The following pages link to Donghoon Chang (Q1626125):
Displaying 34 items.
- A new authenticated encryption technique for handling long ciphertexts in memory constrained devices (Q1626126) (← links)
- Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version) (Q1626128) (← links)
- Fault based almost universal forgeries on CLOC and SILC (Q1989610) (← links)
- Exploiting the leakage: analysis of some authenticated encryption schemes (Q1989638) (← links)
- A preimage attack on reduced \textsc{Gimli}-\textsc{Gash} (Q2104439) (← links)
- Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512 (Q2806766) (← links)
- Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks (Q2806772) (← links)
- Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN (Q2872047) (← links)
- Sufficient Conditions on Padding Schemes of Sponge Construction and Sponge-Based Authenticated-Encryption Scheme (Q2876959) (← links)
- A Weak Key Class of XTEA for a Related-Key Rectangle Attack (Q2876983) (← links)
- Bicliques with Minimal Data and Time Complexity for AES (Q2942833) (← links)
- SPF: A New Family of Efficient Format-Preserving Encryption Algorithms (Q2980846) (← links)
- On the Security of Hash Functions Employing Blockcipher Postprocessing (Q3013082) (← links)
- Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message (Q3194591) (← links)
- sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices (Q3194622) (← links)
- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique (Q3454593) (← links)
- Rig: A Simple, Secure and Flexible Design for Password Hashing (Q3454594) (← links)
- Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256 (Q3460176) (← links)
- PPAE: Practical Parazoa Authenticated Encryption Family (Q3467164) (← links)
- HIGHT: A New Block Cipher Suitable for Low-Resource Device (Q3522151) (← links)
- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL (Q3525673) (← links)
- Improved Indifferentiability Security Analysis of chopMD Hash Function (Q3525693) (← links)
- Preimage Attack on the Parallel FFT-Hashing Function (Q3608904) (← links)
- A New Dedicated 256-Bit Hash Function: FORK-256 (Q3618654) (← links)
- (Q4413861) (← links)
- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices (Q5055965) (← links)
- Information Security and Privacy (Q5315259) (← links)
- RC4-Hash: A New Hash Function Based on RC4 (Q5458267) (← links)
- Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding (Q5459085) (← links)
- Progress in Cryptology - INDOCRYPT 2004 (Q5712198) (← links)
- Information Security and Cryptology - ICISC 2003 (Q5714145) (← links)
- Biclique Cryptanalysis of Full Round AES-128 Based Hashing Modes (Q5740233) (← links)
- Information Security and Cryptology - ICISC 2005 (Q5899287) (← links)
- Advances in Cryptology - ASIACRYPT 2003 (Q5902383) (← links)