Calculated based on number of publications stored in Pure and citations from Scopus
1995 …2023

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • 1995

    On the security of the gollmann cascades

    Park, S. J., Lee, S. & Goh, S. C., 1995, Advances in Cryptology ― CRYPTO 1995 - 15th Annual International Cryptology Conference, Proceedings. Springer Verlag, Vol. 963. p. 148-156 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 963).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Semi-bent functions

    Kim, K. & Lee, S., 1995, Advances in Cryptology - ASIACRYPT 1994 - 4th International Conference on the Theory and Applications of Cryptology, Proceedings. Pieprzyk, J. & Safavi-Naini, R. (eds.). Springer Verlag, p. 105-118 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 917).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • 1996

    Conditional correlation attack on nonlinear filter generators

    Lee, S., Chee, S., Park, S. & Park, S., 1996, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1163. p. 360-367 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • On the correlation immune functions and their nonlinearity

    Chee, S., Lee, S., Lee, D. & Sung, S. H., 1996, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1163. p. 232-243 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Citations (Scopus)
  • 1997

    Correlation immune functions with controllable nonlinearity

    Chee, S., Lee, S., Kim, K. & Kim, D., 1997 Dec, In: ETRI Journal. 19, 4, p. 389-400 12 p.

    Research output: Contribution to journalArticlepeer-review

    6 Citations (Scopus)
  • Improving bounds for the number of correlation immune Boolean functions

    Park, S. M., Lee, S., Sung, S. H. & Kim, K., 1997 Feb 28, In: Information Processing Letters. 61, 4, p. 209-212 4 p.

    Research output: Contribution to journalArticlepeer-review

    11 Citations (Scopus)
  • 1998

    A new hash function based on mdx-family and its application to MAC

    Uk Shin, S., Hyune Rhee, K., Hyun Ryu, D. & Jin Lee, S., 1998, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Zheng, Y. & Imai, H. (eds.). Springer Verlag, p. 234-246 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1431).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • 1999

    Developments in generalized Feistel networks

    Chee, S., Lee, S., Park, C. & Sung, S. H., 1999 Apr 29, In: Electronics Letters. 35, 9, p. 707-708 2 p.

    Research output: Contribution to journalArticlepeer-review

    1 Citation (Scopus)
  • 2000

    A lower bound on the linear span of an FCSR

    Seo, C., Lee, S., Sung, Y., Han, K. & Kim, S., 2000, In: IEEE Transactions on Information Theory. 46, 2, p. 691-693 3 p.

    Research output: Contribution to journalArticlepeer-review

    2 Citations (Scopus)
  • A proposal of a new public key cryptosystem using matrices over a ring

    Yoo, H., Hong, S., Lee, S., Lim, J. I., Yi, O. & Sung, M., 2000, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1841. p. 41-48 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • New block cipher DONUT using pairwise perfect decorrelation

    Cheon, D. H., Lee, S., Lim, J. I. & Lee, S. J., 2000, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1977. p. 250-258 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1977).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • On the optimal diffusion layers with practical security against differential and linear cryptanalysis

    Kang, J. S., Park, C., Lee, S. & Lim, J. I., 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 38-52 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Provable security for the Skipjack-like structure against differential cryptanalysis and linear cryptanalysis

    Sung, J., Lee, S., Lim, J., Hong, S. & Park, S., 2000, Advances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Okamoto, T. (ed.). Springer Verlag, p. 274-288 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1976).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    9 Citations (Scopus)
  • 2001

    Difference distribution attack on DONUT and improved DONUT

    Cheon, D. H., Hong, S., Lee, S., Lee, S. J., Park, K. H. & Yoon, S. H., 2001, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2015. p. 37-48 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Known-IV attacks on triple modes of operation of block ciphers

    Hong, D., Sung, J., Hong, S., Lee, W., Lee, S., Lim, J. & Yi, O., 2001, Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Boyd, C. (ed.). Springer Verlag, p. 208-221 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2248).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • Practical and provable security against differential and linear cryptanalysis for substitution-permutation networks

    Kang, J. S., Hong, S., Lee, S., Yi, O., Park, C. & Lim, J., 2001 Dec, In: ETRI Journal. 23, 4, p. 158-167 10 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    32 Citations (Scopus)
  • Provable security against differential and linear cryptanalysis for the SPN structure

    Hong, S., Lee, S., Lim, J., Sung, J., Cheon, D. & Cho, I., 2001, Fast Software Encryption - 7th International Workshop, FSE 2000, Proceedings. Schneier, B. (ed.). Springer Verlag, p. 273-283 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1978).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    57 Citations (Scopus)
  • 2002

    A chosen plaintext linear attack on block cipher CIKS-1

    Lee, C., Hong, D., Lee, S., Lee, S., Yang, H. & Lim, J. I., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2513. p. 456-468 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2513).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Amplified boomerang attack against reduced-round shacal

    Kim, J., Moon, D., Lee, W., Hong, S., Lee, S. & Jung, S., 2002, Advances in Cryptology - ASIACRYPT 2002 - 8th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Zheng, Y. (ed.). Springer Verlag, p. 243-253 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2501).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • An improved method of multiplication on certain elliptic curves

    Park, Y. H., Oh, S., Lee, S., Lim, J. I. & Sung, M., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2274. p. 310-322 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A practical approach defeating blackmailing

    Han, D. G., Park, H. Y., Park, Y. H., Lee, S., Lee, D. H. & Yang, H. J., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 464-481 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Concrete security analysis of CTR-OFB and CTR-CFB modes of operation

    Sung, J., Lee, S., Lim, J., Lee, W. & Yi, O., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 103-113 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Impossible differential cryptanalysis of reduced round XTEA and TEA

    Moon, D., Hwang, K., Lee, W., Lee, S. & Lim, J., 2002, Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers. Daemen, J. & Rijmen, V. (eds.). Springer Verlag, p. 49-60 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2365).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    19 Citations (Scopus)
  • Impossible differential cryptanalysis of zodiac

    Hong, D., Sung, J., Moriai, S., Lee, S. & Lim, J., 2002 Jan, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E85-A, 1, p. 38-43 6 p.

    Research output: Contribution to journalArticlepeer-review

  • Impossible differential cryptanalysis of zodiac

    Hong, D., Sung, J., Moriai, S., Lee, S. & Lim, J., 2002, Fast Software Encryption - 8th International Workshop, FSE 2001, Revised Papers. Matsui, M. (ed.). Springer Verlag, p. 300-311 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Off-line authentication using watermarks

    Yoo, H., Lee, K., Lee, S. & Lim, J., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 200-213 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Practical off-line authentication

    Yoo, H., Seo, S., Lee, S. & Lim, J., 2002, In: Proceedings of SPIE-The International Society for Optical Engineering. 4675, p. 141-148 8 p.

    Research output: Contribution to journalArticlepeer-review

  • Provable security for 13 round Skipjack-like structure

    Hong, S., Sung, J., Lee, S., Lim, J. & Kim, J., 2002 Jun 15, In: Information Processing Letters. 82, 5, p. 243-246 4 p.

    Research output: Contribution to journalArticlepeer-review

    2 Citations (Scopus)
  • Saturation attacks on reduced round Skipjack

    Hwang, K., Lee, W., Lee, S., Lee, S. & Lim, J., 2002, Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers. Daemen, J. & Rijmen, V. (eds.). Springer Verlag, p. 100-111 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2365).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • Truncated differential cryptanalysis of Camellia

    Lee, S., Hong, S., Lee, S., Lim, J. & Yoon, S., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 32-38 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • 2003

    Covert channel detection in the ICMP payload using support vector machine

    Sohn, T., Moon, J., Lee, S., Lee, D. H. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Yazici, A. & Sener, C. (eds.). Springer Verlag, p. 828-835 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2869).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    22 Citations (Scopus)
  • Designated verification of non-invertible watermark

    Yoo, H., Lee, H., Lee, S. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Boyd, C. & Mao, W. (eds.). Springer Verlag, p. 338-351 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2851).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Differential and linear cryptanalysis for 2-round SPNs

    Chun, K., Kim, S., Lee, S., Sung, S. H. & Yoon, S., 2003 Sept 15, In: Information Processing Letters. 87, 5, p. 277-282 6 p.

    Research output: Contribution to journalArticlepeer-review

    14 Citations (Scopus)
  • Full-round differential attack on the original version of the hash function proposed at PKC'98

    Chang, D., Sung, J., Sung, S., Lee, S. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Nyberg, K. & Heys, H. (eds.). Springer Verlag, p. 160-174 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2595).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
  • Impossible differential attack on 30-round SHACAL-2

    Hong, S., Kim, J., Kim, G., Sung, J., Lee, C. & Lee, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Johansson, T. & Maitra, S. (eds.). Springer Verlag, p. 97-106 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2904).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    17 Citations (Scopus)
  • Impossible differential cryptanalysis for block cipher structures

    Kim, J., Hong, S., Sung, J., Lee, S., Lim, J. & Sung, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Johansson, T. & Maitra, S. (eds.). Springer Verlag, p. 82-96 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2904).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    32 Citations (Scopus)
  • Open Access
    35 Citations (Scopus)
  • Key recovery attacks on the RMAC, TMAC, and IACBC

    Sung, J., Hong, D. & Lee, S., 2003, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2727 LNCS, p. 265-273 9 p.

    Research output: Contribution to journalConference articlepeer-review

    2 Citations (Scopus)
  • Linear cryptanalysis on SPECTR-H64 with higher order differential property

    Ko, Y., Hong, D., Hong, S., Lee, S. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Gorodetsky, V., Popyack, L. & Skormin, V. (eds.). Springer Verlag, p. 298-307 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2776).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    24 Citations (Scopus)
  • New parallel domain extenders for UOWHF

    Lee, W., Chang, D., Lee, S., Sung, S. & Nandi, M., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Laih, C. S. (ed.). Springer Verlag, p. 208-227 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2894).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    10 Citations (Scopus)
  • 2004

    A generalization of PGV-hash functions and security analysis in black-box model

    Lee, W., Nandi, M., Sarkar, P., Chang, D., Lee, S. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 212-223 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    3 Citations (Scopus)
  • A secure steganographic scheme against statistical analyses

    Yu, J. J., Han, J. W., Lee, K. S., Seung Cheol, O., Lee, S. & Park, I. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kalker, T., Cox, I. J. & Ro, Y. M. (eds.). Springer Verlag, p. 497-507 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2939).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  • Differential cryptanalysis of tea and XTEA

    Hong, S., Hong, D., Ko, Y., Chang, D., Lee, W. & Lee, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, J. I. & Lee, D. H. (eds.). Springer Verlag, p. 402-417 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2971).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    23 Citations (Scopus)
  • 10 Citations (Scopus)
  • Higher order universal one-way hash functions

    Hong, D., Preneel, B. & Lee, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lee, P. J. & Lee, P. J. (eds.). Springer Verlag, p. 201-213 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3329).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
  • High quality perceptual steganographic techniques

    Chang, K., Jung, C., Lee, S. & Yang, W., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kalker, T., Cox, I. J. & Ro, Y. M. (eds.). Springer Verlag, p. 518-531 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2939).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    2 Citations (Scopus)
  • New block cipher: ARIA

    Kwon, D., Kim, J., Park, S., Sung, S. H., Sohn, Y., Song, J. H., Yeom, Y., Yoon, E. J., Lee, S., Lee, J., Chee, S., Han, D. & Hong, J., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, J. I. & Lee, D. H. (eds.). Springer Verlag, p. 432-445 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2971).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    78 Citations (Scopus)
  • 18 Citations (Scopus)
  • Related-key attacks on reduced rounds of SHACAL-2

    Kim, J., Kim, G., Lee, S., Lim, J. & Song, J., 2004, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3348, p. 175-190 16 p.

    Research output: Contribution to journalArticlepeer-review

    8 Citations (Scopus)