Jin Hong
Jin Hong
Підтверджена електронна адреса в snu.ac.kr - Домашня сторінка
Назва
Посилання
Посилання
Рік
Introduction to Quantum Groups and Crystal Bases
J Hong, SJ Kang
American Mathematical Soc., 2002
5442002
New block cipher: ARIA
D Kwon, J Kim, S Park, SH Sung, Y Sohn, JH Song, Y Yeom, EJ Yoon, ...
ICISC 2003 (LNCS 2971), 432-445, 2004
2802004
New applications of time memory data tradeoffs
J Hong, P Sarkar
ASIACRYPT 2005 (LNCS 3788), 353-372, 2005
174*2005
Secure and efficient broadcast authentication in wireless sensor networks
T Kwon, J Hong
IEEE Transactions on Computers 59 (8), 1120-1133, 2010
722010
Algebraic attacks on summation generators
D Lee, J Kim, J Hong, J Han, D Moon
FSE 2004 (LNCS 3017), 34-48, 2004
652004
A comparison of cryptanalytic tradeoff algorithms
J Hong, S Moon
Journal of Cryptology 26 (4), 559-637, 2013
602013
Analysis and improvement of a PIN-entry method resilient to shoulder-surfing and recording attacks
T Kwon, J Hong
IEEE Transactions on Information Forensics and Security 10 (2), 278-292, 2015
552015
A new class of single cycle T-functions
J Hong, DH Lee, Y Yeom, D Han
FSE 2005 (LNCS 3557), 68-82, 2005
532005
Young tableaux and crystal ℬ(∞) for finite simple Lie algebras
J Hong, H Lee
Journal of Algebra 320 (10), 3680-3693, 2008
522008
TMD-tradeoff and state entropy loss considerations of streamcipher MICKEY
J Hong, WH Kim
INDOCRYPT 2005 (LNCS 3797), 169-182, 2005
422005
Variants of the distinguished point method for cryptanalytic time memory trade-offs
J Hong, KC Jeong, EY Kwon, IS Lee, D Ma
ISPEC 2008 (LNCS 4991), 131-145, 2008
382008
The cost of false alarms in Hellman and rainbow tradeoffs
J Hong
Designs, Codes and Cryptography 57 (3), 293-327, 2010
372010
Comparison of perfect table cryptanalytic tradeoff algorithms
GW Lee, J Hong
Designs, Codes and Cryptography 80 (3), 473-523, 2016
322016
Speeding up the Pollard rho method on prime fields
JH Cheon, J Hong, M Kim
ASIACRYPT 2008 (LNCS 5350), 471-488, 2008
302008
Key recovery attacks on NTRU without ciphertext validation routine
D Han, J Hong, J Han, D Kwon
ACISP 2003 (LNCS 2727), 217-217, 2003
26*2003
Success probability of the Hellman trade-off
D Ma, J Hong
Information Processing Letters 109 (7), 347-351, 2009
252009
T-function based stream cipher TSC-3
J Hong, DH Lee, Y Yeom, D Han, S Chee
eSTREAM, ECRYPT Stream Cipher Project, Report 2005/031, 2005
23*2005
Analysis of the non-perfect table fuzzy rainbow tradeoff
BI Kim, J Hong
ACISP 2013 (LNCS 7959), 347-362, 2013
172013
Young wall realization of crystal graphs for
J Hong, SJ Kang, H Lee
Communications in Mathematical Physics 244 (1), 111-131, 2004
162004
Accelerating Pollard’s rho algorithm on finite fields
JH Cheon, J Hong, M Kim
Journal of Cryptology 25 (2), 195-242, 2012
152012
У даний момент система не може виконати операцію. Спробуйте пізніше.
Статті 1–20