HIGHT: A new block cipher suitable for low-resource device D Hong, J Sung, S Hong, J Lim, S Lee, BS Koo, C Lee, D Chang, J Lee, ... International Workshop on Cryptographic Hardware and Embedded Systems, 46-59, 2006 | 780 | 2006 |
Related key differential attacks on 27 rounds of XTEA and full-round GOST Y Ko, S Hong, W Lee, S Lee, JS Kang International Workshop on Fast Software Encryption, 299-316, 2004 | 150 | 2004 |
Provable security against differential and linear cryptanalysis for the SPN structure S Hong, S Lee, J Lim, J Sung, D Cheon, I Cho International Workshop on Fast Software Encryption, 273-283, 2000 | 134 | 2000 |
On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1 J Kim, A Biryukov, B Preneel, S Hong International Conference on Security and Cryptography for Networks, 242-256, 2006 | 132 | 2006 |
Impossible differential cryptanalysis for block cipher structures J Kim, S Hong, J Sung, S Lee, J Lim, S Sung International Conference on Cryptology in India, 82-96, 2003 | 127 | 2003 |
Related-key rectangle attacks on reduced AES-192 and AES-256 J Kim, S Hong, B Preneel International Workshop on Fast Software Encryption, 225-241, 2007 | 118 | 2007 |
A fast and provably secure higher-order masking of AES S-box HS Kim, S Hong, J Lim International Workshop on Cryptographic Hardware and Embedded Systems, 95-107, 2011 | 110 | 2011 |
Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192 S Hong, J Kim, S Lee, B Preneel International Workshop on Fast Software Encryption, 368-383, 2005 | 96 | 2005 |
The related-key rectangle attack–application to SHACAL-1 J Kim, G Kim, S Hong, S Lee, D Hong Australasian Conference on Information Security and Privacy, 123-136, 2004 | 89 | 2004 |
Differential Cryptanalysis of TEA and XTEA S Hong, D Hong, Y Ko, D Chang, W Lee, S Lee International Conference on Information Security and Cryptology, 402-417, 2003 | 85 | 2003 |
Related-key chosen IV attacks on Grain-v1 and Grain-128 Y Lee, K Jeong, J Sung, S Hong Australasian Conference on Information Security and Privacy, 321-335, 2008 | 76 | 2008 |
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote SC Seo, DG Han, HC Kim, S Hong IEICE transactions on information and systems 91 (5), 1338-1347, 2008 | 58 | 2008 |
A new dedicated 256-bit hash function: FORK-256 D Hong, D Chang, J Sung, S Lee, S Hong, J Lee, D Moon, S Chee International Workshop on Fast Software Encryption, 195-209, 2006 | 56 | 2006 |
Impossible differential cryptanalysis using matrix method J Kim, S Hong, J Lim Discrete Mathematics 310 (5), 988-1002, 2010 | 52 | 2010 |
Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED. K Jeong, HC Kang, C Lee, J Sung, S Hong IACR Cryptol. ePrint Arch. 2012, 621, 2012 | 48 | 2012 |
Truncated differential cryptanalysis of Camellia S Lee, S Hong, S Lee, J Lim, S Yoon International Conference on Information Security and Cryptology, 32-38, 2001 | 47 | 2001 |
Fast Software Encryption: 4th International Workshop, FSE'97, Haifa, Israel, January 20-22, 1997, Proceedings E Biham Springer Science & Business Media, 1997 | 41* | 1997 |
Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher. TH Kim, J Kim, S Hong, J Sung IACR Cryptol. ePrint Arch. 2008, 281, 2008 | 40 | 2008 |
Impossible differential attack on 30-round SHACAL-2 S Hong, J Kim, G Kim, J Sung, C Lee, S Lee International Conference on Cryptology in India, 97-106, 2003 | 38 | 2003 |
Linear cryptanalysis on SPECTR-H64 with higher order differential property Y Ko, D Hong, S Hong, S Lee, J Lim International Workshop on Mathematical Methods, Models, and Architectures …, 2003 | 35 | 2003 |