Changhoon Lee
Title
Cited by
Cited by
Year
Hight: A new block cipher suitable for low-resource device
D Hong, J Sung, S Hong, J Lim, S Lee, BS Koo, C Lee, D Chang, J Lee, ...
Cryptographic Hardware and Embedded Systems-CHES 2006, 46-59, 2006
7392006
Chaos-based secure satellite imagery cryptosystem
M Usama, MK Khan, K Alghathbar, C Lee
Computers & Mathematics with Applications 60 (2), 326-337, 2010
1342010
A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks
S Misra, PV Krishna, A Bhiwal, AS Chawla, BE Wolfinger, C Lee
The Journal of Supercomputing, 1-20, 2012
692012
Abnormal event detection in crowded scenes based on deep learning
Z Fang, F Fei, Y Fang, C Lee, N Xiong, L Shu, S Chen
Multimedia Tools and Applications 75 (22), 14617-14639, 2016
682016
Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED
K Jeong, HC Kang, C Lee, J Sung, S Hong
46*
Differential Fault Analysis on Block Cipher LED-64
K Jeong, C Lee
Future Information Technology, Application, and Service, 747-755, 2012
352012
Impossible differential attack on 30-round SHACAL-2
S Hong, J Kim, G Kim, J Sung, C Lee, S Lee
Progress in Cryptology-INDOCRYPT 2003, 317-341, 2003
352003
Cryptanalysis & Cryptographic Techniques-A Chosen Plaintext Linear Attack on Block Cipher CIKS-1
C Lee, D Hong, S Lee, S Lee, H Yang, J Lim
Lecture Notes in Computer Science 2513, 456-468, 2002
35*2002
A chosen plaintext linear attack on block cipher CIKS-1
C Lee, D Hong, S Lee, S Lee, H Yang, J Lim
Information and Communications Security, 456-468, 2002
342002
Context-aware middleware and intelligent agents for smart environments
HR Arabnia, WC Fang, C Lee, Y Zhang
IEEE Intelligent Systems 25 (2), 10-11, 2010
312010
Context-aware middleware and intelligent agents for smart environments
HR Arabnia, WC Fang, C Lee, Y Zhang
IEEE Intelligent Systems 25 (2), 10-11, 2010
312010
Weak-key classes of 7-round MISTY 1 and 2 for related-key amplified boomerang attacks
LEE Eunjin, KIM Jongsung, H Deukjo, LEE Changhoon, H Seokhie, ...
IEICE transactions on fundamentals of electronics, communications and …, 2008
272008
Differential fault analysis on block cipher SEED
K Jeong, Y Lee, J Sung, S Hong
Mathematical and Computer Modelling 55 (1), 26-34, 2012
262012
Related-Key differential attacks on cobra-s128, cobra-f64a, and cobra-f64b
C Lee, J Kim, S Hong, J Sung, S Lee
Progress in Cryptology–Mycrypt 2005, 244-262, 2005
262005
Related-key attacks on DDP based ciphers: CIKS-128 and CIKS-128H
Y Ko, C Lee, S Hong, J Sung, S Lee
Progress in Cryptology-INDOCRYPT 2004, 179-200, 2005
262005
Related-key differential attacks on Cobra-H64 and Cobra-H128
C Lee, J Kim, J Sung, S Hong, S Lee, D Moon
IMA International Conference on Cryptography and Coding, 201-219, 2005
242005
Related-key differential attacks on Cobra-H64 and Cobra-H128
C Lee, J Kim, J Sung, S Hong, S Lee, D Moon
Cryptography and Coding, 201-219, 2005
242005
Related-key attacks on the full-round Cobra-F64a and Cobra-F64b
J Lu, C Lee, J Kim
Security and Cryptography for Networks, 95-110, 2006
232006
Links organization for channel assignment in multi-radio wireless mesh networks
H Cheng, N Xiong, LT Yang, G Chen, X Zhuang, C Lee
Multimedia Tools and Applications, 1-20, 2011
222011
Related key differential cryptanalysis of full-round SPECTR-H64 and CIKS-1
Y Ko, C Lee, S Hong, S Lee
Information Security and Privacy, 137-148, 2004
222004
The system can't perform the operation now. Try again later.
Articles 1–20