Jongsung Kim

From MaRDI portal
Person:367130

Available identifiers

zbMath Open kim.jongsungMaRDI QIDQ367130

List of research outcomes





PublicationDate of PublicationType
Preimage attacks on reduced-round \textsc{Ascon-Xof}2024-08-13Paper
Enhancing the related-key security of \textsf{PIPO} through new key schedules2024-05-31Paper
Global existence of smooth solutions for the compressible viscous fluid flow with radiation in \(\mathbb{R}^3\).2024-01-18Paper
Global existence of smooth solutions for the diffusion approximation model of general gas in radiation hydrodynamics2023-11-07Paper
See-in-the-middle attacks on blockciphers ARIA and DEFAULT2023-08-21Paper
Improved see-in-the-middle attacks on AES2022-12-07Paper
Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions2022-12-05Paper
Stability of non-degenerate stationary solution in inflow problem for a 1-D radiation hydrodynamics model2022-11-17Paper
Differential uniformity and linearity of S-boxes by multiplicative complexity2022-07-15Paper
\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations2022-03-24Paper
Stationary solutions of outflow problem for full compressible Navier-Stokes-Poisson system: existence, stability and convergence rate2021-12-08Paper
Non-degenerate stationary solution for outflow problem on the 1-D viscous heat-conducting gas with radiation2021-05-03Paper
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis2017-07-12Paper
https://portal.mardi4nfdi.de/entity/Q29734632017-04-03Paper
Higher order eTCR hash functions2016-07-06Paper
The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher2014-08-20Paper
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher2014-03-13Paper
Asymptotic behavior of rarefaction waves for a model system of a radiating gas2013-09-26Paper
Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher2011-07-14Paper
Notions and relations for RKA-secure permutation and function families2011-06-03Paper
DES with any reduced masked rounds is not secure against side-channel attacks2010-11-08Paper
Nonlinear stability of strong rarefaction waves for the generalized KdV-Burgers-Kuramoto equation with large initial perturbation2010-10-14Paper
Impossible differential cryptanalysis using matrix method2010-04-27Paper
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis2009-02-10Paper
New Impossible Differential Attacks on AES2009-01-22Paper
Convergence rates of solutions toward boundary layer solutions for generalized Benjamin-Bona-Mahony-Burgers equations in the half-space2008-12-12Paper
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract)2008-11-27Paper
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b2008-11-27Paper
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL2008-09-18Paper
Related-Key Rectangle Attacks on Reduced AES-192 and AES-2562008-09-16Paper
HIGHT: A New Block Cipher Suitable for Low-Resource Device2008-08-29Paper
Related-Key Rectangle Attack on 42-Round SHACAL-22008-06-17Paper
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY12008-04-24Paper
Differential and Rectangle Attacks on Reduced-Round SHACAL-12008-04-11Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Related-Key Rectangle Attack on the Full SHACAL-12007-11-29Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant2007-09-07Paper
Cryptography and Coding2006-11-01Paper
Information and Communications Security2006-10-24Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Fast Software Encryption2006-06-22Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Information Security and Privacy2005-09-07Paper
Information Security and Privacy2005-09-07Paper
Amplified Boomerang Attack against Reduced-Round SHACAL2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q45278722001-08-20Paper
The large-time behavior of solutions for the system of nonisentopic gas dynamics with damping.2001-06-25Paper
Convergence rates of solutions to initial boundary value problem for one dimensional nonisentropic gas dynamic system with damping.2001-01-01Paper

Research outcomes over time

This page was built for person: Jongsung Kim