dblp.uni-trier.dewww.uni-trier.de

Jaechul Sung

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
32EEYuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong: Related-Key Chosen IV Attacks on Grain-v1 and Grain-128. ACISP 2008: 321-335
31EEEunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong: Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. FSE 2008: 189-206
30EEEunjin Lee, Jongsung Kim, Deukjo Hong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim: Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks. IEICE Transactions 91-A(2): 642-649 (2008)
29EEDonghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong, Jongin Lim, Haeryong Park, Kilsoo Chun: Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function. IEICE Transactions 91-A(9): 2607-2614 (2008)
28EEChanghoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee: Security analysis of the full-round DDO-64 block cipher. Journal of Systems and Software 81(12): 2328-2335 (2008)
2007
27EEKitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim: Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. ACISP 2007: 143-157
26EEDonghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee: Preimage Attack on the Parallel FFT-Hashing Function. ACISP 2007: 59-67
25EEJaechul Sung, Deukjo Hong, Seokhie Hong: Cryptanalysis of an involutional block cipher using cellular automata. Inf. Process. Lett. 104(5): 183-185 (2007)
2006
24EEChanghoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee: Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. ACISP 2006: 421-431
23EEDeukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jaesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee: HIGHT: A New Block Cipher Suitable for Low-Resource Device. CHES 2006: 46-59
22EEDeukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon, Sungtaek Chee: A New Dedicated 256-Bit Hash Function: FORK-256. FSE 2006: 195-209
21EEChanghoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee: Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. ICCSA (3) 2006: 446-455
20EEKitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jaeheon Kim, Deukjo Hong: Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators. VIETCRYPT 2006: 260-270
19EEDeukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi: Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. J. Cryptology 19(4): 441-462 (2006)
2005
18EEJaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee, Jongin Lim: Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. ICCSA (2) 2005: 567-576
17EEChanghoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon: Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. IMA Int. Conf. 2005: 201-219
16EEDeukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee: How to Construct Universal One-Way Hash Functions of Order r. INDOCRYPT 2005: 63-76
15EEChanghoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee: Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. Mycrypt 2005: 244-262
14 Jaechul Sung, Jongsung Kim, Changhoon Lee, Seokhie Hong: Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds. WEWoRC 2005: 64-75
2004
13EETaekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong: Padding Oracle Attacks on Multiple Modes of Operation. ICISC 2004: 343-351
12EEYoungdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee: Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H. INDOCRYPT 2004: 191-205
11EEDonghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee, Soo Hak Sung: Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. INDOCRYPT 2004: 328-342
2003
10EEJaechul Sung, Deukjo Hong, Sangjin Lee: Key Recovery Attacks on the RMAC, TMAC, and IACBC. ACISP 2003: 265-273
9EEJongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee: Impossible Differential Cryptanalysis for Block Cipher Structures. INDOCRYPT 2003: 82-96
8EESeokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee: Impossible Differential Attack on 30-Round SHACAL-2. INDOCRYPT 2003: 97-106
2002
7EEDonghoon Chang, Jaechul Sung, Soo Hak Sung, Sangjin Lee, Jongin Lim: Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. Selected Areas in Cryptography 2002: 160-174
6EESeokhie Hong, Jaechul Sung, Sangjin Lee, Jongin Lim, Jongsu Kim: Provable security for 13 round Skipjack-like structure. Inf. Process. Lett. 82(5): 243-246 (2002)
2001
5EEDeukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi: Known-IV Attacks on Triple Modes of Operation of Block Ciphers. ASIACRYPT 2001: 208-221
4EEDeukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim: Impossible Differential Cryptanalysis of Zodiac. FSE 2001: 300-311
3EEJaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi: Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. ICISC 2001: 103-113
2000
2EEJaechul Sung, Sangjin Lee, Jong In Lim, Seokhie Hong, Sangjoon Park: Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. ASIACRYPT 2000: 274-288
1EESeokhie Hong, Sangjin Lee, Jongin Lim, Jaechul Sung, Dong Hyeon Cheon, Inho Cho: Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. FSE 2000: 273-283

Coauthor Index

1Donghoon Chang [7] [11] [22] [23] [26] [29] [31]
2Seongtaek Chee [23]
3Sungtaek Chee [22]
4Dong Hyeon Cheon [1]
5Inho Cho [1]
6Jaemin Choi [18]
7Kilsoo Chun [29]
8Deukjo Hong [4] [5] [10] [16] [19] [20] [22] [23] [25] [30]
9Dowon Hong [13]
10Seokhie Hong [1] [2] [5] [6] [8] [9] [11] [12] [14] [15] [16] [17] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32]
11Kitae Jeong [20] [23] [27] [32]
12Guil Kim [8]
13Hyun Kim [23]
14Jaeheon Kim [20]
15Jongsu Kim [6]
16Jongsung Kim [8] [9] [13] [14] [15] [17] [18] [21] [23] [24] [28] [30] [31]
17Youngdai Ko [12]
18Bonseok Koo [23]
19Changhoon Lee [8] [9] [12] [13] [14] [15] [17] [21] [23] [24] [27] [28] [30]
20Eunjin Lee [30] [31]
21Jaesang Lee [22] [23]
22Jesang Lee [29]
23Sangjin Lee [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [26] [28]
24Taekeon Lee [13]
25Wonil Lee [3] [5] [11] [19]
26Yuseop Lee [32]
27Jongin Lim (Jong In Lim) [1] [2] [3] [4] [5] [6] [7] [18] [19] [23] [27] [29] [30]
28Dukjae Moon [17] [22]
29Shiho Moriai [4]
30Mridul Nandi [29]
31Haeryong Park [29]
32Sangjoon Park [2]
33Soo Hak Sung [7] [11]
34Okyeon Yi [3] [5] [19]
35Moti Yung (Mordechai M. Yung) [26]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)