Hong Seokhie
TitleCited byYear
HIGHT: A new block cipher suitable for low-resource device
D Hong, J Sung, S Hong, J Lim, S Lee, BS Koo, C Lee, D Chang, J Lee, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 46-59, 2006
6252006
Related key differential attacks on 27 rounds of XTEA and full-round GOST
Y Ko, S Hong, W Lee, S Lee, JS Kang
International Workshop on Fast Software Encryption, 299-316, 2004
1382004
Provable security against differential and linear cryptanalysis for the SPN structure
S Hong, S Lee, J Lim, J Sung, D Cheon, I Cho
International Workshop on Fast Software Encryption, 273-283, 2000
1222000
On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1
J Kim, A Biryukov, B Preneel, S Hong
International Conference on Security and Cryptography for Networks, 242-256, 2006
1162006
Impossible differential cryptanalysis for block cipher structures
J Kim, S Hong, J Sung, S Lee, J Lim, S Sung
International Conference on Cryptology in India, 82-96, 2003
1112003
Related-key rectangle attacks on reduced AES-192 and AES-256
J Kim, S Hong, B Preneel
International Workshop on Fast Software Encryption, 225-241, 2007
1092007
Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192
S Hong, J Kim, S Lee, B Preneel
International Workshop on Fast Software Encryption, 368-383, 2005
942005
A fast and provably secure higher-order masking of AES S-box
HS Kim, S Hong, J Lim
International Workshop on Cryptographic Hardware and Embedded Systems, 95-107, 2011
912011
The related-key rectangle attack–application to SHACAL-1
J Kim, G Kim, S Hong, S Lee, D Hong
Australasian Conference on Information Security and Privacy, 123-136, 2004
802004
Differential Cryptanalysis of TEA and XTEA
S Hong, D Hong, Y Ko, D Chang, W Lee, S Lee
International Conference on Information Security and Cryptology, 402-417, 2003
752003
Related-key chosen IV attacks on Grain-v1 and Grain-128
Y Lee, K Jeong, J Sung, S Hong
Australasian Conference on Information Security and Privacy, 321-335, 2008
732008
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote
SC Seo, DG Han, HC Kim, S Hong
IEICE transactions on information and systems 91 (5), 1338-1347, 2008
542008
A new dedicated 256-bit hash function: FORK-256
D Hong, D Chang, J Sung, S Lee, S Hong, J Lee, D Moon, S Chee
International Workshop on Fast Software Encryption, 195-209, 2006
522006
Fast Software Encryption: 4th International Workshop, FSE'97, Haifa, Israel, January 20-22, 1997, Proceedings
E Biham
Springer Science & Business Media, 1997
49*1997
Impossible differential cryptanalysis using matrix method
J Kim, S Hong, J Lim
Discrete Mathematics 310 (5), 988-1002, 2010
482010
Truncated differential cryptanalysis of Camellia
S Lee, S Hong, S Lee, J Lim, S Yoon
International Conference on Information Security and Cryptology, 32-38, 2001
442001
Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED.
K Jeong, HC Kang, C Lee, J Sung, S Hong
IACR Cryptology ePrint Archive 2012, 621, 2012
412012
Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher.
TH Kim, J Kim, S Hong, J Sung
IACR Cryptology ePrint Archive 2008, 281, 2008
352008
Impossible differential attack on 30-round SHACAL-2
S Hong, J Kim, G Kim, J Sung, C Lee, S Lee
International Conference on Cryptology in India, 97-106, 2003
332003
Linear cryptanalysis on SPECTR-H64 with higher order differential property
Y Ko, D Hong, S Hong, S Lee, J Lim
International Workshop on Mathematical Methods, Models, and Architectures …, 2003
312003
The system can't perform the operation now. Try again later.
Articles 1–20