Donghoon Chang
Donghoon Chang
IIIT-Delhi, India
Verified email at iiitd.ac.in
Title
Cited by
Cited by
Year
HIGHT: A new block cipher suitable for low-resource device
D Hong, J Sung, S Hong, J Lim, S Lee, BS Koo, C Lee, D Chang, J Lee, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 46-59, 2006
7392006
Differential Cryptanalysis of TEA and XTEA
S Hong, D Hong, Y Ko, D Chang, W Lee, S Lee
International Conference on Information Security and Cryptology, 402-417, 2003
862003
Indifferentiable security analysis of popular hash functions with prefix-free padding
D Chang, S Lee, M Nandi, M Yung
International Conference on the Theory and Application of Cryptology and …, 2006
702006
Improved indifferentiability security analysis of chopMD hash function
D Chang, M Nandi
International Workshop on Fast Software Encryption, 429-443, 2008
612008
A new dedicated 256-bit hash function: FORK-256
D Hong, D Chang, J Sung, S Lee, S Hong, J Lee, D Moon, S Chee
International Workshop on Fast Software Encryption, 195-209, 2006
552006
RC4-Hash: A new hash function based on RC4
D Chang, KC Gupta, M Nandi
International Conference on Cryptology in India, 80-94, 2006
392006
A keyed sponge construction with pseudorandomness in the standard model
D Chang, M Dworkin, S Hong, J Kelsey, M Nandi
The Third SHA-3 Candidate Conference (March 2012) 3, 7, 2012
272012
Indifferentiability of the Hash Algorithm BLAKE.
D Chang, M Nandi, M Yung
IACR Cryptol. ePrint Arch. 2011, 623, 2011
232011
Finding collision on 45-step HAS-160
A Yun, SH Sung, S Park, D Chang, S Hong, HS Cho
International Conference on Information Security and Cryptology, 146-155, 2005
232005
A new 256-bit hash function DHA-256: enhancing the security of SHA-256
J Lee, D Chang, H Kim, E Lee, D Hong, J Sung, S Hong, S Lee
NIST-First Cryptographic Hash Workshop, 2005
192005
New parallel domain extenders for UOWHF
W Lee, D Chang, S Lee, S Sung, M Nandi
International Conference on the Theory and Application of Cryptology and …, 2003
192003
Bicliques with minimal data and time complexity for AES
A Bogdanov, D Chang, M Ghosh, SK Sanadhya
International Conference on Information Security and Cryptology, 160-174, 2014
172014
Status report on the second round of the SHA-3 cryptographic hash algorithm competition
MS Turan, R Perlner, LE Bassham, W Burr, D Chang, S jen Chang, ...
NIST Interagency Report 7764, 2011
162011
A Short Proof of the PRP/PRF Switching Lemma.
D Chang, M Nandi
IACR Cryptol. ePrint Arch. 2008, 78, 2008
162008
Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on HMAC/NMAC-3-pass HAVAL
E Lee, D Chang, J Kim, J Sung, S Hong
International Workshop on Fast Software Encryption, 189-206, 2008
152008
A weak key class of XTEA for a related-key rectangle attack
E Lee, D Hong, D Chang, S Hong, J Lim
International Conference on Cryptology in Vietnam, 286-297, 2006
152006
Threshold Implementations of GIFT: A Trade-off Analysis.
N Gupta, A Jati, A Chattopadhyay, SK Sanadhya, D Chang
IACR Cryptol. ePrint Arch. 2017, 1040, 2017
142017
Rig: A Simple, Secure and Flexible Design for Password Hashing
D Chang, A Jati, S Mishra, SK Sanadhya
International Conference on Information Security and Cryptology, 361-381, 2014
142014
1st and 2nd Preimage Attacks on 7, 8 and 9 Rounds of Keccak-224,256,384,512
D Chang, A Kumar, P Morawiecki, SK Sanadhya
SHA-3 workshop, 2014
122014
ARIRANG: SHA-3 Proposal
D Chang, S Hong, C Kang, J Kang, J Kim, C Lee, J Lee, J Lee, S Lee, ...
NIST SHA-3 candidate, available fr om http://csrc. nist. gov/groups/ST/hash …, 2008
112008
The system can't perform the operation now. Try again later.
Articles 1–20