Seokhie Hong

From MaRDI portal
(Redirected from Person:294877)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Toffoli gate count optimized space-efficient quantum circuit for binary field multiplication
Quantum Information Processing
2024-10-29Paper
New space-efficient quantum algorithm for binary elliptic curves using the optimized division algorithm
Quantum Information Processing
2023-06-13Paper
A preimage attack on reduced \textsc{Gimli}-\textsc{Gash}2022-12-07Paper
Efficient quantum circuit of Proth number modular multiplication2022-12-07Paper
\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations2022-03-24Paper
New Hybrid Method for Isogeny-Based Cryptosystems Using Edwards Curves
IEEE Transactions on Information Theory
2020-09-29Paper
Optimized method for computing odd-degree isogenies on Edwards curves2020-05-05Paper
Collision attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
Journal of Applied Mathematics
2018-10-10Paper
Low complexity bit-parallel multiplier for \(\mathbb{F}_{2^n}\) defined by repeated polynomials
Discrete Applied Mathematics
2018-04-10Paper
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
IEEE Transactions on Information Theory
2017-07-12Paper
Provable security for 13 round Skipjack-like structure
Information Processing Letters
2016-06-16Paper
scientific article; zbMATH DE number 6499823 (Why is no real title available?)2015-10-28Paper
Extended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysis
Information Sciences
2015-09-24Paper
A Weak Key Class of XTEA for a Related-Key Rectangle Attack
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Improved fast correlation attack on the shrinking and self-shrinking generators
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Formulas for cube roots in \(\mathbb F_{3^m}\) using shifted polynomial basis
Information Processing Letters
2014-04-17Paper
Improved differential fault analysis on PRESENT-80/128
International Journal of Computer Mathematics
2014-01-29Paper
Differential fault analysis on block cipher SEED
Mathematical and Computer Modelling
2012-08-24Paper
First-order side channel attacks on Zhang's countermeasures
Information Sciences
2012-07-13Paper
A fast and provably secure higher-order masking of AES S-box
Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
2011-10-07Paper
Impossible differential cryptanalysis using matrix method
Discrete Mathematics
2010-04-27Paper
Cryptanalysis of an involutional block cipher using cellular automata
Information Processing Letters
2010-03-24Paper
A New Double-Block-Length Hash Function Using Feistel Structure
Advances in Information Security and Assurance
2009-06-25Paper
A New Dedicated 256-Bit Hash Function: FORK-256
Fast Software Encryption
2009-04-02Paper
Preimage Attack on the Parallel FFT-Hashing Function
Information Security and Privacy
2009-03-06Paper
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128
Information Security and Privacy
2009-03-06Paper
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis
Computational Science and Its Applications - ICCSA 2006
2009-02-10Paper
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)
Lecture Notes in Computer Science
2008-11-27Paper
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
Fast Software Encryption
2008-09-18Paper
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
Fast Software Encryption
2008-09-16Paper
HIGHT: A New Block Cipher Suitable for Low-Resource Device
Lecture Notes in Computer Science
2008-08-29Paper
Related-Key Chosen IV Attacks on Grain-v1 and Grain-128
Information Security and Privacy
2008-07-08Paper
How to Construct Universal One-Way Hash Functions of Order r
Progress in Cryptology - INDOCRYPT 2005
2008-03-17Paper
On the Pseudorandomness of a Modification of KASUMI Type Permutations
Lecture Notes in Computer Science
2008-03-17Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant
Information Security and Privacy
2007-09-07Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Known-IV, known-in-Advance-IV, and replayed-and-Known-IV attacks on multiple modes of operation of block ciphers
Journal of Cryptology
2007-01-24Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
scientific article; zbMATH DE number 2081067 (Why is no real title available?)2004-08-04Paper
Amplified Boomerang Attack against Reduced-Round SHACAL
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1759276 (Why is no real title available?)2002-10-13Paper
scientific article; zbMATH DE number 1759641 (Why is no real title available?)2002-10-10Paper
scientific article; zbMATH DE number 1689596 (Why is no real title available?)2002-01-13Paper
scientific article; zbMATH DE number 1583785 (Why is no real title available?)2001-07-03Paper
scientific article; zbMATH DE number 1612499 (Why is no real title available?)2001-07-01Paper


Research outcomes over time


This page was built for person: Seokhie Hong