Sangjin Lee
Sangjin Lee
DFRC, CIST, Korea Univ.
Verified email at korea.ac.kr
TitleCited byYear
HIGHT: A new block cipher suitable for low-resource device
D Hong, J Sung, S Hong, J Lim, S Lee, BS Koo, C Lee, D Chang, J Lee, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 46-59, 2006
6252006
New block cipher: ARIA
D Kwon, J Kim, S Park, SH Sung, Y Sohn, JH Song, Y Yeom, EJ Yoon, ...
International Conference on Information Security and Cryptology, 432-445, 2003
2132003
Digital forensic investigation of cloud storage services
H Chung, J Park, S Lee, C Kang
Digital investigation 9 (2), 81-95, 2012
1952012
Related key differential attacks on 27 rounds of XTEA and full-round GOST
Y Ko, S Hong, W Lee, S Lee, JS Kang
International Workshop on Fast Software Encryption, 299-316, 2004
1382004
Provable security against differential and linear cryptanalysis for the SPN structure
S Hong, S Lee, J Lim, J Sung, D Cheon, I Cho
International Workshop on Fast Software Encryption, 273-283, 2000
1222000
Impossible differential cryptanalysis for block cipher structures
J Kim, S Hong, J Sung, S Lee, J Lim, S Sung
International Conference on Cryptology in India, 82-96, 2003
1112003
Advanced evidence collection and analysis of web browser activity
J Oh, S Lee, S Lee
digital investigation 8, S62-S70, 2011
1082011
Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192
S Hong, J Kim, S Lee, B Preneel
International Workshop on Fast Software Encryption, 368-383, 2005
942005
Improving the upper bound on the maximum differential and the maximum linear hull probability for SPN structures and AES
S Park, SH Sung, S Lee, J Lim
International Workshop on Fast Software Encryption, 247-260, 2003
902003
Impossible differential cryptanalysis of reduced round XTEA and TEA
D Moon, K Hwang, W Lee, S Lee, J Lim
International Workshop on Fast Software Encryption, 49-60, 2002
882002
On the correlation immune functions and their nonlinearity
S Chee, S Lee, D Lee, SH Sung
International Conference on the Theory and Application of Cryptology and …, 1996
811996
The related-key rectangle attack–application to SHACAL-1
J Kim, G Kim, S Hong, S Lee, D Hong
Australasian Conference on Information Security and Privacy, 123-136, 2004
802004
Differential Cryptanalysis of TEA and XTEA
S Hong, D Hong, Y Ko, D Chang, W Lee, S Lee
International Conference on Information Security and Cryptology, 402-417, 2003
752003
Semi-bent functions
S Chee, S Lee, K Kim
International Conference on the Theory and Application of Cryptology, 105-118, 1994
741994
A recovery method of deleted record for SQLite database
S Jeon, J Bang, K Byun, S Lee
Personal and Ubiquitous Computing 16 (6), 707-715, 2012
732012
Indifferentiable security analysis of popular hash functions with prefix-free padding
D Chang, S Lee, M Nandi, M Yung
International Conference on the Theory and Application of Cryptology and …, 2006
682006
Practical and Provable Security against Differential and Linear Cryptanalysis for Substitution‐Permutation Networks
JS Kang, S Hong, S Lee, O Yi, C Park, J Lim
ETRI journal 23 (4), 158-167, 2001
682001
A study of user data integrity during acquisition of Android devices
N Son, Y Lee, D Kim, JI James, S Lee, K Lee
Digital Investigation 10, S3–S11, 2013
562013
A new dedicated 256-bit hash function: FORK-256
D Hong, D Chang, J Sung, S Lee, S Hong, J Lee, D Moon, S Chee
International Workshop on Fast Software Encryption, 195-209, 2006
522006
Alexa, can I trust you?
H Chung, M Iorga, J Voas, S Lee
Computer 50 (9), 100-104, 2017
492017
The system can't perform the operation now. Try again later.
Articles 1–20