HIGHT: a new block cipher suitable for low-resource device. Zbl 1307.94058
Hong, Deukjo; Sung, Jaechul; Hong, Seokhie; Lim, Jongin; Lee, Sangjin; Koo, Bon-Seok; Lee, Changhoon; Chang, Donghoon; Lee, Jesang; Jeong, Kitae; Kim, Hyun; Kim, Jongsung; Chee, Seongtaek |
|
2006
|
An alternating projection algorithm for computing the nearest Euclidean distance matrix. Zbl 0728.65034
Glunt, W.; Hayden, T. L.; Hong, S.; Wells, J. |
|
1990
|
Impossible differential cryptanalysis for block cipher structures. Zbl 1123.94352
Kim, Jongsung; Hong, Seokhie; Sung, Jaechul; Lee, Sangjin; Lim, Jongin; Sung, Soohak |
|
2003
|
Provable security against differential and linear cryptanalysis for the SPN structure. Zbl 0994.68505
Hong, Seokhie; Lee, Sangjin; Lim, Jongin; Sung, Jaechul; Cheon, Donghyeon; Cho, Inho |
|
2001
|
Related-key rectangle attacks on reduced AES-192 and AES-256. Zbl 1186.94455
Kim, Jongsung; Hong, Seokhie; Preneel, Bart |
|
2007
|
Related key differential attacks on 27 rounds of XTEA and full-round GOST. Zbl 1079.68548
Ko, Youngdai; Hong, Seokhie; Lee, Wonil; Lee, Sangjin; Kang, Ju-Sung |
|
2004
|
Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192. Zbl 1140.94346
Hong, Seokhie; Kim, Jongsung; Lee, Sangjin; Preneel, Bart |
|
2005
|
The related-key rectangle attack-application to SHACAL-1. Zbl 1098.94619
Kim, Jongsung; Kim, Guil; Hong, Seokhie; Lee, Sangjin; Hong, Dowon |
|
2004
|
On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. (Extended abstract). Zbl 1152.94428
Kim, Jongsung; Biryukov, Alex; Preneel, Bart; Hong, Seokhie |
|
2006
|
Related-key boomerang and rectangle attacks: theory and experimental analysis. Zbl 1365.94438
Kim, Jongsung; Hong, Seokhie; Preneel, Bart; Biham, Eli; Dunkelman, Orr; Keller, Nathan |
|
2012
|
Related-key chosen IV attacks on Grain-v1 and Grain-128. Zbl 1285.94076
Lee, Yuseop; Jeong, Kitae; Sung, Jaechul; Hong, Seokhie |
|
2008
|
Impossible differential cryptanalysis using matrix method. Zbl 1235.94048
Kim, Jongsung; Hong, Seokhie; Lim, Jongin |
|
2010
|
Optimized method for computing odd-degree isogenies on Edwards curves. Zbl 1458.94251
Kim, Suhri; Yoon, Kisoon; Park, Young-Ho; Hong, Seokhie |
|
2019
|
A fast and provably secure higher-order masking of AES S-box. Zbl 1321.94068
Kim, HeeSeok; Hong, Seokhie; Lim, Jongin |
|
2011
|
Provable security for the skipjack-like structure against differential cryptanalysis and linear cryptanalysis. Zbl 0965.94016
Sung, Jaechul; Lee, Sangjin; Lim, Jongin; Hong, Seokhie; Park, Sangjoon |
|
2000
|
A new dedicated 256-bit hash function: FORK-256. Zbl 1186.94446
Hong, Deukjo; Chang, Donghoon; Sung, Jaechul; Lee, Sangjin; Hong, Seokhie; Lee, Jaesang; Moon, Dukjae; Chee, Sungtaek |
|
2006
|
PIPO: a lightweight block cipher with efficient higher-order masking software implementations. Zbl 07497442
Kim, Hangi; Jeon, Yongjin; Kim, Giyoon; Kim, Jongsung; Sim, Bo-Yeon; Han, Dong-Guk; Seo, Hwajeong; Kim, Seonggyeom; Hong, Seokhie; Sung, Jaechul; Hong, Deukjo |
|
2021
|
Truncated differential cryptanalysis of Camellia. Zbl 0994.68578
Lee, Seonhee; Hong, Seokhie; Lee, Sangjin; Lim, Jongin; Yoon, Seonhee |
|
2002
|
Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on HMAC/NMAC-3-pass HAVAL. Zbl 1154.68398
Lee, Eunjin; Chang, Donghoon; Kim, Jongsung; Sung, Jaechul; Hong, Seokhie |
|
2008
|
Colored simultaneous geometric embeddings. Zbl 1206.05036
Brandes, U.; Erten, C.; Fowler, J.; Frati, F.; Geyer, M.; Gutwenger, C.; Hong, S.; Kaufmann, M.; Kobourov, S. G.; Liotta, G.; Mutzel, P.; Symvonis, A. |
|
2007
|
Differential cryptanalysis of TEA and XTEA. Zbl 1092.94507
Hong, Seokhie; Hong, Deukjo; Ko, Youngdai; Chang, Donghoon; Lee, Wonil; Lee, Sangjin |
|
2004
|
New hybrid method for isogeny-based cryptosystems using Edwards curves. Zbl 1446.94145
Kim, Suhri; Yoon, Kisoon; Kwon, Jihoon; Park, Young-Ho; Hong, Seokhie |
|
2020
|
A weak key class of XTEA for a related-key rectangle attack. Zbl 1295.94102
Lee, Eunjin; Hong, Deukjo; Chang, Donghoon; Hong, Seokhie; Lim, Jongin |
|
2006
|
Provable security for an RC6-like structure and a MISTY-FO-like structure against differential cryptanalysis. Zbl 1172.68465
Lee, Changhoon; Kim, Jongsung; Sung, Jaechul; Hong, Seokhie; Lee, Sangjin |
|
2006
|
Amplified boomerang attack against reduced-round SHACAL. Zbl 1065.94553
Kim, Jongsung; Moon, Dukjae; Lee, Wonil; Hong, Seokhie; Lee, Sangjin; Jung, Seokwon |
|
2002
|
Differential-linear type attacks on reduced rounds of SHACAL-2. Zbl 1098.94629
Shin, Yongsup; Kim, Jongsung; Kim, Guil; Hong, Seokhie; Lee, Sangjin |
|
2004
|
Approximate analysis of a discrete-time queueing model of the shared buffer ATM switch. Zbl 0789.60070
Hong, S.; Perros, H. G.; Yamashita, H. |
|
1993
|
Forgery and key recovery attacks on pmac and mitchell’s tmac variant. Zbl 1176.94049
Lee, Changhoon; Kim, Jongsung; Sung, Jaechul; Hong, Seokhie; Lee, Sangjin |
|
2006
|
Truncated differential attacks on 8-round CRYPTON. Zbl 1092.94508
Kim, Jongsung; Hong, Seokhie; Lee, Sangjin; Song, Junghwan; Yang, Hyungjin |
|
2004
|
Finding collision on 45-step HAS-160. Zbl 1185.94071
Yun, Aaram; Sung, Soo Hak; Park, Sangwoo; Chang, Donghoon; Hong, Seokhie; Cho, Hong-Su |
|
2006
|
A proposal of a new public key cryptosystem using matrices over a ring. Zbl 0963.94014
Yoo, Heajoung; Hong, Seokhie; Lee, Sangjin; Lim, Jongin; Yi, Okyeon; Sung, Maenghee |
|
2000
|
The asymmetric travelling salesman problem and spanning arborescences of directed graphs. Zbl 0394.90063
Hong, S. |
|
1977
|
Improved differential fault analysis on PRESENT-80/128. Zbl 1291.94106
Jeong, Kitae; Lee, Yuseop; Sung, Jaechul; Hong, Seokhie |
|
2013
|
Differential fault analysis on block cipher SEED. Zbl 1245.94075
Jeong, Kitae; Lee, Yuseop; Sung, Jaechul; Hong, Seokhie |
|
2012
|
First-order side channel attacks on Zhang’s countermeasures. Zbl 1242.94031
Kim, Heeseok; Han, Dong-Guk; Hong, Seokhie |
|
2011
|
Uniqueness of some optimal superimposed codes. Zbl 1160.94394
Hong, S.; Kapralov, S.; Kim, H. K.; Oh, D. Y. |
|
2007
|
A new double-block-length hash function using Feistel structure. Zbl 1365.94441
Lee, Jesang; Hong, Seokhie; Sung, Jaechul; Park, Haeryong |
|
2009
|
Formulas for cube roots in \(\mathbb F_{3^m}\) using shifted polynomial basis. Zbl 1285.94049
Cho, Young In; Chang, Nam Su; Hong, Seokhie |
|
2014
|
Impossible differential attack on 30-round SHACAL-2. Zbl 1123.94345
Hong, Seokhie; Kim, Jongsung; Kim, Guil; Sung, Jaechul; Lee, Changhoon; Lee, Sangjin |
|
2003
|
New space-efficient quantum algorithm for binary elliptic curves using the optimized division algorithm. Zbl 07695220
Kim, Hyeonhak; Hong, Seokhie |
|
2023
|
New space-efficient quantum algorithm for binary elliptic curves using the optimized division algorithm. Zbl 07695220
Kim, Hyeonhak; Hong, Seokhie |
|
2023
|
PIPO: a lightweight block cipher with efficient higher-order masking software implementations. Zbl 07497442
Kim, Hangi; Jeon, Yongjin; Kim, Giyoon; Kim, Jongsung; Sim, Bo-Yeon; Han, Dong-Guk; Seo, Hwajeong; Kim, Seonggyeom; Hong, Seokhie; Sung, Jaechul; Hong, Deukjo |
|
2021
|
New hybrid method for isogeny-based cryptosystems using Edwards curves. Zbl 1446.94145
Kim, Suhri; Yoon, Kisoon; Kwon, Jihoon; Park, Young-Ho; Hong, Seokhie |
|
2020
|
Optimized method for computing odd-degree isogenies on Edwards curves. Zbl 1458.94251
Kim, Suhri; Yoon, Kisoon; Park, Young-Ho; Hong, Seokhie |
|
2019
|
Formulas for cube roots in \(\mathbb F_{3^m}\) using shifted polynomial basis. Zbl 1285.94049
Cho, Young In; Chang, Nam Su; Hong, Seokhie |
|
2014
|
Improved differential fault analysis on PRESENT-80/128. Zbl 1291.94106
Jeong, Kitae; Lee, Yuseop; Sung, Jaechul; Hong, Seokhie |
|
2013
|
Related-key boomerang and rectangle attacks: theory and experimental analysis. Zbl 1365.94438
Kim, Jongsung; Hong, Seokhie; Preneel, Bart; Biham, Eli; Dunkelman, Orr; Keller, Nathan |
|
2012
|
Differential fault analysis on block cipher SEED. Zbl 1245.94075
Jeong, Kitae; Lee, Yuseop; Sung, Jaechul; Hong, Seokhie |
|
2012
|
A fast and provably secure higher-order masking of AES S-box. Zbl 1321.94068
Kim, HeeSeok; Hong, Seokhie; Lim, Jongin |
|
2011
|
First-order side channel attacks on Zhang’s countermeasures. Zbl 1242.94031
Kim, Heeseok; Han, Dong-Guk; Hong, Seokhie |
|
2011
|
Impossible differential cryptanalysis using matrix method. Zbl 1235.94048
Kim, Jongsung; Hong, Seokhie; Lim, Jongin |
|
2010
|
A new double-block-length hash function using Feistel structure. Zbl 1365.94441
Lee, Jesang; Hong, Seokhie; Sung, Jaechul; Park, Haeryong |
|
2009
|
Related-key chosen IV attacks on Grain-v1 and Grain-128. Zbl 1285.94076
Lee, Yuseop; Jeong, Kitae; Sung, Jaechul; Hong, Seokhie |
|
2008
|
Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on HMAC/NMAC-3-pass HAVAL. Zbl 1154.68398
Lee, Eunjin; Chang, Donghoon; Kim, Jongsung; Sung, Jaechul; Hong, Seokhie |
|
2008
|
Related-key rectangle attacks on reduced AES-192 and AES-256. Zbl 1186.94455
Kim, Jongsung; Hong, Seokhie; Preneel, Bart |
|
2007
|
Colored simultaneous geometric embeddings. Zbl 1206.05036
Brandes, U.; Erten, C.; Fowler, J.; Frati, F.; Geyer, M.; Gutwenger, C.; Hong, S.; Kaufmann, M.; Kobourov, S. G.; Liotta, G.; Mutzel, P.; Symvonis, A. |
|
2007
|
Uniqueness of some optimal superimposed codes. Zbl 1160.94394
Hong, S.; Kapralov, S.; Kim, H. K.; Oh, D. Y. |
|
2007
|
HIGHT: a new block cipher suitable for low-resource device. Zbl 1307.94058
Hong, Deukjo; Sung, Jaechul; Hong, Seokhie; Lim, Jongin; Lee, Sangjin; Koo, Bon-Seok; Lee, Changhoon; Chang, Donghoon; Lee, Jesang; Jeong, Kitae; Kim, Hyun; Kim, Jongsung; Chee, Seongtaek |
|
2006
|
On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. (Extended abstract). Zbl 1152.94428
Kim, Jongsung; Biryukov, Alex; Preneel, Bart; Hong, Seokhie |
|
2006
|
A new dedicated 256-bit hash function: FORK-256. Zbl 1186.94446
Hong, Deukjo; Chang, Donghoon; Sung, Jaechul; Lee, Sangjin; Hong, Seokhie; Lee, Jaesang; Moon, Dukjae; Chee, Sungtaek |
|
2006
|
A weak key class of XTEA for a related-key rectangle attack. Zbl 1295.94102
Lee, Eunjin; Hong, Deukjo; Chang, Donghoon; Hong, Seokhie; Lim, Jongin |
|
2006
|
Provable security for an RC6-like structure and a MISTY-FO-like structure against differential cryptanalysis. Zbl 1172.68465
Lee, Changhoon; Kim, Jongsung; Sung, Jaechul; Hong, Seokhie; Lee, Sangjin |
|
2006
|
Forgery and key recovery attacks on pmac and mitchell’s tmac variant. Zbl 1176.94049
Lee, Changhoon; Kim, Jongsung; Sung, Jaechul; Hong, Seokhie; Lee, Sangjin |
|
2006
|
Finding collision on 45-step HAS-160. Zbl 1185.94071
Yun, Aaram; Sung, Soo Hak; Park, Sangwoo; Chang, Donghoon; Hong, Seokhie; Cho, Hong-Su |
|
2006
|
Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192. Zbl 1140.94346
Hong, Seokhie; Kim, Jongsung; Lee, Sangjin; Preneel, Bart |
|
2005
|
Related key differential attacks on 27 rounds of XTEA and full-round GOST. Zbl 1079.68548
Ko, Youngdai; Hong, Seokhie; Lee, Wonil; Lee, Sangjin; Kang, Ju-Sung |
|
2004
|
The related-key rectangle attack-application to SHACAL-1. Zbl 1098.94619
Kim, Jongsung; Kim, Guil; Hong, Seokhie; Lee, Sangjin; Hong, Dowon |
|
2004
|
Differential cryptanalysis of TEA and XTEA. Zbl 1092.94507
Hong, Seokhie; Hong, Deukjo; Ko, Youngdai; Chang, Donghoon; Lee, Wonil; Lee, Sangjin |
|
2004
|
Differential-linear type attacks on reduced rounds of SHACAL-2. Zbl 1098.94629
Shin, Yongsup; Kim, Jongsung; Kim, Guil; Hong, Seokhie; Lee, Sangjin |
|
2004
|
Truncated differential attacks on 8-round CRYPTON. Zbl 1092.94508
Kim, Jongsung; Hong, Seokhie; Lee, Sangjin; Song, Junghwan; Yang, Hyungjin |
|
2004
|
Impossible differential cryptanalysis for block cipher structures. Zbl 1123.94352
Kim, Jongsung; Hong, Seokhie; Sung, Jaechul; Lee, Sangjin; Lim, Jongin; Sung, Soohak |
|
2003
|
Impossible differential attack on 30-round SHACAL-2. Zbl 1123.94345
Hong, Seokhie; Kim, Jongsung; Kim, Guil; Sung, Jaechul; Lee, Changhoon; Lee, Sangjin |
|
2003
|
Truncated differential cryptanalysis of Camellia. Zbl 0994.68578
Lee, Seonhee; Hong, Seokhie; Lee, Sangjin; Lim, Jongin; Yoon, Seonhee |
|
2002
|
Amplified boomerang attack against reduced-round SHACAL. Zbl 1065.94553
Kim, Jongsung; Moon, Dukjae; Lee, Wonil; Hong, Seokhie; Lee, Sangjin; Jung, Seokwon |
|
2002
|
Provable security against differential and linear cryptanalysis for the SPN structure. Zbl 0994.68505
Hong, Seokhie; Lee, Sangjin; Lim, Jongin; Sung, Jaechul; Cheon, Donghyeon; Cho, Inho |
|
2001
|
Provable security for the skipjack-like structure against differential cryptanalysis and linear cryptanalysis. Zbl 0965.94016
Sung, Jaechul; Lee, Sangjin; Lim, Jongin; Hong, Seokhie; Park, Sangjoon |
|
2000
|
A proposal of a new public key cryptosystem using matrices over a ring. Zbl 0963.94014
Yoo, Heajoung; Hong, Seokhie; Lee, Sangjin; Lim, Jongin; Yi, Okyeon; Sung, Maenghee |
|
2000
|
Approximate analysis of a discrete-time queueing model of the shared buffer ATM switch. Zbl 0789.60070
Hong, S.; Perros, H. G.; Yamashita, H. |
|
1993
|
An alternating projection algorithm for computing the nearest Euclidean distance matrix. Zbl 0728.65034
Glunt, W.; Hayden, T. L.; Hong, S.; Wells, J. |
|
1990
|
The asymmetric travelling salesman problem and spanning arborescences of directed graphs. Zbl 0394.90063
Hong, S. |
|
1977
|