Skip to main navigation
Skip to search
Skip to main content
Korea University Pure Home
Home
Profiles
Research units
Equipment
Research output
Press/Media
Search by expertise, name or affiliation
Security analysis of the full-round CHESS-64 cipher suitable for pervasive computing environments
Changhoon Lee
, Jongsung Kim
*
,
Seokhie Hong
, Yang Sun Lee
*
Corresponding author for this work
Smart Quantum Communication Research Center
School of Cybersecurity
Research output
:
Contribution to journal
›
Article
›
peer-review
2
Citations (Scopus)
Overview
Fingerprint
Fingerprint
Dive into the research topics of 'Security analysis of the full-round CHESS-64 cipher suitable for pervasive computing environments'. Together they form a unique fingerprint.
Sort by
Weight
Alphabetically
Keyphrases
Security Analysis
100%
Cipher
100%
Pervasive Computing Environment
100%
Chess
100%
High Security
40%
Time Complexity
40%
Master Key
40%
Wireless Data
20%
Wireless Communication
20%
Wireless Network Technology
20%
Information Technology
20%
Related-key Differential Attack
20%
Control Operation
20%
Communication Technologies
20%
Initial Attack
20%
6-bit
20%
High-speed Encryption
20%
Second Attack
20%
Connected Devices
20%
Computer Science
Time Complexity
100%
Security Analysis
100%
pervasive computing environment
100%
Wireless Networks
50%
security level
50%
Network Technology
50%
Connected Device
50%
Information Technology
50%