dblp.uni-trier.dewww.uni-trier.de

Yongjin Yeom

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
8EEJooyoung Lee, Yongjin Yeom: Efficient RFID authentication protocols based on pseudorandom sequence generators. Des. Codes Cryptography 51(2): 195-210 (2009)
2008
7EELei Zhang, Wenling Wu, Je Hong Park, Bon Wook Koo, Yongjin Yeom: Improved Impossible Differential Attacks on Large-Block Rijndael. ISC 2008: 298-315
6EEYongjin Yeom, Yongkuk Cho, Moti Yung: High-Speed Implementations of Block Cipher ARIA Using Graphics Processing Units. MUE 2008: 271-275
2007
5EEDaewan Han, Myung-Hwan Kim, Yongjin Yeom: Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003. Public Key Cryptography 2007: 107-117
2006
4EEDaesung Kwon, Daewan Han, Jooyoung Lee, Yongjin Yeom: Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005. EUC Workshops 2006: 262-270
2005
3EEJin Hong, Dong Hoon Lee, Yongjin Yeom, Daewan Han: A New Class of Single Cycle T-Functions. FSE 2005: 68-82
2003
2EEDaesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong: New Block Cipher: ARIA. ICISC 2003: 432-445
2002
1EEYongjin Yeom, Sangwoo Park, Iljun Kim: On the Security of CAMELLIA against the Square Attack. FSE 2002: 89-99

Coauthor Index

1Seongtaek Chee [2]
2Yongkuk Cho [6]
3Daewan Han [2] [3] [4] [5]
4Jin Hong [2] [3]
5Iljun Kim [1]
6Jaesung Kim [2]
7Myung-Hwan Kim [5]
8Bon Wook Koo [7]
9Daesung Kwon [2] [4]
10Jaewon Lee [2]
11Jooyoung Lee [4] [8]
12Sangjin Lee [2]
13Dong Hoon Lee [3]
14Je Hong Park [7]
15Sangwoo Park [1] [2]
16Yaekwon Sohn [2]
17Jung Hwan Song [2]
18Soo Hak Sung [2]
19Wenling Wu [7]
20E-Joong Yoon [2]
21Moti Yung (Mordechai M. Yung) [6]
22Lei Zhang [7]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)