If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2019

Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves

Kim, S., Yoon, K., Park, Y. H. & Hong, S., 2019 Jan 1, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (eds.). Springer, p. 273-292 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11922 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2018

Single Trace Side Channel Analysis on Quantum Key Distribution

Kim, S., Jin, S., Lee, Y., Park, B., Kim, H. & Hong, S., 2018 Nov 16, 9th International Conference on Information and Communication Technology Convergence: ICT Convergence Powered by Smart Intelligence, ICTC 2018. Institute of Electrical and Electronics Engineers Inc., p. 736-739 4 p. 8539703

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2017

STBC: Side Channel Attack Tolerant Balanced Circuit with Reduced Propagation Delay

Kim, H., Hong, S., Preneel, B. & Verbauwhede, I., 2017 Jul 20, Proceedings - 2017 IEEE Computer Society Annual Symposium on VLSI, ISVLSI 2017. IEEE Computer Society, Vol. 2017-July. p. 74-79 6 p. 7987498

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2016

Binary decision diagram to design balanced secure logic styles

Kim, H., Hong, S., Preneel, B. & Verbauwhede, I., 2016 Oct 20, 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design, IOLTS 2016. Institute of Electrical and Electronics Engineers Inc., p. 239-244 6 p. 7604710

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

New efficient padding methods secure against padding oracle attacks

Kang, H., Park, M., Moon, D., Lee, C., Kim, J., Kim, K., Kim, J. & Hong, S., 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 9558. p. 329-342 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9558).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2015

AES Sbox GF(2<sup>4</sup>) inversion functions based PUFs

Kim, H. & Hong, S., 2015 Apr 16, ISOCC 2014 - International SoC Design Conference. Institute of Electrical and Electronics Engineers Inc., p. 15-16 2 p. 7087562

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2014

Distinguishing attack on SDDO-based block cipher BMD-128

Kang, J., Jeong, K., Lee, C. & Hong, S., 2014, Lecture Notes in Electrical Engineering. Springer Verlag, Vol. 280 LNEE. p. 595-602 8 p. (Lecture Notes in Electrical Engineering; vol. 280 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
2012

BAT: Bimodal cryptographic algorithm suitable for various environments

Lee, J., Jeong, K., Kang, J., Lee, Y., Sung, J., Chang, K. Y. & Hong, S., 2012, Computer Science and Its Applications, CSA 2012. p. 371-387 17 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Differential fault analysis on HAS-160 compression function

Kang, J., Jeong, K., Sung, J. & Hong, S., 2012, Computer Science and Its Applications, CSA 2012. p. 97-105 9 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Differential fault analysis on the block cipher HIGHT

Lee, Y., Kim, J., Park, J. H. & Hong, S., 2012, Future Information Technology, Application, and Service, FutureTech 2012. VOL. 1 ed. p. 407-416 10 p. (Lecture Notes in Electrical Engineering; vol. 164 LNEE, no. VOL. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Extended NIST prime family for efficient modular reduction

Cho, Y. I., Chang, N. S., Kim, C. H. & Hong, S., 2012, Computer Science and Convergence, CSA 2011 and WCC 2011 Proceedings. p. 105-111 7 p. (Lecture Notes in Electrical Engineering; vol. 114 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Improved differential fault analysis on block cipher SEED-128

Lee, Y., Kim, J., Hong, S. & Lee, C., 2012, Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012. p. 675-680 6 p. 6354905. (Proceedings of the 2012 15th International Conference on Network-Based Information Systems, NBIS 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security analysis of the keyschedule of ARIA-128

Kang, H., Lee, Y., Jeong, K., Sung, J. & Hong, S., 2012, Computer Science and Its Applications, CSA 2012. p. 243-251 9 p. (Lecture Notes in Electrical Engineering; vol. 203 LNEE).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2011

A fast and provably secure higher-order masking of AES S-box

Kim, H. S., Hong, S. & Lim, J., 2011, Cryptographic Hardware and Embedded Systems - 13th International Workshop, CHES 2011, Proceedings. p. 95-107 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6917 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

58 Citations (Scopus)

An efficient implementation of KCDSA on Graphic Processing Units

Seo, S. C., Paik, J. H., Lee, D. H., Hong, S., Lee, H. J. & Jung, H. C., 2011, Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011. p. 167-172 6 p. 5992210. (Proceedings of the 2011 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, MUE 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Fault injection attack on A5/3

Jeong, K., Lee, Y., Sung, J. & Hong, S., 2011, Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011. p. 300-303 4 p. 5951922. (Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
2009

A new double-block-length hash function using feistel structure

Lee, J., Hong, S., Sung, J. & Park, H., 2009, Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. p. 11-20 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5576 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)
2008

Extraction of residual information in the microsoft powerpoint file from the viewpoint of digital forensics considering PerCom environment

Park, J., Park, B., Lee, S., Hong, S. & Park, J. H., 2008, 6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008. p. 584-589 6 p. 4517460. (6th Annual IEEE International Conference on Pervasive Computing and Communications, PerCom 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Related-key chosen IV attacks on grain-v1 and grain-128

Lee, Y., Jeong, K., Sung, J. & Hong, S., 2008, Information Security and Privacy - 13th Australasian Conference, ACISP 2008, Proceedings. p. 321-335 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5107 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

49 Citations (Scopus)

Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on HMAC/NMAC-3-pass HAVAL

Lee, E., Chang, D., Kim, J., Sung, J. & Hong, S., 2008, Fast Software Encryption - 15th International Workshop, FSE 2008, Revised Selected Papers. p. 189-206 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5086 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Security analysis of CIKS-128 and CIKS-128H using key schedule weaknesses

Lee, C., Kim, J., Hong, S., Lee, S., Sung, J. & Lee, H. M., 2008, Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008. p. 199-206 8 p. 4654086. (Proceedings - International Symposium on Computer Science and Its Applications, CSA 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smart card-based three-party key exchange without server's assistance

Kim, Y. H., Youn, T. G., Park, Y. H. & Hong, S. H., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 146-149 4 p. 4511552. (Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2007

Preimage attack on the parallel FFT-hashing function

Donghoon, C., Moti, Y., Jaechul, S., Seokhie, H. & Sangjin, L., 2007, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. p. 59-67 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128

Jeong, K., Lee, C., Sung, J., Hong, S. & Lim, J., 2007, Information Security and Privacy - 12th Australasian Conference, ACISP 2007, Proceedings. Springer Verlag, p. 143-157 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4586 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Related-key rectangle attacks on reduced AES-192 and AES-256

Kim, J., Hong, S. & Preneel, B., 2007, Fast Software Encryption - 14th International Workshop, FSE 2007. Springer Verlag, p. 225-241 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4593 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
54 Citations (Scopus)
2006

A new dedicated 256-bit hash function: FORK-256

Hong, D., Chang, D., Sung, J., Lee, S., Hong, S., Lee, J., Moon, D. & Chee, S., 2006, Fast Software Encryption - 13th International Workshop, FSE 2006, Revised Selected Papers. Springer Verlag, p. 195-209 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4047 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
15 Citations (Scopus)

A weak key class of XTEA for a related-key rectangle attack

Lee, E., Hong, D., Chang, D., Hong, S. & Lim, J., 2006, Progress in Cryptology, VIETCRYPT 2006 - 1st International Conference on Cryptology in Vietnam, Revised Selected Papers. p. 286-297 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4341 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Finding collision on 45-Step HAS-160

Yun, A., Sung, S. H., Park, S., Chang, D., Hong, S. & Cho, H. S., 2006, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer Verlag, p. 146-155 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Forgery and key recovery attacks on PMAC and Mitchell's TMAC variant

Lee, C., Kim, J., Sung, J., Hong, S. & Lee, S., 2006, Information Security and Privacy: 11th Australasian Conference, ACISP 2006, Proceedings. Springer Verlag, p. 421-431 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4058 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

HIGHT: A new block cipher suitable for low-resource device

Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B. S., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J. & Chee, S., 2006, Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings. Springer Verlag, p. 46-59 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4249 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

377 Citations (Scopus)

Improved fast correlation attack on the shrinking and self-shrinking generators

Jeong, K., Sung, J., Hong, S., Lee, S., Kim, J. & Hong, D., 2006, Progress in Cryptology, VIETCRYPT 2006 - 1st International Conference on Cryptology in Vietnam, Revised Selected Papers. p. 260-270 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4341 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1

Kim, J., Biryukov, A., Preneel, B. & Hong, S., 2006, Security and Cryptography for Networks - 5th International Conference, SCN 2006, Proceedings. Springer Verlag, p. 242-256 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4116 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

42 Citations (Scopus)

Provable security for an RC6-like structure and a MISTY-FO-like structure against differential cryptanalysis

Lee, C., Kim, J., Sung, J., Hong, S. & Lee, S., 2006, Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part III. Springer Verlag, p. 446-455 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3982 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)
2005

How to construct universal one-way hash functions of order r

Hong, D., Sung, J., Hong, S. & Lee, S., 2005, Progress in Cryptology - INDOCRYPT 2005 - 6th International Conference on Cryptology in India, Proceedings. Springer Verlag, p. 63-76 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3797 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Related-cipher attacks on block ciphers with flexible number of rounds

Sung, J., Kim, J., Lee, C. & Hong, S., 2005, WEWoRC 2005 - Western European Workshop on Research in Cryptology. p. 64-75 12 p. (Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI); vol. P-74).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Related-key differential attacks on Cobra-H64 and Cobra-H128

Lee, C., Kim, J., Sung, J., Hong, S., Lee, S. & Moon, D., 2005, Cryptography and Coding - 10th IMA International Conference, Proceedings. Springer Verlag, p. 201-219 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3796 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Citations (Scopus)

Related-key differential attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b

Lee, C., Kim, J., Hong, S., Sung, J. & Lee, S., 2005, Progress in Cryptology - Mycrypt 2005 - First International Conference on Cryptology in Malaysia, Proceedings. Springer Verlag, p. 244-262 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3715 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)
2002

Amplified boomerang attack against reduced-round shacal

Kim, J., Moon, D., Lee, W., Hong, S., Lee, S. & Jung, S., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2501. p. 243-253 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2501).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Truncated differential cryptanalysis of Camellia

Lee, S., Hong, S., Lee, S., Lim, J. I. & Yoon, S., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2288. p. 32-38 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Citations (Scopus)
2001

Difference distribution attack on DONUT and improved DONUT

Cheon, D. H., Hong, S., Lee, S., Lee, S. J., Park, K. H. & Yoon, S. H., 2001, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2015. p. 37-48 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Known-IV attacks on triple modes of operation of block ciphers

Hong, D., Sung, J., Hong, S., Lee, W., Lee, S., Lim, J. I. & Yi, O., 2001, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2248. p. 208-221 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2248).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Provable security against differential and linear cryptanalysis for the SPN structure

Hong, S., Lee, S., Lim, J., Sung, J., Cheon, D. & Cho, I., 2001, Fast Software Encryption - 7th International Workshop, FSE 2000, Proceedings. Schneier, B. (ed.). Springer Verlag, p. 273-283 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1978).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
46 Citations (Scopus)
2000

A proposal of a new public key cryptosystem using matrices over a ring

Yoo, H., Hong, S., Lee, S., Lim, J. I., Yi, O. & Sung, M., 2000, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1841. p. 41-48 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Provable security for the Skipjack-like structure against differential cryptanalysis and linear cryptanalysis

Sung, J., Lee, S., Lim, J., Hong, S. & Park, S., 2000, Advances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Okamoto, T. (ed.). Springer Verlag, p. 274-288 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1976).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
15 Citations (Scopus)