Calculated based on number of publications stored in Pure and citations from Scopus
1995 …2024

Research activity per year

Search results

  • 2004

    Related-key attacks on reduced rounds of SHACAL-2

    Kim, J., Kim, G., Lee, S., Lim, J. & Song, J., 2004, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3348, p. 175-190 16 p.

    Research output: Contribution to journalArticlepeer-review

    22 Citations (Scopus)
  • Open Access
    62 Citations (Scopus)
  • 16 Citations (Scopus)
  • The related-key rectangle attack - Application to SHACAL-1

    Kim, J., Kim, G., Hong, S., Lee, S. & Hong, D., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 123-136 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    60 Citations (Scopus)
  • Truncated Differential Attacks on 8-Round CRYPTON

    Kim, J., Hong, S., Lee, S., Song, J. & Yang, H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, J. I. & Lee, D. H. (eds.). Springer Verlag, p. 446-456 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2971).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    9 Citations (Scopus)
  • 2003

    Covert channel detection in the ICMP payload using support vector machine

    Sohn, T., Moon, J., Lee, S., Lee, D. H. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Yazici, A. & Sener, C. (eds.). Springer Verlag, p. 828-835 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2869).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    23 Citations (Scopus)
  • Designated verification of non-invertible watermark

    Yoo, H., Lee, H., Lee, S. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Boyd, C. & Mao, W. (eds.). Springer Verlag, p. 338-351 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2851).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • Differential and linear cryptanalysis for 2-round SPNs

    Chun, K., Kim, S., Lee, S., Sung, S. H. & Yoon, S., 2003 Sept 15, In: Information Processing Letters. 87, 5, p. 277-282 6 p.

    Research output: Contribution to journalArticlepeer-review

    14 Citations (Scopus)
  • Full-round differential attack on the original version of the hash function proposed at PKC'98

    Chang, D., Sung, J., Sung, S., Lee, S. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Nyberg, K. & Heys, H. (eds.). Springer Verlag, p. 160-174 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2595).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    4 Citations (Scopus)
  • Impossible differential attack on 30-round SHACAL-2

    Hong, S., Kim, J., Kim, G., Sung, J., Lee, C. & Lee, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Johansson, T. & Maitra, S. (eds.). Springer Verlag, p. 97-106 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2904).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    17 Citations (Scopus)
  • Impossible differential cryptanalysis for block cipher structures

    Kim, J., Hong, S., Sung, J., Lee, S., Lim, J. & Sung, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Johansson, T. & Maitra, S. (eds.). Springer Verlag, p. 82-96 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2904).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    105 Citations (Scopus)
  • Open Access
    54 Citations (Scopus)
  • Key recovery attacks on the RMAC, TMAC, and IACBC

    Sung, J., Hong, D. & Lee, S., 2003, In: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2727 LNCS, p. 265-273 9 p.

    Research output: Contribution to journalConference articlepeer-review

    7 Citations (Scopus)
  • Linear cryptanalysis on SPECTR-H64 with higher order differential property

    Ko, Y., Hong, D., Hong, S., Lee, S. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Gorodetsky, V., Popyack, L. & Skormin, V. (eds.). Springer Verlag, p. 298-307 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2776).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    24 Citations (Scopus)
  • New parallel domain extenders for UOWHF

    Lee, W., Chang, D., Lee, S., Sung, S. & Nandi, M., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Laih, C. S. (ed.). Springer Verlag, p. 208-227 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2894).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    10 Citations (Scopus)
  • 2002

    A chosen plaintext linear attack on block cipher CIKS-1

    Lee, C., Hong, D., Lee, S., Lee, S., Yang, H. & Lim, J. I., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2513. p. 456-468 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2513).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    26 Citations (Scopus)
  • Amplified boomerang attack against reduced-round shacal

    Kim, J., Moon, D., Lee, W., Hong, S., Lee, S. & Jung, S., 2002, Advances in Cryptology - ASIACRYPT 2002 - 8th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Zheng, Y. (ed.). Springer Verlag, p. 243-253 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2501).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • An improved method of multiplication on certain elliptic curves

    Park, Y. H., Oh, S., Lee, S., Lim, J. I. & Sung, M., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2274. p. 310-322 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • A practical approach defeating blackmailing

    Han, D. G., Park, H. Y., Park, Y. H., Lee, S., Lee, D. H. & Yang, H. J., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 464-481 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Concrete security analysis of CTR-OFB and CTR-CFB modes of operation

    Sung, J., Lee, S., Lim, J., Lee, W. & Yi, O., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 103-113 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Impossible differential cryptanalysis of reduced round XTEA and TEA

    Moon, D., Hwang, K., Lee, W., Lee, S. & Lim, J., 2002, Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers. Daemen, J. & Rijmen, V. (eds.). Springer Verlag, p. 49-60 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2365).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    40 Citations (Scopus)
  • Impossible differential cryptanalysis of zodiac

    Hong, D., Sung, J., Moriai, S., Lee, S. & Lim, J., 2002 Jan, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E85-A, 1, p. 38-43 6 p.

    Research output: Contribution to journalArticlepeer-review

  • Impossible differential cryptanalysis of zodiac

    Hong, D., Sung, J., Moriai, S., Lee, S. & Lim, J., 2002, Fast Software Encryption - 8th International Workshop, FSE 2001, Revised Papers. Matsui, M. (ed.). Springer Verlag, p. 300-311 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    10 Citations (Scopus)
  • Off-line authentication using watermarks

    Yoo, H., Lee, K., Lee, S. & Lim, J., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 200-213 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Practical off-line authentication

    Yoo, H., Seo, S., Lee, S. & Lim, J., 2002, In: Proceedings of SPIE-The International Society for Optical Engineering. 4675, p. 141-148 8 p.

    Research output: Contribution to journalArticlepeer-review

  • Provable security for 13 round Skipjack-like structure

    Hong, S., Sung, J., Lee, S., Lim, J. & Kim, J., 2002 Jun 15, In: Information Processing Letters. 82, 5, p. 243-246 4 p.

    Research output: Contribution to journalArticlepeer-review

    2 Citations (Scopus)
  • Saturation attacks on reduced round Skipjack

    Hwang, K., Lee, W., Lee, S., Lee, S. & Lim, J., 2002, Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers. Daemen, J. & Rijmen, V. (eds.). Springer Verlag, p. 100-111 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2365).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    12 Citations (Scopus)
  • Truncated differential cryptanalysis of Camellia

    Lee, S., Hong, S., Lee, S., Lim, J. & Yoon, S., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 32-38 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Citations (Scopus)
  • 2001

    Difference distribution attack on DONUT and improved DONUT

    Cheon, D. H., Hong, S., Lee, S., Lee, S. J., Park, K. H. & Yoon, S. H., 2001, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2015. p. 37-48 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Known-IV attacks on triple modes of operation of block ciphers

    Hong, D., Sung, J., Hong, S., Lee, W., Lee, S., Lim, J. & Yi, O., 2001, Advances in Cryptology - ASIACRYPT 2001 - 7th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Boyd, C. (ed.). Springer Verlag, p. 208-221 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2248).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Citations (Scopus)
  • Practical and provable security against differential and linear cryptanalysis for substitution-permutation networks

    Kang, J. S., Hong, S., Lee, S., Yi, O., Park, C. & Lim, J., 2001 Dec, In: ETRI Journal. 23, 4, p. 158-167 10 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    44 Citations (Scopus)
  • Provable security against differential and linear cryptanalysis for the SPN structure

    Hong, S., Lee, S., Lim, J., Sung, J., Cheon, D. & Cho, I., 2001, Fast Software Encryption - 7th International Workshop, FSE 2000, Proceedings. Schneier, B. (ed.). Springer Verlag, p. 273-283 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1978).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    63 Citations (Scopus)
  • 2000

    A lower bound on the linear span of an FCSR

    Seo, C., Lee, S., Sung, Y., Han, K. & Kim, S., 2000, In: IEEE Transactions on Information Theory. 46, 2, p. 691-693 3 p.

    Research output: Contribution to journalArticlepeer-review

    31 Citations (Scopus)
  • A proposal of a new public key cryptosystem using matrices over a ring

    Yoo, H., Hong, S., Lee, S., Lim, J. I., Yi, O. & Sung, M., 2000, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1841. p. 41-48 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • New block cipher DONUT using pairwise perfect decorrelation

    Cheon, D. H., Lee, S., Lim, J. I. & Lee, S. J., 2000, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1977. p. 250-258 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1977).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • On the optimal diffusion layers with practical security against differential and linear cryptanalysis

    Kang, J. S., Park, C., Lee, S. & Lim, J. I., 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 38-52 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Provable security for the Skipjack-like structure against differential cryptanalysis and linear cryptanalysis

    Sung, J., Lee, S., Lim, J., Hong, S. & Park, S., 2000, Advances in Cryptology - ASIACRYPT 2000 - 6th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Okamoto, T. (ed.). Springer Verlag, p. 274-288 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1976).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    17 Citations (Scopus)
  • 1999

    Developments in generalized Feistel networks

    Chee, S., Lee, S., Park, C. & Sung, S. H., 1999 Apr 29, In: Electronics Letters. 35, 9, p. 707-708 2 p.

    Research output: Contribution to journalArticlepeer-review

    1 Citation (Scopus)
  • 1998

    A new hash function based on mdx-family and its application to MAC

    Uk Shin, S., Hyune Rhee, K., Hyun Ryu, D. & Jin Lee, S., 1998, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Zheng, Y. & Imai, H. (eds.). Springer Verlag, p. 234-246 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1431).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • 1997

    Correlation immune functions with controllable nonlinearity

    Chee, S., Lee, S., Kim, K. & Kim, D., 1997 Dec, In: ETRI Journal. 19, 4, p. 389-400 12 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    8 Citations (Scopus)
  • Improving bounds for the number of correlation immune Boolean functions

    Park, S. M., Lee, S., Sung, S. H. & Kim, K., 1997 Feb 28, In: Information Processing Letters. 61, 4, p. 209-212 4 p.

    Research output: Contribution to journalArticlepeer-review

    14 Citations (Scopus)
  • 1996

    Conditional correlation attack on nonlinear filter generators

    Lee, S., Chee, S., Park, S. & Park, S., 1996, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1163. p. 360-367 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • On the correlation immune functions and their nonlinearity

    Chee, S., Lee, S., Lee, D. & Sung, S. H., 1996, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1163. p. 232-243 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    54 Citations (Scopus)
  • 1995

    On the security of the gollmann cascades

    Park, S. J., Lee, S. J. & Goh, S. C., 1995, Advances in Cryptology ― CRYPTO 1995 - 15th Annual International Cryptology Conference, Proceedings. Coppersmith, D. (ed.). Springer Verlag, p. 148-156 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 963).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    14 Citations (Scopus)
  • Semi-bent functions

    Kim, K. & Lee, S., 1995, Advances in Cryptology - ASIACRYPT 1994 - 4th International Conference on the Theory and Applications of Cryptology, Proceedings. Pieprzyk, J. & Safavi-Naini, R. (eds.). Springer Verlag, p. 105-118 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 917).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    26 Citations (Scopus)