Donghoon Chang

From MaRDI portal
Person:1626125

Available identifiers

zbMath Open chang.donghoonMaRDI QIDQ1626125

List of research outcomes

PublicationDate of PublicationType
eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices2022-12-09Paper
A preimage attack on reduced \textsc{Gimli}-\textsc{Gash}2022-12-07Paper
A new authenticated encryption technique for handling long ciphertexts in memory constrained devices2018-11-26Paper
Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version)2018-11-26Paper
Fault based almost universal forgeries on CLOC and SILC2018-10-26Paper
Exploiting the leakage: analysis of some authenticated encryption schemes2018-10-26Paper
SPF: A New Family of Efficient Format-Preserving Encryption Algorithms2017-05-05Paper
Biclique Cryptanalysis of Full Round AES-128 Based Hashing Modes2016-07-25Paper
Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/5122016-05-19Paper
Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks2016-05-19Paper
PPAE: Practical Parazoa Authenticated Encryption Family2016-01-27Paper
Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-2562016-01-12Paper
Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique2015-11-25Paper
Rig: A Simple, Secure and Flexible Design for Password Hashing2015-11-25Paper
Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message2015-10-20Paper
sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices2015-10-20Paper
Bicliques with Minimal Data and Time Complexity for AES2015-09-11Paper
A Weak Key Class of XTEA for a Related-Key Rectangle Attack2014-08-21Paper
Sufficient Conditions on Padding Schemes of Sponge Construction and Sponge-Based Authenticated-Encryption Scheme2014-08-20Paper
Security Analysis of GFN: 8-Round Distinguisher for 4-Branch Type-2 GFN2014-01-14Paper
On the Security of Hash Functions Employing Blockcipher Postprocessing2011-07-07Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
A New Dedicated 256-Bit Hash Function: FORK-2562009-04-02Paper
Preimage Attack on the Parallel FFT-Hashing Function2009-03-06Paper
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL2008-09-18Paper
Improved Indifferentiability Security Analysis of chopMD Hash Function2008-09-18Paper
HIGHT: A New Block Cipher Suitable for Low-Resource Device2008-08-29Paper
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding2008-04-24Paper
RC4-Hash: A New Hash Function Based on RC42008-04-11Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Information Security and Privacy2005-09-07Paper
https://portal.mardi4nfdi.de/entity/Q44138612003-07-21Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Donghoon Chang