Calculated based on number of publications stored in Pure and citations from Scopus
1995 …2023

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 1998

    A new hash function based on mdx-family and its application to MAC

    Uk Shin, S., Hyune Rhee, K., Hyun Ryu, D. & Jin Lee, S., 1998, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Zheng, Y. & Imai, H. (eds.). Springer Verlag, p. 234-246 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1431).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • 1996

    Conditional correlation attack on nonlinear filter generators

    Lee, S., Chee, S., Park, S. & Park, S., 1996, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1163. p. 360-367 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • On the correlation immune functions and their nonlinearity

    Chee, S., Lee, S., Lee, D. & Sung, S. H., 1996, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 1163. p. 232-243 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    50 Citations (Scopus)
  • 1995

    On the security of the gollmann cascades

    Park, S. J., Lee, S. & Goh, S. C., 1995, Advances in Cryptology ― CRYPTO 1995 - 15th Annual International Cryptology Conference, Proceedings. Springer Verlag, Vol. 963. p. 148-156 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 963).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Semi-bent functions

    Kim, K. & Lee, S., 1995, Advances in Cryptology - ASIACRYPT 1994 - 4th International Conference on the Theory and Applications of Cryptology, Proceedings. Pieprzyk, J. & Safavi-Naini, R. (eds.). Springer Verlag, p. 105-118 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 917).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Citations (Scopus)