HIGHT: A new block cipher suitable for low-resource device D Hong, J Sung, S Hong, J Lim, S Lee, BS Koo, C Lee, D Chang, J Lee, ... International Workshop on Cryptographic Hardware and Embedded Systems, 46-59, 2006 | 790 | 2006 |
New block cipher: ARIA D Kwon, J Kim, S Park, SH Sung, Y Sohn, JH Song, Y Yeom, EJ Yoon, ... International Conference on Information Security and Cryptology, 432-445, 2003 | 255 | 2003 |
Digital forensic investigation of cloud storage services H Chung, J Park, S Lee, C Kang Digital investigation 9 (2), 81-95, 2012 | 235 | 2012 |
Alexa, can I trust you? H Chung, M Iorga, J Voas, S Lee Computer 50 (9), 100-104, 2017 | 171 | 2017 |
Related key differential attacks on 27 rounds of XTEA and full-round GOST Y Ko, S Hong, W Lee, S Lee, JS Kang International Workshop on Fast Software Encryption, 299-316, 2004 | 156 | 2004 |
Provable security against differential and linear cryptanalysis for the SPN structure S Hong, S Lee, J Lim, J Sung, D Cheon, I Cho International Workshop on Fast Software Encryption, 273-283, 2000 | 134 | 2000 |
Advanced evidence collection and analysis of web browser activity J Oh, S Lee, S Lee Digital investigation 8, S62-S70, 2011 | 127 | 2011 |
Impossible differential cryptanalysis for block cipher structures J Kim, S Hong, J Sung, S Lee, J Lim, S Sung International Conference on Cryptology in India, 82-96, 2003 | 127 | 2003 |
Digital forensic approaches for Amazon Alexa ecosystem H Chung, J Park, S Lee Digital Investigation 22, S15-S25, 2017 | 111 | 2017 |
Impossible differential cryptanalysis of reduced round XTEA and TEA D Moon, K Hwang, W Lee, S Lee, J Lim International Workshop on Fast Software Encryption, 49-60, 2002 | 103 | 2002 |
Improving the upper bound on the maximum differential and the maximum linear hull probability for SPN structures and AES S Park, SH Sung, S Lee, J Lim International Workshop on Fast Software Encryption, 247-260, 2003 | 98 | 2003 |
Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192 S Hong, J Kim, S Lee, B Preneel International Workshop on Fast Software Encryption, 368-383, 2005 | 96 | 2005 |
A recovery method of deleted record for SQLite database S Jeon, J Bang, K Byun, S Lee Personal and Ubiquitous Computing 16 (6), 707-715, 2012 | 90 | 2012 |
The related-key rectangle attack–application to SHACAL-1 J Kim, G Kim, S Hong, S Lee, D Hong Australasian Conference on Information Security and Privacy, 123-136, 2004 | 89 | 2004 |
Semi-bent functions S Chee, S Lee, K Kim International Conference on the Theory and Application of Cryptology, 105-118, 1994 | 89 | 1994 |
Differential Cryptanalysis of TEA and XTEA S Hong, D Hong, Y Ko, D Chang, W Lee, S Lee International Conference on Information Security and Cryptology, 402-417, 2003 | 88 | 2003 |
On the correlation immune functions and their nonlinearity S Chee, S Lee, D Lee, SH Sung International Conference on the Theory and Application of Cryptology and ¡¦, 1996 | 80 | 1996 |
Practical and Provable Security against Differential and Linear Cryptanalysis for Substitution‐Permutation Networks JS Kang, S Hong, S Lee, O Yi, C Park, J Lim ETRI journal 23 (4), 158-167, 2001 | 79 | 2001 |
Indifferentiable security analysis of popular hash functions with prefix-free padding D Chang, S Lee, M Nandi, M Yung International Conference on the Theory and Application of Cryptology and ¡¦, 2006 | 72 | 2006 |
A study of user data integrity during acquisition of Android devices N Son, Y Lee, D Kim, JI James, S Lee, K Lee Digital Investigation 10, S3–S11, 2013 | 60 | 2013 |