The following pages link to Donghoon Chang (Q1626125):
Displaying 16 items.
- A new authenticated encryption technique for handling long ciphertexts in memory constrained devices (Q1626126) (← links)
- Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version) (Q1626128) (← links)
- Fault based almost universal forgeries on CLOC and SILC (Q1989610) (← links)
- Exploiting the leakage: analysis of some authenticated encryption schemes (Q1989638) (← links)
- A preimage attack on reduced \textsc{Gimli}-\textsc{Gash} (Q2104439) (← links)
- Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512 (Q2806766) (← links)
- Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks (Q2806772) (← links)
- Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN (Q2872047) (← links)
- Sufficient Conditions on Padding Schemes of Sponge Construction and Sponge-Based Authenticated-Encryption Scheme (Q2876959) (← links)
- A Weak Key Class of XTEA for a Related-Key Rectangle Attack (Q2876983) (← links)
- Bicliques with Minimal Data and Time Complexity for AES (Q2942833) (← links)
- SPF: A New Family of Efficient Format-Preserving Encryption Algorithms (Q2980846) (← links)
- On the Security of Hash Functions Employing Blockcipher Postprocessing (Q3013082) (← links)
- Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message (Q3194591) (← links)
- sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices (Q3194622) (← links)
- Progress in Cryptology - INDOCRYPT 2004 (Q5712198) (← links)