Jooyoung Lee

From MaRDI portal
Revision as of 02:18, 7 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:498968

Available identifiers

zbMath Open lee.jooyoungMaRDI QIDQ498968

List of research outcomes





PublicationDate of PublicationType
Security analysis of the ISO standard \textsf{OFB}-\textsf{DRBG}2024-11-04Paper
Multistate analysis from cross-sectional and auxiliary samples2024-10-29Paper
Dependence modeling for multi-type recurrent events via copulas2024-10-28Paper
ZLR: a fast online authenticated encryption scheme achieving full security2024-10-14Paper
Weighting estimation in the cause-specific Cox regression with partially missing causes of failure2024-10-08Paper
XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation2023-12-08Paper
Multi-user security of the sum of truncated random permutations2023-08-16Paper
Conformational space annealing explained: a general optimization algorithm, with diverse applications2023-06-07Paper
Partition and mix: generalizing the swap-or-not shuffle2023-05-31Paper
Toward a fully secure authenticated encryption scheme from a pseudorandom permutation2023-05-12Paper
Transciphering framework for approximate homomorphic encryption2023-05-12Paper
Improved security analysis for nonce-based enhanced hash-then-mask MACs2023-03-21Paper
\(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryption2022-08-30Paper
Tight security bounds for double-block hash-then-sum MACs2021-12-01Paper
A generalized q growth model based on nonadditive entropy2021-02-18Paper
\textsf{FPL}: white-box secure block cipher using parallel table look-ups2020-08-05Paper
Indifferentiability of truncated random permutations2020-05-20Paper
Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model2018-12-20Paper
Minimizing the two-round Even-Mansour cipher2018-11-01Paper
Provable security of (tweakable) block ciphers based on substitution-permutation networks2018-09-12Paper
Key alternating ciphers based on involutions2018-04-16Paper
Connecting tweakable and multi-key blockcipher security2018-04-06Paper
An efficient affine equivalence algorithm for multiple S-boxes and a structured affine layer2018-02-16Paper
Indifferentiability of the Sum of Random Permutations Toward Optimal Security2017-09-08Paper
Collision Resistance of the JH Hash Function2017-07-12Paper
Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation2017-06-08Paper
The security of tandem-DM in the ideal cipher model2017-05-22Paper
MJH: a faster alternative to MDC-22015-09-29Paper
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes2015-09-18Paper
The Security of Multiple Encryption in the Ideal Cipher Model2014-08-07Paper
Minimizing the Two-Round Even-Mansour Cipher2014-08-07Paper
Security of permutation-based compression function {\textsf{lp}}2312014-04-17Paper
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption2013-05-31Paper
Provable Security of the Knudsen-Preneel Compression Functions2013-03-19Paper
Preimage resistance of \(\mathsf{LP}mkr\) with \(r=m-1\)2012-03-19Paper
The Preimage Security of Double-Block-Length Compression Functions2011-12-02Paper
The Collision Security of Tandem-DM in the Ideal Cipher Model2011-08-12Paper
On Lai-Massey and quasi-Feistel ciphers2011-03-10Paper
MJH: A Faster Alternative to MDC-22011-02-11Paper
Multi-property-preserving Domain Extension Using Polynomial-Based Modes of Operation2010-06-01Paper
IMPERSONATION ATTACK ON THE STRONG IDENTIFICATION BASED ON A HARD-ON-AVERAGE PROBLEM2010-02-12Paper
Efficient RFID authentication protocols based on pseudorandom sequence generators2009-03-31Paper
Tree-Based Key Distribution Patterns2007-11-15Paper
Selected Areas in Cryptography2006-10-10Paper
Common intersection designs2006-09-06Paper
Infinite ground state degeneracy and glassy dynamics in the frustrated \(XY\) model and lattice Coulomb gas with \(f=1/6\)2002-11-19Paper
Efficient parallel algorithms in global optimization of potential energy functions for peptides, proteins, and crystals2001-01-29Paper
New numerical method to study phase transitions2000-07-16Paper
Surmounting the multiple-minima problem in protein folding2000-04-26Paper

Research outcomes over time

This page was built for person: Jooyoung Lee