Jooyoung Lee

From MaRDI portal
Person:498968

Available identifiers

zbMath Open lee.jooyoungMaRDI QIDQ498968

List of research outcomes

PublicationDate of PublicationType
XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation2023-12-08Paper
Multi-user security of the sum of truncated random permutations2023-08-16Paper
Conformational space annealing explained: a general optimization algorithm, with diverse applications2023-06-07Paper
Partition and mix: generalizing the swap-or-not shuffle2023-05-31Paper
Toward a fully secure authenticated encryption scheme from a pseudorandom permutation2023-05-12Paper
Transciphering framework for approximate homomorphic encryption2023-05-12Paper
Improved security analysis for nonce-based enhanced hash-then-mask MACs2023-03-21Paper
\(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryption2022-08-30Paper
Tight security bounds for double-block hash-then-sum MACs2021-12-01Paper
A generalized q growth model based on nonadditive entropy2021-02-18Paper
\textsf{FPL}: white-box secure block cipher using parallel table look-ups2020-08-05Paper
Indifferentiability of truncated random permutations2020-05-20Paper
Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model2018-12-20Paper
Minimizing the two-round Even-Mansour cipher2018-11-01Paper
Provable security of (tweakable) block ciphers based on substitution-permutation networks2018-09-12Paper
Key alternating ciphers based on involutions2018-04-16Paper
Connecting tweakable and multi-key blockcipher security2018-04-06Paper
An efficient affine equivalence algorithm for multiple S-boxes and a structured affine layer2018-02-16Paper
Indifferentiability of the Sum of Random Permutations Toward Optimal Security2017-09-08Paper
Collision Resistance of the JH Hash Function2017-07-12Paper
Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation2017-06-08Paper
The security of tandem-DM in the ideal cipher model2017-05-22Paper
MJH: a faster alternative to MDC-22015-09-29Paper
Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes2015-09-18Paper
The Security of Multiple Encryption in the Ideal Cipher Model2014-08-07Paper
Minimizing the Two-Round Even-Mansour Cipher2014-08-07Paper
Security of permutation-based compression function {\textsf{lp}}2312014-04-17Paper
Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption2013-05-31Paper
Provable Security of the Knudsen-Preneel Compression Functions2013-03-19Paper
Preimage resistance of \(\mathsf{LP}mkr\) with \(r=m-1\)2012-03-19Paper
The Preimage Security of Double-Block-Length Compression Functions2011-12-02Paper
The Collision Security of Tandem-DM in the Ideal Cipher Model2011-08-12Paper
On Lai-Massey and quasi-Feistel ciphers2011-03-10Paper
MJH: A Faster Alternative to MDC-22011-02-11Paper
Multi-property-preserving Domain Extension Using Polynomial-Based Modes of Operation2010-06-01Paper
IMPERSONATION ATTACK ON THE STRONG IDENTIFICATION BASED ON A HARD-ON-AVERAGE PROBLEM2010-02-12Paper
Efficient RFID authentication protocols based on pseudorandom sequence generators2009-03-31Paper
Tree-Based Key Distribution Patterns2007-11-15Paper
Selected Areas in Cryptography2006-10-10Paper
Common intersection designs2006-09-06Paper
Infinite ground state degeneracy and glassy dynamics in the frustrated \(XY\) model and lattice Coulomb gas with \(f=1/6\)2002-11-19Paper
Efficient parallel algorithms in global optimization of potential energy functions for peptides, proteins, and crystals2001-01-29Paper
New numerical method to study phase transitions2000-07-16Paper
Surmounting the multiple-minima problem in protein folding2000-04-26Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Jooyoung Lee