiqiang Lu,
Jongsung Kim,
Nathan Keller,
Orr Dunkelman:
Related-Key Rectangle Attack on 42-Round SHACAL-2.
ISC 2006: 85-100 |
18 | EE | Jongsung Kim,
Alex Biryukov,
Bart Preneel,
Seokhie Hong:
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract).
SCN 2006: 242-256 |
17 | EE | Jiqiang Lu,
Changhoon Lee,
Jongsung Kim:
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b.
SCN 2006: 95-110 |
16 | EE | Orr Dunkelman,
Nathan Keller,
Jongsung Kim:
Related-Key Rectangle Attack on the Full SHACAL-1.
Selected Areas in Cryptography 2006: 28-44 |
2005 |
15 | EE | Seokhie Hong,
Jongsung Kim,
Sangjin Lee,
Bart Preneel:
Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192.
FSE 2005: 368-383 |
14 | EE | Jaemin Choi,
Jongsung Kim,
Jaechul Sung,
Sangjin Lee,
Jongin Lim:
Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE.
ICCSA (2) 2005: 567-576 |
13 | EE | Jongsung Kim,
Alex Biryukov,
Bart Preneel,
Sangjin Lee:
On the Security of Encryption Modes of MD4, MD5 and HAVAL.
ICICS 2005: 147-158 |
12 | EE | Changhoon Lee,
Jongsung Kim,
Jaechul Sung,
Seokhie Hong,
Sangjin Lee,
Dukjae Moon:
Related-Key Differential Attacks on Cobra-H64 and Cobra-H128.
IMA Int. Conf. 2005: 201-219 |
11 | EE | Changhoon Lee,
Jongsung Kim,
Seokhie Hong,
Jaechul Sung,
Sangjin Lee:
Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b.
Mycrypt 2005: 244-262 |
10 | | Jaechul Sung,
Jongsung Kim,
Changhoon Lee,
Seokhie Hong:
Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds.
WEWoRC 2005: 64-75 |
2004 |
9 | EE | YongSup Shin,
Jongsung Kim,
Guil Kim,
Seokhie Hong,
Sangjin Lee:
Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2.
ACISP 2004: 110-122 |
8 | EE | Jongsung Kim,
Guil Kim,
Seokhie Hong,
Sangjin Lee,
Dowon Hong:
The Related-Key Rectangle Attack - Application to SHACAL-1.
ACISP 2004: 123-136 |
7 | EE | Taekeon Lee,
Jongsung Kim,
Changhoon Lee,
Jaechul Sung,
Sangjin Lee,
Dowon Hong:
Padding Oracle Attacks on Multiple Modes of Operation.
ICISC 2004: 343-351 |
6 | EE | Jongsung Kim,
Guil Kim,
Sangjin Lee,
Jongin Lim,
Jung Hwan Song:
Related-Key Attacks on Reduced Rounds of SHACAL-2.
INDOCRYPT 2004: 175-190 |
2003 |
5 | EE | Jongsung Kim,
Seokhie Hong,
Sangjin Lee,
Jung Hwan Song,
Hyungjin Yang:
Truncated Differential Attacks on 8-Round CRYPTON.
ICISC 2003: 446-456 |
4 | EE | Jongsung Kim,
Seokhie Hong,
Jaechul Sung,
Changhoon Lee,
Sangjin Lee:
Impossible Differential Cryptanalysis for Block Cipher Structures.
INDOCRYPT 2003: 82-96 |
3 | EE | Seokhie Hong,
Jongsung Kim,
Guil Kim,
Jaechul Sung,
Changhoon Lee,
Sangjin Lee:
Impossible Differential Attack on 30-Round SHACAL-2.
INDOCRYPT 2003: 97-106 |
2002 |
2 | EE | Jongsung Kim,
Dukjae Moon,
Wonil Lee,
Seokhie Hong,
Sangjin Lee,
Seokwon Jung:
Amplified Boomerang Attack against Reduced-Round SHACAL.
ASIACRYPT 2002: 243-253 |
1997 |
1 | EE | Jongsung Kim,
Cheeha Kim:
A total ordering protocol using a dynamic token-passing scheme.
Distributed Systems Engineering 4(2): 87-95 (1997) |