Filter
Conference contribution

Search results

  • 2002

    Saturation attacks on reduced round Skipjack

    Hwang, K., Lee, W., Lee, S., Lee, S. & Lim, J., 2002, Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers. Daemen, J. & Rijmen, V. (eds.). Springer Verlag, p. 100-111 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2365).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    12 Citations (Scopus)
  • Truncated differential cryptanalysis of Camellia

    Lee, S., Hong, S., Lee, S., Lim, J. & Yoon, S., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 32-38 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Citations (Scopus)
  • 2001

    Efficient and secure member deletion in group signature schemes

    Kim, H. J., Lim, J. I. & Lee, D. H., 2001, Information Security and Cryptology - ICISC 2000 - 3rd International Conference, Proceedings. Won, D. (ed.). Springer Verlag, p. 150-161 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Citations (Scopus)
  • Known-IV attacks on triple modes of operation of block ciphers

    Hong, D., Sung, J., Hong, S., Lee, W., Lee, S., Lim, J. & Yi, O., 2001, Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Boyd, C. (ed.). Springer Verlag, p. 208-221 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2248).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Citations (Scopus)
  • Provable security against differential and linear cryptanalysis for the SPN structure

    Hong, S., Lee, S., Lim, J., Sung, J., Cheon, D. & Cho, I., 2001, Fast Software Encryption - 7th International Workshop, FSE 2000, Proceedings. Schneier, B. (ed.). Springer Verlag, p. 273-283 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1978).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    63 Citations (Scopus)
  • 2000

    A framework for embedded real-time system design

    Choi, J. Y., Kwak, H. H. & Lee, I., 2000, Parallel and Distributed Processing - 15 IPDPS 2000 Workshops, Proceedings. Rolim, J. (ed.). Springer Verlag, p. 738-742 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1800 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • GAT(Give-And-Take): A Cooperative cache replacement policy for application-controlled file caching

    Kim, G. H., Cho, J. Y., Kang, H. K., Park, M. S. & Choi, J. Y., 2000, Proceedings of the Fifth Joint Conference on Information Sciences, JCIS 2000, Volume 1. Wang, P. P. & Wang, P. P. (eds.). 1 ed. p. 508-511 4 p. (Proceedings of the Joint Conference on Information Sciences; vol. 5, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • LMRU: An Efficient Buffer Management Scheme for Large Sequential and Looping Reference Pattern Applications

    Cho, J. Y., Kim, G. H., Kang, H. K., Park, M. S. & Choi, J. Y., 2000, Proceedings of the Fifth Joint Conference on Information Sciences, JCIS 2000, Volume 1. Wang, P. P. & Wang, P. P. (eds.). 1 ed. p. 504-507 4 p. (Proceedings of the Joint Conference on Information Sciences; vol. 5, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On the optimal diffusion layers with practical security against differential and linear cryptanalysis

    Kang, J. S., Park, C., Lee, S. & Lim, J. I., 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 38-52 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Provable security for the Skipjack-like structure against differential cryptanalysis and linear cryptanalysis

    Sung, J., Lee, S., Lim, J., Hong, S. & Park, S., 2000, Advances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Okamoto, T. (ed.). Springer Verlag, p. 274-288 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1976).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    17 Citations (Scopus)
  • 1999

    A new aspect of dual basis for efficient field arithmetic

    Lee, C. H. & Lim, J. I., 1999, Public Key Cryptography - 2nd International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999, Proceedings. Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 12-28 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1560).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Formal verification of RACE protocol using SSM

    Kim, H., Choi, J. Y., Ki, A. & Han, W. J., 1999, IEEE Region 10 Annual International Conference, Proceedings/TENCON. Institute of Electrical and Electronics Engineers Inc., p. 1083-1086 4 p. (IEEE Region 10 Annual International Conference, Proceedings/TENCON; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)