Calculated based on number of publications stored in Pure and citations from Scopus
1995 …2021

Research activity per year

Filter
Conference contribution

Search results

  • 2006

    Generic transformation for scalable broadcast encryption schemes

    Hwang, J. Y., Lee, D. H. & Lim, J., 2006, Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings. p. 276-292 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3621 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Citations (Scopus)
  • HIGHT: A new block cipher suitable for low-resource device

    Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B. S., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J. & Chee, S., 2006, Cryptographic Hardware and Embedded Systems, CHES 2006 - 8th International Workshop, Proceedings. Springer Verlag, p. 46-59 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4249 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    580 Citations (Scopus)
  • New steganalysis methodology: LR cube analysis for the detection of LSB steganography

    Lee, K., Jung, C., Lee, S. & Lim, J., 2006, Information Hiding - 7th International Workshop, IH 2005, Revised Selected Papers. Springer Verlag, p. 312-326 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3727 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Side channel attacks and countermeasures on pairing based cryptosystems over binary fields

    Kim, T. H., Takagi, T., Han, D. G., Kim, H. W. & Lim, J., 2006, Cryptology and Network Security - 5th International Conference, CANS 2006, Proceedings. Springer Verlag, p. 168-181 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)
  • 2005

    A fast inversion algorithm and low-complexity architecture over GF(2 m)

    Kim, S., Chang, N. S., Kim, C. H., Park, Y. H. & Lim, J., 2005, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. Springer Verlag, p. 1-8 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3802 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • A non-redundant and efficient architecture for Karatsuba-Ofman algorithm

    Chang, N. S., Kim, C. H., Park, Y. H. & Lim, J., 2005, Information Security - 8th International Conference, ISC 2005, Proceedings. Springer Verlag, p. 288-299 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3650 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Applying LR cube analysis to JSteg detection

    Lee, K., Jung, C., Lee, S., Kim, H. J. & Lim, J., 2005, Communications and Multimedia Security - 9th IFIP TC-6 TC-11International Conference, CMS 2005, Proceedings. Dittmann, J., Katzenbeisser, S. & Uhl, A. (eds.). Springer Verlag, p. 275-276 2 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • Digital evidence collection process in integrity and memory information gathering

    Lee, S., Kim, H., Lee, S. & Lim, J., 2005, Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering. p. 236-247 12 p. 1592536. (Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • Oblivious conjunctive keyword search

    Rhee, H. S., Byun, J. W., Lee, D. H. & Lim, J., 2005, Information Security Applications - 6th International Workshop, WISA 2005, Revised Selected Papers. p. 318-327 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3786 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Password-based group key exchange secure against insider guessing attacks

    Byun, J. W., Lee, D. H. & Lim, J., 2005, Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. p. 143-148 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3802 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • Sinusoidal modeling using wavelet packet transform applied to the analysis and synthesis of speech signals

    Kim, K., Hong, J. & Lim, J., 2005, Text, Speech and Dialogue - 8th International Conference, TSD 2005, Proceedings. Springer Verlag, p. 241-248 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3658 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2002

    A chosen plaintext linear attack on block cipher CIKS-1

    Lee, C., Hong, D., Lee, S., Lee, S., Yang, H. & Lim, J. I., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2513. p. 456-468 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2513).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    26 Citations (Scopus)
  • An alternate decomposition of an integer for faster point multiplication on certain elliptic curves

    Park, Y. H., Jeong, S., Kim, C. H. & Lim, J. I., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2274. p. 323-334 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Citations (Scopus)
  • An improved method of multiplication on certain elliptic curves

    Park, Y. H., Oh, S., Lee, S., Lim, J. I. & Sung, M., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2274. p. 310-322 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Concrete security analysis of CTR-OFB and CTR-CFB modes of operation

    Sung, J., Lee, S., Lim, J., Lee, W. & Yi, O., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 103-113 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Impossible differential cryptanalysis of reduced round XTEA and TEA

    Moon, D., Hwang, K., Lee, W., Lee, S. & Lim, J., 2002, Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers. Daemen, J. & Rijmen, V. (eds.). Springer Verlag, p. 49-60 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2365).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    40 Citations (Scopus)
  • Impossible differential cryptanalysis of zodiac

    Hong, D., Sung, J., Moriai, S., Lee, S. & Lim, J., 2002, Fast Software Encryption - 8th International Workshop, FSE 2001, Revised Papers. Matsui, M. (ed.). Springer Verlag, p. 300-311 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    10 Citations (Scopus)
  • Off-line authentication using watermarks

    Yoo, H., Lee, K., Lee, S. & Lim, J., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 200-213 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • On the security of reduced versions of 3-pass HAVAL

    Park, S., Sung, S. H., Chee, S. & Lim, J., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 406-419 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • On the security of rijndael-like structures against differential and linear cryptanalysis

    Park, S., Sung, S. H., Chee, S., Yoon, E. J. & Lim, J., 2002, Advances in Cryptology - ASIACRYPT 2002 - 8th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Zheng, Y. (ed.). Springer Verlag, p. 176-191 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2501).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Citations (Scopus)
  • Saturation attacks on reduced round Skipjack

    Hwang, K., Lee, W., Lee, S., Lee, S. & Lim, J., 2002, Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers. Daemen, J. & Rijmen, V. (eds.). Springer Verlag, p. 100-111 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2365).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    12 Citations (Scopus)
  • Speeding up point multiplication on hyperelliptic curves with efficiently-computable endomorphisms

    Park, Y. H., Jeong, S. & Lim, J. I., 2002, Advances in Cryptology - EUROCRYPT 2002 - International Conference on the Theory and Applications of Cryptographic Techniques, 2002, Proceedings. Springer Verlag, Vol. 2332. p. 197-208 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2332).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • Truncated differential cryptanalysis of Camellia

    Lee, S., Hong, S., Lee, S., Lim, J. & Yoon, S., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 32-38 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Citations (Scopus)
  • 2001

    Efficient and secure member deletion in group signature schemes

    Kim, H. J., Lim, J. I. & Lee, D. H., 2001, Information Security and Cryptology - ICISC 2000 - 3rd International Conference, Proceedings. Won, D. (ed.). Springer Verlag, p. 150-161 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Citations (Scopus)
  • Efficient transferable cash with group signatures

    Jeong, I. R., Lee, D. H. & Lim, J. I., 2001, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2200. p. 462-474 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2200).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Known-IV attacks on triple modes of operation of block ciphers

    Hong, D., Sung, J., Hong, S., Lee, W., Lee, S., Lim, J. & Yi, O., 2001, Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Boyd, C. (ed.). Springer Verlag, p. 208-221 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2248).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Citations (Scopus)
  • Provable security against differential and linear cryptanalysis for the SPN structure

    Hong, S., Lee, S., Lim, J., Sung, J., Cheon, D. & Cho, I., 2001, Fast Software Encryption - 7th International Workshop, FSE 2000, Proceedings. Schneier, B. (ed.). Springer Verlag, p. 273-283 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1978).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    61 Citations (Scopus)
  • 2000

    A proposal of a new public key cryptosystem using matrices over a ring

    Yoo, H., Hong, S., Lee, S., Lim, J. I., Yi, O. & Sung, M., 2000, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1841. p. 41-48 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • New block cipher DONUT using pairwise perfect decorrelation

    Cheon, D. H., Lee, S., Lim, J. I. & Lee, S. J., 2000, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1977. p. 250-258 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1977).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • On the optimal diffusion layers with practical security against differential and linear cryptanalysis

    Kang, J. S., Park, C., Lee, S. & Lim, J. I., 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 38-52 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Provable security for the Skipjack-like structure against differential cryptanalysis and linear cryptanalysis

    Sung, J., Lee, S., Lim, J., Hong, S. & Park, S., 2000, Advances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Okamoto, T. (ed.). Springer Verlag, p. 274-288 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1976).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    17 Citations (Scopus)
  • 1999

    A new aspect of dual basis for efficient field arithmetic

    Lee, C. H. & Lim, J. I., 1999, Public Key Cryptography - 2nd International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999, Proceedings. Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 12-28 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1560).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)