Graduate School of Information Study

  • Postal address

    Korea, Republic of

Filter
Conference contribution

Search results

  • 2006

    Further security analysis of XTR

    Han, D. G., Takagi, T. & Lim, J., 2006, Information Security Practice and Experience - Second International Conference, ISPEC 2006, Proceedings. p. 33-44 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3903 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Generic cryptanalysis of combined countermeasures with randomized BSD representations

    Kim, T. H., Han, D. G., Okeya, K. & Lim, J., 2006, Smart Card Research and Advanced Applications - 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Proceedings. Domingo-Ferrer, J., Posegga, J. & Schreckling, D. (eds.). Springer Verlag, p. 119-134 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3928 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • Generic transformation for scalable broadcast encryption schemes

    Hwang, J. Y., Lee, D. H. & Lim, J., 2006, Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings. p. 276-292 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • High-speed RSA crypto-processor with radix-4 modular multiplication and Chinese remainder theorem

    Koo, B., Lee, D., Ryu, G., Chang, T. & Lee, S., 2006, Information Security and Cryptology - ICISC 2006: 9th International Conference, Proceedings. p. 81-93 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4296 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • HIGHT: A new block cipher suitable for low-resource device

    Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B. S., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J. & Chee, S., 2006, Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings. Springer Verlag, p. 46-59 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4249 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    468 Citations (Scopus)
  • Improved fast correlation attack on the shrinking and self-shrinking generators

    Jeong, K., Sung, J., Hong, S., Lee, S., Kim, J. & Hong, D., 2006, Progress in Cryptology, VIETCRYPT 2006 - 1st International Conference on Cryptology in Vietnam, Revised Selected Papers. Springer Verlag, p. 260-270 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4341 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Indifferentiable security analysis of popular hash functions with prefix-free padding

    Chang, D., Lee, S., Nandi, M. & Yung, M., 2006, Advances in Cryptology - ASIACRYPT 2006 - 12th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 283-298 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4284 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Citations (Scopus)
  • LAID: Load-adaptive Internet gateway discovery for ubiquitous wireless Internet access networks

    Park, B. N., Lee, W., Lee, C., Hong, J. P. & Kim, J., 2006, Information Networking: Advances in Data Communications and Wireless Networks - International Conference, ICOIN 2006. Revised Selected Papers. Springer Verlag, p. 349-358 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3961 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Modified ID-based threshold decryption and its application to mediated ID-based encryption

    Ju, H. S., Kim, D. Y., Lee, D. H., Park, H. & Chun, K., 2006, Frontiers of WWW Research and Development - APWeb 2006 - 8th Asia-Pacific Web Conference, Proceedings. p. 720-725 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • New steganalysis methodology: LR cube analysis for the detection of LSB steganography

    Lee, K., Jung, C., Lee, S. & Lim, J., 2006, Information Hiding - 7th International Workshop, IH 2005, Revised Selected Papers. Springer Verlag, p. 312-326 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3727 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Off-line keyword guessing attacks on recent keyword search schemes over encrypted data

    Byun, J. W., Rhee, H. S., Park, H. A. & Lee, D. H., 2006, Secure Data Management - Third VLDB Workshop, SDM 2006, Proceedings. Springer Verlag, p. 75-83 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4165 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    214 Citations (Scopus)
  • One-round protocol for two-party verifier-based password-authenticated key exchange

    Kwon, J. O., Sakurai, K. & Lee, D. H., 2006, Communications and Multimedia Security - 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Proceedings. Leitold, H. & Markatos, E. (eds.). Springer Verlag, p. 87-96 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4237 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Citations (Scopus)
  • On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1

    Kim, J., Biryukov, A., Preneel, B. & Hong, S., 2006, Security and Cryptography for Networks - 5th International Conference, SCN 2006, Proceedings. Springer Verlag, p. 242-256 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4116 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    63 Citations (Scopus)
  • Provable security for an RC6-like structure and a MISTY-FO-like structure against differential cryptanalysis

    Lee, C., Kim, J., Sung, J., Hong, S. & Lee, S., 2006, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III. Springer Verlag, p. 446-455 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3982 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Provably-secure two-round password-authenticated group key exchange in the standard model

    Kwon, J. O., Jeong, I. R. & Lee, D. H., 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer Verlag, p. 322-336 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • QoS-aware adaptive internet gateway selection in ad hoc wireless internet access networks

    Park, B. N., Lee, W., Lee, C. & Shin, C. K., 2006, 2006 3rd International Conference on Broadband Communications, Networks and Systems, BROADNETS 2006. 4374361. (2006 3rd International Conference on Broadband Communications, Networks and Systems, BROADNETS 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • QoS provisioning in IEEE 802.11 wireless LANs

    Tran, S. N. H. & Wonjun, L., 2006, HUT-ICCE 2006 1st International Conference on Communications and Electronics, Proceedings. p. 23-28 6 p. 4156505. (HUT-ICCE 2006 First International Conference on Communications and Electronics, Proceedings; vol. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Secrecy analysis of purchase transaction in electronic purses

    Kim, I. G., Kim, H. S., Lee, J. Y., Kang, I. & Choi, J. Y., 2006, Proceedings - 20th International Conference on Advanced Information Networking and Applications. p. 979-984 6 p. 1620313. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Securing Internet gateway discovery protocol in ubiquitous wireless Internet access networks

    Park, B. N., Lee, W. & Shin, C., 2006, Embedded and Ubiquitous Computing - International Conference, EUC 2006, Proceedings. Springer Verlag, p. 318-327 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4096 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Security analysis of RFID authentication for pervasive systems using model checking

    Kim, H. S., Oh, J. H. & Choi, J. Y., 2006, Proceedings - 30th Annual International Computer Software and Applications Conference, COMPSAC 2006 - Short Papers/Workshops/Fast Abstracts/Doctoral Symposium. p. 195-202 8 p. 4020167. (Proceedings - International Computer Software and Applications Conference; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Security and privacy analysis of RFID systems using model checking

    Kim, H. S., Kim, I. G., Han, K. H. & Choi, J. Y., 2006, High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings. Springer Verlag, p. 495-504 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4208 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Side channel attacks and countermeasures on pairing based cryptosystems over binary fields

    Kim, T. H., Takagi, T., Han, D. G., Kim, H. W. & Lim, J., 2006, Cryptology and Network Security - 5th International Conference, CANS 2006, Proceedings. Springer Verlag, p. 168-181 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Citations (Scopus)
  • The vulnerabilities analysis and design of the security protocol for RFID system

    Kim, H. S., Oh, J. H., Choi, J. Y. & Kim, J. W., 2006, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006. 4019943. (Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • UbiComm: An Adaptive Vertical Handoff Decision Scheme for heterogeneous wireless networks

    Lee, W., Kim, E., Yu, J., Lee, D., Choi, J., Kim, J. & Shin, C. K., 2006, Ubiquitous Computing Systems - Third International Symposium, UCS 2006, Proceedings. Springer Verlag, p. 344-356 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4239 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • uiH-PMAC model suitable for Ubi-home gateway in ubiquitous intelligent environment

    Park, J. H., Lee, S., Koh, B. S. & Jang, J. H., 2006, Knowledge-Based Intelligent Information and Engineering Systems - 10th International Conference, KES 2006, Proceedings. Springer Verlag, p. 777-784 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4252 LNAI - II).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Verifying software streaming systems

    Nam, K. H., Park, J. K., Choi, J. Y., Lee, J. J. & Choi, W., 2006, 8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings. p. 367-371 5 p. 1625592. (8th International Conference Advanced Communication Technology, ICACT 2006 - Proceedings; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Video inpainting and implant via diversified temporal continuations

    Shih, T. K., Tang, N. C., Yeh, W. S., Chen, T. J. & Lee, W., 2006, Proceedings of the 14th Annual ACM International Conference on Multimedia, MM 2006. p. 133-136 4 p. (Proceedings of the 14th Annual ACM International Conference on Multimedia, MM 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • W-LLC: Weighted low-energy localized clustering for embedded networked sensors

    Kim, J., Lee, W., Kim, E. & Lee, C., 2006, Fuzzy Systems and Knowledge Discovery - Second International Conference, FSKD 2005, Proceedings. Springer Verlag, p. 1162-1165 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3614 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2005

    A fast inversion algorithm and low-complexity architecture over GF(2 m)

    Kim, S., Chang, N. S., Kim, C. H., Park, Y. H. & Lim, J., 2005, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. Springer Verlag, p. 1-8 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3802 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A key management scheme for commodity sensor networks

    Kim, Y. H., Kim, M. H., Lee, D. H. & Kim, C., 2005, Ad-Hoc, Mobile, and Wireless Networks - 4th International Conference, ADHOC-NOW 2005, Proceedings. Springer Verlag, p. 113-126 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3738 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Analysis and modification of ASK mobile security protocol

    Kim, I. G., Kim, H. S., Lee, J. Y. & Choi, J. Y., 2005, Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05. p. 79-83 5 p. 1581579. (Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Analyzing the application of e-Commerce in wireless

    Kim, H. S., Kim, I. G. & Choi, J. Y., 2005, Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05. p. 112-120 9 p. 1581583. (Proceedings - 2005 Second IEEE International Workshop on Mobile Commerce and Services, WMCS'05; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A non-redundant and efficient architecture for Karatsuba-Ofman algorithm

    Chang, N. S., Kim, C. H., Park, Y. H. & Lim, J., 2005, Information Security - 8th International Conference, ISC 2005, Proceedings. Springer Verlag, p. 288-299 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3650 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Applying LR cube analysis to JSteg detection

    Lee, K., Jung, C., Lee, S., Kim, H. J. & Lim, J., 2005, Communications and Multimedia Security - 9th IFIP TC-6 TC-11International Conference, CMS 2005, Proceedings. Dittmann, J., Katzenbeisser, S. & Uhl, A. (eds.). Springer Verlag, p. 275-276 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • A real coded genetic algorithm for data partitioning and scheduling in networks with arbitrary processor release time

    Suresh, S., Mani, V., Omkar, S. N. & Kim, H. J., 2005, Advances in Computer Systems Architecture - 10th Asia-Pacific Conference, ACSAC 2005, Proceedings. p. 529-539 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3740 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Authenticated public key distribution scheme without trusted third party

    Koo, J. H., Kim, B. H. & Lee, D. H., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 926-935 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A watermarking method using quantization and statistical characteristics of wavelet transform

    Byun, K. D., Lee, S. & Kim, H. J., 2005, Proceedings - Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2005. p. 689-693 5 p. 1579008. (Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Design and implementation of the IMS-IPMP system in convergence home-network environment

    Park, J. H., Lee, S. J., Kim, Y. & Koh, B. S., 2005, Digital Libraries: Implementing Strategies and Sharing Experiences - 8th International Conference on Asian Digital Libraries, ICADL 2005, Proceedings. Springer Verlag, p. 465-466 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3815 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Digital evidence collection process in integrity and memory information gathering

    Lee, S., Kim, H., Lee, S. & Lim, J., 2005, Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering. p. 236-247 12 p. 1592536. (Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Effect of localized optimal clustering for reader anti-collision in RFID networks: Fairness aspects to the readers

    Kim, J., Lee, W., Yu, J., Myung, J., Kim, E. & Lee, C., 2005, Proceedings - 14th International Conference on Computer Communications and Networks, ICCCN 2005. p. 497-502 6 p. 1523923. (Proceedings - International Conference on Computer Communications and Networks, ICCCN; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    40 Citations (Scopus)
  • Efficient RFID authentication protocol for ubiquitous computing environment

    Choi, E. Y., Lee, S. M. & Lee, D. H., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y. & Yang, L. T. (eds.). Springer Verlag, p. 945-954 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    53 Citations (Scopus)
  • How to construct universal one-way hash functions of order r

    Hong, D., Sung, J., Hong, S. & Lee, S., 2005, Progress in Cryptology - INDOCRYPT 2005 - 6th International Conference on Cryptology in India, Proceedings. Springer Verlag, p. 63-76 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3797 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Intelligent multimedia service system based on context awareness in smart home

    Park, J. H., Park, H. S., Lee, S. J., Choi, J. & Lee, D. G., 2005, Knowledge-Based Intelligent Information and Engineering Systems - 9th International Conference, KES 2005, Proceedings. Springer Verlag, p. 1146-1152 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3681 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Model-based analysis of money accountability in electronic purses

    Kim, I. G., Moon, Y. J., Kang, I., Lee, J. Y., Han, K. H. & Choi, J. Y., 2005, Internet and Network Economics - First International Workshop, WINE 2005, Proceedings. Springer Verlag, p. 346-355 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3828 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Oblivious conjunctive keyword search

    Rhee, H. S., Byun, J. W., Lee, D. H. & Lim, J., 2005, Information Security Applications - 6th International Workshop, WISA 2005, Revised Selected Papers. p. 318-327 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3786 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • On energy-aware dynamic clustering for hierarchical sensor networks

    Kim, J., Lee, W., Kim, E., Kim, J., Lee, C., Kim, S. & Kim, S., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y. & Yang, L. T. (eds.). Springer Verlag, p. 460-469 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • On the security of encryption modes of MD4, MD5 and HAVAL

    Kim, J., Biryukov, A., Preneel, B. & Lee, S., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. Springer Verlag, p. 147-158 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Password-based group key exchange secure against insider guessing attacks

    Byun, J. W., Lee, D. H. & Lim, J., 2005, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. p. 143-148 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3802 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Related-cipher attacks on block ciphers with flexible number of rounds

    Sung, J., Kim, J., Lee, C. & Hong, S., 2005, WEWoRC 2005 - Western European Workshop on Research in Cryptology. p. 64-75 12 p. (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI); vol. P-74).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Related-key differential attacks on Cobra-H64 and Cobra-H128

    Lee, C., Kim, J., Sung, J., Hong, S., Lee, S. & Moon, D., 2005, Cryptography and Coding - 10th IMA International Conference, Proceedings. Springer Verlag, p. 201-219 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3796 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)