Calculated based on number of publications stored in Pure and citations from Scopus
1995 …2024

Research activity per year

Filter
Chapter

Search results

  • 2004

    A generalization of PGV-hash functions and security analysis in black-box model

    Lee, W., Nandi, M., Sarkar, P., Chang, D., Lee, S. & Sakurai, K., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 212-223 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    3 Citations (Scopus)
  • A secure steganographic scheme against statistical analyses

    Yu, J. J., Han, J. W., Lee, K. S., Seung Cheol, O., Lee, S. & Park, I. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kalker, T., Cox, I. J. & Ro, Y. M. (eds.). Springer Verlag, p. 497-507 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2939).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    7 Citations (Scopus)
  • Differential cryptanalysis of tea and XTEA

    Hong, S., Hong, D., Ko, Y., Chang, D., Lee, W. & Lee, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, J. I. & Lee, D. H. (eds.). Springer Verlag, p. 402-417 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2971).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    26 Citations (Scopus)
  • Differential-linear type attacks on reduced rounds of SHACAL-2

    Shin, Y., Kim, J., Kim, G., Hong, S. & Lee, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 110-122 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    16 Citations (Scopus)
  • Higher order universal one-way hash functions

    Hong, D., Preneel, B. & Lee, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lee, P. J. & Lee, P. J. (eds.). Springer Verlag, p. 201-213 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3329).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    8 Citations (Scopus)
  • High quality perceptual steganographic techniques

    Chang, K., Jung, C., Lee, S. & Yang, W., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Kalker, T., Cox, I. J. & Ro, Y. M. (eds.). Springer Verlag, p. 518-531 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2939).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    6 Citations (Scopus)
  • New block cipher: ARIA

    Kwon, D., Kim, J., Park, S., Sung, S. H., Sohn, Y., Song, J. H., Yeom, Y., Yoon, E. J., Lee, S., Lee, J., Chee, S., Han, D. & Hong, J., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, J. I. & Lee, D. H. (eds.). Springer Verlag, p. 432-445 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2971).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    146 Citations (Scopus)
  • Related key differential cryptanalysis of full-round SPECTR-H64 and CIKS-1

    Ko, Y., Lee, C., Hong, S. & Lee, S., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 137-148 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    16 Citations (Scopus)
  • The related-key rectangle attack - Application to SHACAL-1

    Kim, J., Kim, G., Hong, S., Lee, S. & Hong, D., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Wang, H., Pieprzyk, J. & Varadharajan, V. (eds.). Springer Verlag, p. 123-136 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3108).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    60 Citations (Scopus)
  • Truncated Differential Attacks on 8-Round CRYPTON

    Kim, J., Hong, S., Lee, S., Song, J. & Yang, H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Lim, J. I. & Lee, D. H. (eds.). Springer Verlag, p. 446-456 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2971).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    9 Citations (Scopus)
  • 2003

    Covert channel detection in the ICMP payload using support vector machine

    Sohn, T., Moon, J., Lee, S., Lee, D. H. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Yazici, A. & Sener, C. (eds.). Springer Verlag, p. 828-835 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2869).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    23 Citations (Scopus)
  • Designated verification of non-invertible watermark

    Yoo, H., Lee, H., Lee, S. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Boyd, C. & Mao, W. (eds.). Springer Verlag, p. 338-351 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2851).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    1 Citation (Scopus)
  • Full-round differential attack on the original version of the hash function proposed at PKC'98

    Chang, D., Sung, J., Sung, S., Lee, S. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Nyberg, K. & Heys, H. (eds.). Springer Verlag, p. 160-174 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2595).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    4 Citations (Scopus)
  • Impossible differential attack on 30-round SHACAL-2

    Hong, S., Kim, J., Kim, G., Sung, J., Lee, C. & Lee, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Johansson, T. & Maitra, S. (eds.). Springer Verlag, p. 97-106 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2904).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    17 Citations (Scopus)
  • Impossible differential cryptanalysis for block cipher structures

    Kim, J., Hong, S., Sung, J., Lee, S., Lim, J. & Sung, S., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Johansson, T. & Maitra, S. (eds.). Springer Verlag, p. 82-96 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2904).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    110 Citations (Scopus)
  • Linear cryptanalysis on SPECTR-H64 with higher order differential property

    Ko, Y., Hong, D., Hong, S., Lee, S. & Lim, J., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Gorodetsky, V., Popyack, L. & Skormin, V. (eds.). Springer Verlag, p. 298-307 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2776).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    24 Citations (Scopus)
  • New parallel domain extenders for UOWHF

    Lee, W., Chang, D., Lee, S., Sung, S. & Nandi, M., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Laih, C. S. (ed.). Springer Verlag, p. 208-227 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2894).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    Open Access
    10 Citations (Scopus)