Follow
Hong Seokhie
Title
Cited by
Cited by
Year
HIGHT: A new block cipher suitable for low-resource device
D Hong, J Sung, S Hong, J Lim, S Lee, BS Koo, C Lee, D Chang, J Lee, ...
International workshop on cryptographic hardware and embedded systems, 46-59, 2006
8712006
Related key differential attacks on 27 rounds of XTEA and full-round GOST
Y Ko, S Hong, W Lee, S Lee, JS Kang
International Workshop on Fast Software Encryption, 299-316, 2004
1782004
Provable security against differential and linear cryptanalysis for the SPN structure
S Hong, S Lee, J Lim, J Sung, D Cheon, I Cho
International Workshop on Fast Software Encryption, 273-283, 2000
1472000
On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1
J Kim, A Biryukov, B Preneel, S Hong
International Conference on Security and Cryptography for Networks, 242-256, 2006
1412006
Impossible differential cryptanalysis for block cipher structures
J Kim, S Hong, J Sung, S Lee, J Lim, S Sung
International Conference on Cryptology in India, 82-96, 2003
1382003
Related-key rectangle attacks on reduced AES-192 and AES-256
J Kim, S Hong, B Preneel
International Workshop on Fast Software Encryption, 225-241, 2007
1252007
Differential Cryptanalysis of TEA and XTEA
S Hong, D Hong, Y Ko, D Chang, W Lee, S Lee
International Conference on Information Security and Cryptology, 402-417, 2003
1162003
A fast and provably secure higher-order masking of AES S-box
HS Kim, S Hong, J Lim
International Workshop on Cryptographic Hardware and Embedded Systems, 95-107, 2011
1142011
Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192
S Hong, J Kim, S Lee, B Preneel
International Workshop on Fast Software Encryption, 368-383, 2005
1012005
The related-key rectangle attack–application to SHACAL-1
J Kim, G Kim, S Hong, S Lee, D Hong
Australasian Conference on Information Security and Privacy, 123-136, 2004
962004
Related-key chosen IV attacks on Grain-v1 and Grain-128
Y Lee, K Jeong, J Sung, S Hong
Australasian conference on information security and privacy, 321-335, 2008
762008
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote
SC Seo, DG Han, HC Kim, S Hong
IEICE transactions on information and systems 91 (5), 1338-1347, 2008
592008
A new dedicated 256-bit hash function: FORK-256
D Hong, D Chang, J Sung, S Lee, S Hong, J Lee, D Moon, S Chee
International Workshop on Fast Software Encryption, 195-209, 2006
572006
Impossible differential cryptanalysis using matrix method
J Kim, S Hong, J Lim
Discrete Mathematics 310 (5), 988-1002, 2010
562010
Biclique cryptanalysis of lightweight block ciphers PRESENT, Piccolo and LED
K Jeong, HC Kang, C Lee, J Sung, S Hong
Cryptology ePrint Archive, 2012
552012
Truncated differential cryptanalysis of Camellia
S Lee, S Hong, S Lee, J Lim, S Yoon
International Conference on Information Security and Cryptology, 32-38, 2001
472001
Linear and differential cryptanalysis of reduced SMS4 block cipher
T Kim, J Kim, S Hong, J Sung
Cryptology ePrint Archive, 2008
412008
Impossible differential attack on 30-round SHACAL-2
S Hong, J Kim, G Kim, J Sung, C Lee, S Lee
International Conference on Cryptology in India, 97-106, 2003
382003
Linear cryptanalysis on SPECTR-H64 with higher order differential property
Y Ko, D Hong, S Hong, S Lee, J Lim
International Workshop on Mathematical Methods, Models, and Architectures …, 2003
362003
Practical second‐order correlation power analysis on the message blinding method and its novel countermeasure for RSA
HS Kim, TH Kim, JC Yoon, S Hong
ETRI journal 32 (1), 102-111, 2010
332010
The system can't perform the operation now. Try again later.
Articles 1–20