• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1995 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Chapter

Search results

  • 2004

    Modified power-analysis attacks on XTR and an efficient countermeasure

    Han, D. G., Izu, T., Lim, J. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lopez, J., Qing, S. & Okamoto, E. (eds.). Springer Verlag, p. 305-317 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3269).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Citations (Scopus)
  • On security of XTR public key cryptosystems against side channel attacks

    Han, D. G., Lim, J. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 454-465 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    4 Citations (Scopus)
  • 2003

    Covert channel detection in the ICMP payload using support vector machine

    Sohn, T., Moon, J., Lee, S., Lee, D. H. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Yazici, A. & Sener, C. (eds.). Springer Verlag, p. 828-835 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2869).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    19 Citations (Scopus)
  • Designated verification of non-invertible watermark

    Yoo, H., Lee, H., Lee, S. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Boyd, C. & Mao, W. (eds.). Springer Verlag, p. 338-351 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2851).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • Full-round differential attack on the original version of the hash function proposed at PKC'98

    Chang, D., Sung, J., Sung, S., Lee, S. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Nyberg, K. & Heys, H. (eds.). Springer Verlag, p. 160-174 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2595).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    3 Citations (Scopus)
  • Impossible differential cryptanalysis for block cipher structures

    Kim, J., Hong, S., Sung, J., Lee, S., Lim, J. & Sung, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Johansson, T. & Maitra, S. (eds.). Springer Verlag, p. 82-96 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2904).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    78 Citations (Scopus)
  • Linear cryptanalysis on SPECTR-H64 with higher order differential property

    Ko, Y., Hong, D., Hong, S., Lee, S. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Gorodetsky, V., Popyack, L. & Skormin, V. (eds.). Springer Verlag, p. 298-307 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2776).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    22 Citations (Scopus)
  • Optimal extension fields for XTR

    Han, D. G., Yoon, K. S., Park, Y. H., Kim, C. H. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Nyberg, K. & Heys, H. (eds.). Springer Verlag, p. 369-384 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2595).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    4 Citations (Scopus)