Jongsung Kim
Jongsung Kim
Dept. of Mathematics & Dept. of Financial Information Security, Kookmin University, Republic of Korea
Verified email at kookmin.ac.kr
TitleCited byYear
HIGHT: A new block cipher suitable for low-resource device
D Hong, J Sung, S Hong, J Lim, S Lee, BS Koo, C Lee, D Chang, J Lee, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 46-59, 2006
6282006
New impossible differential attacks on AES
J Lu, O Dunkelman, N Keller, J Kim
International Conference on Cryptology in India, 279-293, 2008
1512008
On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1
J Kim, A Biryukov, B Preneel, S Hong
International Conference on Security and Cryptography for Networks, 242-256, 2006
1172006
Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1
J Lu, J Kim, N Keller, O Dunkelman
Cryptographers’ Track at the RSA Conference, 370-386, 2008
1112008
Impossible differential cryptanalysis for block cipher structures
J Kim, S Hong, J Sung, S Lee, J Lim, S Sung
International Conference on Cryptology in India, 82-96, 2003
1112003
Related-key rectangle attacks on reduced AES-192 and AES-256
J Kim, S Hong, B Preneel
International Workshop on Fast Software Encryption, 225-241, 2007
1092007
Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192
S Hong, J Kim, S Lee, B Preneel
International Workshop on Fast Software Encryption, 368-383, 2005
942005
The related-key rectangle attack–application to SHACAL-1
J Kim, G Kim, S Hong, S Lee, D Hong
Australasian Conference on Information Security and Privacy, 123-136, 2004
802004
Impossible differential cryptanalysis using matrix method
J Kim, S Hong, J Lim
Discrete Mathematics 310 (5), 988-1002, 2010
492010
Probabilistic trust aware data replica placement strategy for online video streaming applications in vehicular delay tolerant networks
N Kumar, J Kim
Mathematical and Computer Modelling 58 (1-2), 3-14, 2013
362013
Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher.
TH Kim, J Kim, S Hong, J Sung
IACR Cryptology ePrint Archive 2008, 281, 2008
352008
Related-key rectangle attack on 42-round SHACAL-2
J Lu, J Kim, N Keller, O Dunkelman
International Conference on Information Security, 85-100, 2006
352006
Related-key attacks on reduced rounds of SHACAL-2
J Kim, G Kim, S Lee, J Lim, J Song
International Conference on Cryptology in India, 175-190, 2004
342004
Advanced differential-style cryptanalysis of the NSA's skipjack block cipher
J Kim*, RCW Phan**
Cryptologia 33 (3), 246-270, 2009
332009
Impossible differential attack on 30-round SHACAL-2
S Hong, J Kim, G Kim, J Sung, C Lee, S Lee
International Conference on Cryptology in India, 97-106, 2003
332003
ELACCA: Efficient learning automata based cell clustering algorithm for wireless sensor networks
N Kumar, J Kim
Wireless personal communications 73 (4), 1495-1512, 2013
302013
Related-key rectangle attack on the full SHACAL-1
O Dunkelman, N Keller, J Kim
International Workshop on Selected Areas in Cryptography, 28-44, 2006
302006
Amplified boomerang attack against reduced-round SHACAL
J Kim, D Moon, W Lee, S Hong, S Lee, S Jung
International Conference on the Theory and Application of Cryptology and …, 2002
302002
Cryptanalysis of reduced versions of the Camellia block cipher
J Lu, Y Wei, PA Fouque, J Kim
IET Information Security 6 (3), 228-238, 2012
272012
Differential-linear type attacks on reduced rounds of SHACAL-2
Y Shin, J Kim, G Kim, S Hong, S Lee
Australasian Conference on Information Security and Privacy, 110-122, 2004
272004
The system can't perform the operation now. Try again later.
Articles 1–20