The following pages link to Jooyoung Lee (Q498968):
Displaying 45 items.
- MJH: a faster alternative to MDC-2 (Q498970) (← links)
- On Lai-Massey and quasi-Feistel ciphers (Q629883) (← links)
- Preimage resistance of \(\mathsf{LP}mkr\) with \(r=m-1\) (Q765490) (← links)
- \textsf{FPL}: white-box secure block cipher using parallel table look-ups (Q785005) (← links)
- Efficient RFID authentication protocols based on pseudorandom sequence generators (Q1009145) (← links)
- Efficient parallel algorithms in global optimization of potential energy functions for peptides, proteins, and crystals (Q1578195) (← links)
- Tweakable block ciphers secure beyond the birthday bound in the ideal cipher model (Q1633458) (← links)
- Provable security of (tweakable) block ciphers based on substitution-permutation networks (Q1673418) (← links)
- An efficient affine equivalence algorithm for multiple S-boxes and a structured affine layer (Q1698644) (← links)
- Key alternating ciphers based on involutions (Q1744011) (← links)
- Infinite ground state degeneracy and glassy dynamics in the frustrated \(XY\) model and lattice Coulomb gas with \(f=1/6\) (Q1848228) (← links)
- Surmounting the multiple-minima problem in protein folding (Q1969511) (← links)
- Minimizing the two-round Even-Mansour cipher (Q1994640) (← links)
- Tight security bounds for double-block hash-then-sum MACs (Q2055619) (← links)
- \(\mathsf{Rubato}\): noisy ciphers for approximate homomorphic encryption (Q2170018) (← links)
- Indifferentiability of truncated random permutations (Q2181878) (← links)
- The security of tandem-DM in the ideal cipher model (Q2397447) (← links)
- Connecting tweakable and multi-key blockcipher security (Q2413014) (← links)
- Security of permutation-based compression function {\textsf{lp}}231 (Q2446596) (← links)
- Improved security analysis for nonce-based enhanced hash-then-mask MACs (Q2692363) (← links)
- The Security of Multiple Encryption in the Ideal Cipher Model (Q2874494) (← links)
- Minimizing the Two-Round Even-Mansour Cipher (Q2874495) (← links)
- Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes (Q2946949) (← links)
- Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation (Q2989808) (← links)
- MJH: A Faster Alternative to MDC-2 (Q3073709) (← links)
- The Preimage Security of Double-Block-Length Compression Functions (Q3102189) (← links)
- IMPERSONATION ATTACK ON THE STRONG IDENTIFICATION BASED ON A HARD-ON-AVERAGE PROBLEM (Q3406102) (← links)
- Multi-property-preserving Domain Extension Using Polynomial-Based Modes of Operation (Q3563856) (← links)
- New numerical method to study phase transitions (Q4491714) (← links)
- Provable Security of the Knudsen-Preneel Compression Functions (Q4911604) (← links)
- Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption (Q4924424) (← links)
- A generalized <i>q</i> growth model based on nonadditive entropy (Q5151963) (← links)
- The Collision Security of Tandem-DM in the Ideal Cipher Model (Q5199213) (← links)
- Collision Resistance of the JH Hash Function (Q5272085) (← links)
- Indifferentiability of the Sum of Random Permutations Toward Optimal Security (Q5352613) (← links)
- Tree-Based Key Distribution Patterns (Q5426189) (← links)
- Common intersection designs (Q5486311) (← links)
- Selected Areas in Cryptography (Q5491757) (← links)
- Partition and mix: generalizing the swap-or-not shuffle (Q6041586) (← links)
- Conformational space annealing explained: a general optimization algorithm, with diverse applications (Q6097845) (← links)
- Weighting estimation in the cause-specific Cox regression with partially missing causes of failure (Q6615904) (← links)
- ZLR: a fast online authenticated encryption scheme achieving full security (Q6618633) (← links)
- Dependence modeling for multi-type recurrent events via copulas (Q6625203) (← links)
- Multistate analysis from cross-sectional and auxiliary samples (Q6627311) (← links)
- Security analysis of the ISO standard \textsf{OFB}-\textsf{DRBG} (Q6632048) (← links)