Jongsung Kim

From MaRDI portal
Revision as of 14:23, 11 December 2023 by AuthorDisambiguator (talk | contribs) (AuthorDisambiguator moved page Jongsung Kim to Jongsung Kim: Duplicate)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:367130

Available identifiers

zbMath Open kim.jongsungMaRDI QIDQ367130

List of research outcomes

PublicationDate of PublicationType
Global existence of smooth solutions for the compressible viscous fluid flow with radiation in \(\mathbb{R}^3\).2024-01-18Paper
Global existence of smooth solutions for the diffusion approximation model of general gas in radiation hydrodynamics2023-11-07Paper
See-in-the-middle attacks on blockciphers ARIA and DEFAULT2023-08-21Paper
Improved see-in-the-middle attacks on AES2022-12-07Paper
Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions2022-12-05Paper
Stability of non-degenerate stationary solution in inflow problem for a 1-D radiation hydrodynamics model2022-11-17Paper
Differential uniformity and linearity of S-boxes by multiplicative complexity2022-07-15Paper
\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations2022-03-24Paper
Stationary solutions of outflow problem for full compressible Navier-Stokes-Poisson system: existence, stability and convergence rate2021-12-08Paper
Non-degenerate stationary solution for outflow problem on the 1-D viscous heat-conducting gas with radiation2021-05-03Paper
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis2017-07-12Paper
https://portal.mardi4nfdi.de/entity/Q29734632017-04-03Paper
Higher order eTCR hash functions2016-07-06Paper
The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher2014-08-20Paper
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher2014-03-13Paper
Asymptotic behavior of rarefaction waves for a model system of a radiating gas2013-09-26Paper
Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher2011-07-14Paper
Notions and relations for RKA-secure permutation and function families2011-06-03Paper
DES with any reduced masked rounds is not secure against side-channel attacks2010-11-08Paper
Nonlinear stability of strong rarefaction waves for the generalized KdV-Burgers-Kuramoto equation with large initial perturbation2010-10-14Paper
Impossible differential cryptanalysis using matrix method2010-04-27Paper
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis2009-02-10Paper
New Impossible Differential Attacks on AES2009-01-22Paper
Convergence rates of solutions toward boundary layer solutions for generalized Benjamin-Bona-Mahony-Burgers equations in the half-space2008-12-12Paper
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b2008-11-27Paper
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)2008-11-27Paper
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL2008-09-18Paper
Related-Key Rectangle Attacks on Reduced AES-192 and AES-2562008-09-16Paper
HIGHT: A New Block Cipher Suitable for Low-Resource Device2008-08-29Paper
Related-Key Rectangle Attack on 42-Round SHACAL-22008-06-17Paper
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY12008-04-24Paper
Differential and Rectangle Attacks on Reduced-Round SHACAL-12008-04-11Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Related-Key Rectangle Attack on the Full SHACAL-12007-11-29Paper
Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant2007-09-07Paper
Cryptography and Coding2006-11-01Paper
Information and Communications Security2006-10-24Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Fast Software Encryption2006-06-22Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Information Security and Privacy2005-09-07Paper
Information Security and Privacy2005-09-07Paper
Amplified Boomerang Attack against Reduced-Round SHACAL2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q45278722001-08-20Paper
https://portal.mardi4nfdi.de/entity/Q27196672001-06-25Paper
https://portal.mardi4nfdi.de/entity/Q27643532001-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Jongsung Kim