dblp.uni-trier.dewww.uni-trier.de

Jongsung Kim

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
30EEJiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman: Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. CT-RSA 2008: 370-386
29EEEunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong: Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. FSE 2008: 189-206
28EEJiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim: New Impossible Differential Attacks on AES. INDOCRYPT 2008: 279-293
27EEEunjin Lee, Jongsung Kim, Deukjo Hong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim: Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks. IEICE Transactions 91-A(2): 642-649 (2008)
26EEJiqiang Lu, Jongsung Kim: Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis. IEICE Transactions 91-A(9): 2588-2596 (2008)
25EEChanghoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee: Security analysis of the full-round DDO-64 block cipher. Journal of Systems and Software 81(12): 2328-2335 (2008)
2007
24EEJongsung Kim, Seokhie Hong, Bart Preneel: Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. FSE 2007: 225-241
2006
23EEChanghoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee: Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. ACISP 2006: 421-431
22EEDeukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jaesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee: HIGHT: A New Block Cipher Suitable for Low-Resource Device. CHES 2006: 46-59
21EEChanghoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee: Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. ICCSA (3) 2006: 446-455
20EEJiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman: Differential and Rectangle Attacks on Reduced-Round SHACAL-1. INDOCRYPT 2006: 17-31
19EEJiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman: Related-Key Rectangle Attack on 42-Round SHACAL-2. ISC 2006: 85-100
18EEJongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong: On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). SCN 2006: 242-256
17EEJiqiang Lu, Changhoon Lee, Jongsung Kim: Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b. SCN 2006: 95-110
16EEOrr Dunkelman, Nathan Keller, Jongsung Kim: Related-Key Rectangle Attack on the Full SHACAL-1. Selected Areas in Cryptography 2006: 28-44
2005
15EESeokhie Hong, Jongsung Kim, Sangjin Lee, Bart Preneel: Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192. FSE 2005: 368-383
14EEJaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee, Jongin Lim: Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. ICCSA (2) 2005: 567-576
13EEJongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee: On the Security of Encryption Modes of MD4, MD5 and HAVAL. ICICS 2005: 147-158
12EEChanghoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon: Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. IMA Int. Conf. 2005: 201-219
11EEChanghoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee: Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. Mycrypt 2005: 244-262
10 Jaechul Sung, Jongsung Kim, Changhoon Lee, Seokhie Hong: Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds. WEWoRC 2005: 64-75
2004
9EEYongSup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee: Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2. ACISP 2004: 110-122
8EEJongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong: The Related-Key Rectangle Attack - Application to SHACAL-1. ACISP 2004: 123-136
7EETaekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong: Padding Oracle Attacks on Multiple Modes of Operation. ICISC 2004: 343-351
6EEJongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, Jung Hwan Song: Related-Key Attacks on Reduced Rounds of SHACAL-2. INDOCRYPT 2004: 175-190
2003
5EEJongsung Kim, Seokhie Hong, Sangjin Lee, Jung Hwan Song, Hyungjin Yang: Truncated Differential Attacks on 8-Round CRYPTON. ICISC 2003: 446-456
4EEJongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee: Impossible Differential Cryptanalysis for Block Cipher Structures. INDOCRYPT 2003: 82-96
3EESeokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee: Impossible Differential Attack on 30-Round SHACAL-2. INDOCRYPT 2003: 97-106
2002
2EEJongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seokwon Jung: Amplified Boomerang Attack against Reduced-Round SHACAL. ASIACRYPT 2002: 243-253
1997
1EEJongsung Kim, Cheeha Kim: A total ordering protocol using a dynamic token-passing scheme. Distributed Systems Engineering 4(2): 87-95 (1997)

Coauthor Index

1Alex Biryukov [13] [18]
2Donghoon Chang [22] [29]
3Seongtaek Chee [22]
4Jaemin Choi [14]
5Orr Dunkelman [16] [19] [20] [28] [30]
6Deukjo Hong [22] [27]
7Dowon Hong [7] [8]
8Seokhie Hong [2] [3] [4] [5] [8] [9] [10] [11] [12] [15] [18] [21] [22] [23] [24] [25] [27] [29]
9Kitae Jeong [22]
10Seokwon Jung [2]
11Nathan Keller [16] [19] [20] [28] [30]
12Cheeha Kim [1]
13Guil Kim [3] [6] [8] [9]
14Hyun Kim [22]
15Bonseok Koo [22]
16Changhoon Lee [3] [4] [7] [10] [11] [12] [17] [21] [22] [23] [25] [27]
17Eunjin Lee [27] [29]
18Jaesang Lee [22]
19Sangjin Lee [2] [3] [4] [5] [6] [7] [8] [9] [11] [12] [13] [14] [15] [21] [22] [23] [25]
20Taekeon Lee [7]
21Wonil Lee [2]
22Jongin Lim (Jong In Lim) [6] [14] [22] [27]
23Jiqiang Lu (Jiqiang Lv) [17] [19] [20] [26] [28] [30]
24Dukjae Moon [2] [12]
25Bart Preneel [13] [15] [18] [24]
26YongSup Shin [9]
27Jung Hwan Song [5] [6]
28Jaechul Sung [3] [4] [7] [10] [11] [12] [14] [21] [22] [23] [25] [27] [29]
29Hyungjin Yang [5]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)