default search action
Jongsung Kim
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j82]Giyoon Kim, Soojin Kang, Uk Hur, Jongsung Kim:
A study on vulnerability of the Wickr login system in windows from a live forensics perspective. Comput. Secur. 139: 103672 (2024) - [j81]Seungjun Baek, Giyoon Kim, Jongsung Kim:
Preimage attacks on reduced-round Ascon-Xof. Des. Codes Cryptogr. 92(8): 2197-2217 (2024) - [j80]Soojin Kang, Uk Hur, Giyoon Kim, Jongsung Kim:
Forensic analysis and data decryption of tencent meeting in windows environment. Forensic Sci. Int. Digit. Investig. 51: 301818 (2024) - [j79]Seungjun Baek, Yongjin Jeon, Giyoon Kim, Jongsung Kim:
On Impossible and Truncated Distinguishers for IoT-Friendly AEAD Algorithms. IEEE Internet Things J. 11(19): 31878-31891 (2024) - [j78]Yongjin Jeon, Seungjun Baek, Jongsung Kim:
Toward Finding S-Box Circuits With Optimal Multiplicative Complexity. IEEE Trans. Computers 73(8): 2036-2050 (2024) - [i11]Giyoon Kim, Soojin Kang, Seungjun Baek, Kimoon Kim, Jongsung Kim:
A Method for Decrypting Data Infected with Rhysida Ransomware. CoRR abs/2402.06440 (2024) - [i10]Seungjun Baek, Giyoon Kim, Jongsung Kim:
Preimage Attacks on Reduced-Round Ascon-Xof. IACR Cryptol. ePrint Arch. 2024: 371 (2024) - 2023
- [j77]Uk Hur, Giyoon Kim, Soojin Kang, Jongsung Kim:
Forensic analysis for multi-platform Cisco Webex. Forensic Sci. Int. Digit. Investig. 47: 301659 (2023) - [c44]Seungjun Baek, Giyoon Kim, Yongjin Jeon, Jongsung Kim:
Enhancing the Related-Key Security of PIPO Through New Key Schedules. ICISC (1) 2023: 3-18 - 2022
- [j76]Giyoon Kim, Yongjin Jeon, Jongsung Kim:
Speeding Up LAT: Generating a Linear Approximation Table Using a Bitsliced Implementation. IEEE Access 10: 4919-4923 (2022) - [j75]Yongjin Jeon, Seungjun Baek, Hangi Kim, Giyoon Kim, Jongsung Kim:
Differential uniformity and linearity of S-boxes by multiplicative complexity. Cryptogr. Commun. 14(4): 849-874 (2022) - [j74]Soram Kim, Giyoon Kim, Sumin Shin, Byungchul Youn, Jian Song, Insoo Lee, Jongsung Kim:
Methods for recovering deleted data from the Realm database: Case study on Minitalk and Xabber. Digit. Investig. 40(Supplement): 301353 (2022) - [j73]Sumin Shin, Giyoon Kim, Soram Kim, Jongsung Kim:
Forensic analysis of note and journal applications. Digit. Investig. 40(Supplement): 301355 (2022) - [j72]Myungseo Park, Sehoon Lee, Okyeon Yi, Jongsung Kim:
A study on data acquisition based on the Huawei smartphone backup protocol. Digit. Investig. 41: 301393 (2022) - [j71]Uk Hur, Myungseo Park, Jongsung Kim:
A reused key attack on an encrypted mobile app database: Case study on KakaoTalk and ProtonMail. J. Inf. Secur. Appl. 67: 103181 (2022) - [j70]Giyoon Kim, Soram Kim, Soojin Kang, Jongsung Kim:
A method for decrypting data infected with Hive ransomware. J. Inf. Secur. Appl. 71: 103387 (2022) - [j69]Seungjun Baek, Sehee Cho, Jongsung Kim:
Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions. Quantum Inf. Process. 21(4): 163 (2022) - [c43]Jonghyun Park, Jongsung Kim:
See-In-The-Middle Attacks on Blockciphers ARIA and DEFAULT. ICISC 2022: 3-16 - [i9]Giyoon Kim, Soram Kim, Soojin Kang, Jongsung Kim:
A Method for Decrypting Data Infected with Hive Ransomware. CoRR abs/2202.08477 (2022) - [i8]Seungjun Baek, Jongsung Kim:
Quantum Rebound Attacks on Reduced-Round ARIA-Based Hash Functions. IACR Cryptol. ePrint Arch. 2022: 1604 (2022) - 2021
- [j68]Giyoon Kim, Hangi Kim, Yeachan Heo, Yongjin Jeon, Jongsung Kim:
Generating Cryptographic S-Boxes Using the Reinforcement Learning. IEEE Access 9: 83092-83104 (2021) - [j67]Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong:
A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application. IEEE Access 9: 150592-150607 (2021) - [j66]Giyoon Kim, Soram Kim, Myungseo Park, Younjai Park, Insoo Lee, Jongsung Kim:
Forensic analysis of instant messaging apps: Decrypting Wickr and private text messaging data. Digit. Investig. 37: 301138 (2021) - [j65]Uk Hur, Myungseo Park, Giyoon Kim, Younjai Park, Insoo Lee, Jongsung Kim:
Corrigendum to "Data acquisition methods using backup data decryption of sony smartphones" [Foren. Sci. Int: Digital Investigation 31 (2019) 200890]. Digit. Investig. 37: 301180 (2021) - [j64]Myungseo Park, Giyoon Kim, Younjai Park, Insoo Lee, Jongsung Kim:
Corrigendum to "Decrypting password-based encrypted backup data for Huawei smartphones" [Digital Investigation 28 (2019) 200890]. Digit. Investig. 39: 301179 (2021) - [j63]Giyoon Kim, Myungseo Park, Jongsung Kim:
A study on LG content lock and data acquisition from apps based on content lock function. Digit. Investig. 39: 301284 (2021) - [j62]Soojin Kang, Giyoon Kim, Myungseo Park, Jongsung Kim:
Methods for decrypting the data encrypted by the latest Samsung smartphone backup programs in Windows and macOS. Digit. Investig. 39: 301310 (2021) - [c42]Jonghyun Park, Hangi Kim, Jongsung Kim:
Improved See-In-The-Middle Attacks on AES. ICISC 2021: 271-279 - 2020
- [j61]Jongsung Kim, Ken Choi, Damien Sauveron:
Special Issue on Soft Computing for Network and System Security of Internet of Everything. Appl. Soft Comput. 97(Part): 106821 (2020) - [j60]Giyoon Kim, Myungseo Park, Sehoon Lee, Younjai Park, Insoo Lee, Jongsung Kim:
A study on the decryption methods of telegram X and BBM-Enterprise databases in mobile and PC. Digit. Investig. 35: 300998 (2020) - [j59]Myungseo Park, Okyeon Yi, Jongsung Kim:
A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system. Digit. Investig. 35: 301026 (2020) - [j58]Myungseo Park, Soram Kim, Jongsung Kim:
Research on Note-Taking Apps with Security Features. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(4): 63-76 (2020) - [j57]Hangi Kim, Myungseo Park, Jaehyung Cho, Jihun Kim, Jongsung Kim:
Weaknesses of some lightweight blockciphers suitable for IoT systems and their applications in hash modes. Peer-to-Peer Netw. Appl. 13(2): 489-513 (2020) - [j56]Serim Kang, Soram Kim, Jongsung Kim:
Forensic analysis for IoT fitness trackers and its application. Peer-to-Peer Netw. Appl. 13(2): 564-573 (2020) - [c41]Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong:
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations. ICISC 2020: 99-122 - [i7]Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong:
A New Method for Designing Lightweight S-boxes with High Differential and Linear Branch Numbers, and Its Application. IACR Cryptol. ePrint Arch. 2020: 1582 (2020)
2010 – 2019
- 2019
- [j55]Myungseo Park, Giyoon Kim, Younjai Park, Insoo Lee, Jongsung Kim:
Decrypting password-based encrypted backup data for Huawei smartphones. Digit. Investig. 28(Supplement): 119-125 (2019) - [j54]Uk Hur, Myungseo Park, Giyoon Kim, Younjai Park, Insoo Lee, Jongsung Kim:
Data acquisition methods using backup data decryption of Sony smartphones. Digit. Investig. 31 (2019) - [j53]Hangi Kim, Do-Won Kim, Okyeon Yi, Jongsung Kim:
Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security. Multim. Tools Appl. 78(3): 3107-3130 (2019) - 2018
- [j52]Jongsung Kim, Hongjun Wu, Raphael C.-W. Phan:
Cryptography and Future Security. Discret. Appl. Math. 241: 1 (2018) - [j51]Myungseo Park, Hangi Kim, Jongsung Kim:
How to decrypt PIN-Based encrypted backup data of Samsung smartphones. Digit. Investig. 26: 63-71 (2018) - [j50]Amjad Ali Alamr, Firdous Kausar, Jongsung Kim, Changho Seo:
A secure ECC-based RFID mutual authentication protocol for internet of things. J. Supercomput. 74(9): 4281-4294 (2018) - 2017
- [j49]Jongsung Kim, Naveen K. Chilamkurti:
Special Issue: Advanced Technologies and Applications for Future Wireless and Mobile Communication Systems. Wirel. Pers. Commun. 93(2): 285-286 (2017) - 2016
- [j48]Jongsung Kim, Naveen K. Chilamkurti:
Introduction to the special section on pervasive device and communications technologies for beyond IoT and CPS. Comput. Electr. Eng. 52: 80-81 (2016) - [j47]Deukjo Hong, Dong-Chan Kim, Daesung Kwon, Jongsung Kim:
Improved preimage attacks on hash modes of 8-round AES-256. Multim. Tools Appl. 75(22): 14525-14539 (2016) - [j46]Min H. Kim, Hargsoon Yoon, Sang H. Choi, Fei Zhao, Jongsung Kim, Kyo D. Song, Uhn Lee:
Miniaturized and Wireless Optical Neurotransmitter Sensor for Real-Time Monitoring of Dopamine in the Brain. Sensors 16(11): 1894 (2016) - 2015
- [j45]Hang Tu, Neeraj Kumar, Jongsung Kim, Jungtaek Seo:
A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments. Multim. Tools Appl. 74(16): 6365-6377 (2015) - [j44]Muhammad Yasin, Junaid Ahmad Qureshi, Firdous Kausar, Jongsung Kim, Jungtaek Seo:
A granular approach for user-centric network analysis to identify digital evidence. Peer-to-Peer Netw. Appl. 8(5): 911-924 (2015) - [c40]HyungChul Kang, Myungseo Park, Dukjae Moon, Changhoon Lee, Jongsung Kim, Kimoon Kim, Juhyuk Kim, Seokhie Hong:
New Efficient Padding Methods Secure Against Padding Oracle Attacks. ICISC 2015: 329-342 - [c39]Jongsung Kim, Myunggyu Kim:
Articulated human motion tracking using a SOG-PF algorithm. ICTC 2015: 80-82 - [c38]Jongsung Kim, Myunggyu Kim:
Smart vision system for soccer training. ICTC 2015: 257-262 - [e2]Jooyoung Lee, Jongsung Kim:
Information Security and Cryptology - ICISC 2014 - 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers. Lecture Notes in Computer Science 8949, Springer 2015, ISBN 978-3-319-15942-3 [contents] - 2014
- [j43]Jongsung Kim, Bo Hong, Naveen K. Chilamkurti:
Advanced Computer Technologies and Applications in Grid and Cloud Computing. Comput. J. 57(2): 181-182 (2014) - [j42]Jongsung Kim, Han-Chieh Chao, Uyen Trang Nguyen:
Recent advanced applications and services for intelligent ubiquitous environments. Electron. Commer. Res. 14(3): 217-221 (2014) - [j41]Muhammad Yasin, Firdous Kausar, Eisa Aleisa, Jongsung Kim:
Correlating messages from multiple IM networks to identify digital forensic artifacts. Electron. Commer. Res. 14(3): 369-387 (2014) - [j40]Xiong Xiong, Sabine Grunwald, D. Brenton Myers, Jongsung Kim, Willie G. Harris, Nicolas B. Comerford:
Holistic environmental soil-landscape modeling of soil organic carbon. Environ. Model. Softw. 57: 202-215 (2014) - [j39]Jongsung Kim, Ken Choi, Wook Choi:
Advanced Convergence Technologies and Practices for Wireless Ad Hoc and Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j38]Hangbae Chang, Jongsung Kim, Jong Hyuk Park:
IT convergence security. J. Intell. Manuf. 25(2): 213-215 (2014) - [j37]Taek-Young Youn, Jongsung Kim, Myung-Jae Lim:
Study on two privacy-oriented protocols for information communication systems. J. Intell. Manuf. 25(2): 339-345 (2014) - [j36]Jiqiang Lu, Yongzhuang Wei, Jongsung Kim, Enes Pasalic:
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher. Theor. Comput. Sci. 527: 102-122 (2014) - [j35]Jongsung Kim, Sabine Grunwald, Rosanna G. Rivero:
Soil Phosphorus and Nitrogen Predictions Across Spatial Escalating Scales in an Aquatic Ecosystem Using Remote Sensing Images. IEEE Trans. Geosci. Remote. Sens. 52(10): 6724-6737 (2014) - [j34]Hang Tu, Neeraj Kumar, Debiao He, Jongsung Kim, Changhoon Lee:
An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks. J. Supercomput. 70(1): 224-235 (2014) - [c37]Jongsung Kim, Myunggyu Kim:
Robust Surface Pattern Matching for Ball Spin Estimation with Multi-exposed Images Under Varying Illumination Conditions. ICPR 2014: 4560-4563 - [c36]Jongsung Kim, Myunggyu Kim:
Motion capture with high-speed RGB-D cameras. ICTC 2014: 394-395 - 2013
- [j33]Deukjo Hong, Dong-Chan Kim, Woo-Hwan Kim, Jongsung Kim:
Higher order eTCR hash functions. Comput. Math. Appl. 65(9): 1396-1402 (2013) - [j32]Jae Hun Jang, Sam Won Kim, Yangsun Lee, Jongsung Kim:
The effects of relationship benefit on relationship quality and store loyalty from convergence environments - NPS analysis and moderating effects. Electron. Commer. Res. 13(3): 291-315 (2013) - [j31]Jongsung Kim, Yi Mu, Mohammad S. Obaidat:
Advanced computer mathematics based cryptography and security technologies. Int. J. Comput. Math. 90(12): 2512-2514 (2013) - [j30]Neeraj Kumar, Jongsung Kim:
Probabilistic trust aware data replica placement strategy for online video streaming applications in vehicular delay tolerant networks. Math. Comput. Model. 58(1-2): 3-14 (2013) - [j29]Jongsung Kim, Jiqiang Lu, Ching-Hsien Hsu:
Advanced security technologies and applications for ubiquitous computing. Pers. Ubiquitous Comput. 17(5): 835-836 (2013) - [j28]Jongsung Kim:
On the security of the block cipher GOST suitable for the protection in U-business services. Pers. Ubiquitous Comput. 17(7): 1429-1435 (2013) - [j27]Jongsung Kim, Javier A. Barria, J. Morris Chang, Victor C. M. Leung:
Special issue on embedded systems for interactive multimedia services (ES-IMS). ACM Trans. Embed. Comput. Syst. 12(2): 19:1-19:2 (2013) - [j26]Binod Vaidya, Shiuh-Jeng Wang, Jongsung Kim, Ivan Lee:
Special issue on wireless multimedia networks and security services. Telecommun. Syst. 52(4): 2219-2220 (2013) - [j25]Jongsung Kim, Philip S. Yu, Nasrullah Memon:
Social network and high performance in smart communications. J. Supercomput. 66(2): 611-613 (2013) - [j24]Jongsung Kim, Hamid R. Arabnia, Jiqiang Lu:
Advanced Information Technologies in Future Computing Environments. Wirel. Pers. Commun. 73(4): 1345-1348 (2013) - [j23]Neeraj Kumar, Jongsung Kim:
ELACCA: Efficient Learning Automata Based Cell Clustering Algorithm for Wireless Sensor Networks. Wirel. Pers. Commun. 73(4): 1495-1512 (2013) - [c35]Jongsung Kim, Myunggyu Kim:
A robust vision system for outdoor swing analysis. ICTC 2013: 887-888 - 2012
- [j22]Jiqiang Lu, Yongzhuang Wei, Pierre-Alain Fouque, Jongsung Kim:
Cryptanalysis of reduced versions of the Camellia block cipher. IET Inf. Secur. 6(3): 228-238 (2012) - [j21]Bart Preneel, Jongsung Kim, Damien Sauveron:
Advanced theory and practice for cryptography and future security. Math. Comput. Model. 55(1-2): 1-2 (2012) - [j20]Yuseop Lee, Jongsung Kim, Seokhie Hong:
Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system. Multim. Tools Appl. 56(2): 267-280 (2012) - [j19]Jongsung Kim:
Study on the security of the extended version for the ISO/IEC international standardized block cipher SEED. Secur. Commun. Networks 5(10): 1141-1146 (2012) - [j18]Jongsung Kim, Alex Galis, Naveen K. Chilamkurti:
Modeling and simulation techniques for future Internet ubiquitous world. Simul. 88(10): 1151 (2012) - [j17]Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, Nathan Keller:
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis. IEEE Trans. Inf. Theory 58(7): 4948-4966 (2012) - [c34]Jiqiang Lu, Yongzhuang Wei, Jongsung Kim, Enes Pasalic:
The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher. INDOCRYPT 2012: 244-264 - [c33]Neeraj Kumar, Jongsung Kim:
Performance Analysis of Zone Based Routing by Varying Radius of Zone Using Ant Colony in MANET. ITCS 2012: 215-223 - [c32]Yuseop Lee, Jongsung Kim, Seokhie Hong, Changhoon Lee:
Improved Differential Fault Analysis on Block Cipher SEED-128. NBiS 2012: 675-680 - [e1]James Jong Hyuk Park, Jongsung Kim, Deqing Zou, Yang Sun Lee:
Information Technology Convergence, Secure and Trust Computing, and Data Management - ITCS 2012 & STA 2012, Gwangju, Korea, September 6-8, 2012. Lecture Notes in Electrical Engineering 180, Springer 2012, ISBN 978-94-007-5082-1 [contents] - 2011
- [j16]Changhoon Lee, Jongsung Kim, Jaechul Sung, Yangsun Lee, Chang Hoon Lee:
Cryptanalysis of CIKS-128 and CIKS-128H Suitable for Intelligent Multimedia and Ubiquitous Computing Systems. Comput. Informatics 30(3): 447-466 (2011) - [j15]Jongsung Kim, Jaechul Sung, Ermaliza Razali, Raphael C.-W. Phan, Marc Joye:
Notions and relations for RKA-secure permutation and function families. Des. Codes Cryptogr. 60(1): 15-35 (2011) - [j14]Neeraj Kumar, Naveen K. Chilamkurti, Jongsung Kim:
Routing in WDM based wireless mesh networks with capacity estimation. Int. J. Internet Protoc. Technol. 6(4): 224-233 (2011) - [j13]Raphael C.-W. Phan, Bok-Min Goi, Geong Sen Poh, Jongsung Kim:
Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents. Wirel. Pers. Commun. 56(1): 73-83 (2011) - [c31]Jongsung Kim, Jong Hyuk Park, Young-Gon Kim:
Weak Keys of the Block Cipher SEED-192 for Related-Key Differential Attacks. STA 2011: 157-163 - 2010
- [j12]Jongsung Kim, Seokhie Hong:
Side-Channel Attack Using Meet-in-the-Middle Technique. Comput. J. 53(7): 934-938 (2010) - [j11]Jongsung Kim, Yuseop Lee, Sangjin Lee:
DES with any reduced masked rounds is not secure against side-channel attacks. Comput. Math. Appl. 60(2): 347-354 (2010) - [j10]Jongsung Kim, Seokhie Hong, Jongin Lim:
Impossible differential cryptanalysis using matrix method. Discret. Math. 310(5): 988-1002 (2010) - [j9]Deok-Gyu Lee, Jongsung Kim, Jaechul Sung, Yangsun Lee, Seungmin Rho:
Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems. Telecommun. Syst. 44(3-4): 297-306 (2010) - [i6]Jongsung Kim, Seokhie Hong, Bart Preneel, Eli Biham, Orr Dunkelman, Nathan Keller:
Related-Key Boomerang and Rectangle Attacks. IACR Cryptol. ePrint Arch. 2010: 19 (2010)
2000 – 2009
- 2009
- [j8]Jongsung Kim, Raphael C.-W. Phan:
Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher. Cryptologia 33(3): 246-270 (2009) - [j7]Kitae Jeong, Changhoon Lee, Jongsung Kim, Seokhie Hong:
Security analysis of the SCO-family using key schedules. Inf. Sci. 179(24): 4232-4242 (2009) - [j6]Changhoon Lee, Jongsung Kim, Seokhie Hong, Yangsun Lee:
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments. J. Univers. Comput. Sci. 15(5): 1007-1022 (2009) - [c30]Yuseop Lee, Jongsung Kim, Pil Joong Lee, Yeonjung Kang, Hyangjin Lee:
Impossible Collision Based Side-Channel Attacks on HIGHT with Reduced Masked Rounds. CSA 2009: 1-4 - [c29]SeungBong Lee, Jewan Bang, Kyung-Soo Lim, Jongsung Kim, Sangjin Lee:
A Stepwise Methodology for Tracing Computer Usage. NCM 2009: 1852-1857 - [c28]Jewan Bang, Byeongyeong Yoo, Jongsung Kim, Sangjin Lee:
Analysis of Time Information for Digital Investigation. NCM 2009: 1858-1864 - [c27]Jongsung Kim, Raphael C.-W. Phan:
A Cryptanalytic View of the NSA's Skipjack Block Cipher Design. ISA 2009: 368-381 - 2008
- [j5]Eunjin Lee, Jongsung Kim, Deukjo Hong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim:
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(2): 642-649 (2008) - [j4]Jiqiang Lu, Jongsung Kim:
Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9): 2588-2596 (2008) - [j3]Jongsung Kim, Changhoon Lee, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jongin Lim:
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(10): 3047-3058 (2008) - [j2]Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee:
Security analysis of the full-round DDO-64 block cipher. J. Syst. Softw. 81(12): 2328-2335 (2008) - [c26]Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman:
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. CT-RSA 2008: 370-386 - [c25]Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong:
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. FSE 2008: 189-206 - [c24]Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim:
New Impossible Differential Attacks on AES. INDOCRYPT 2008: 279-293 - [i5]Tae Hyun Kim, Jongsung Kim, Seokhie Hong, Jaechul Sung:
Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher. IACR Cryptol. ePrint Arch. 2008: 281 (2008) - [i4]Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim:
New Impossible Differential Attacks on AES. IACR Cryptol. ePrint Arch. 2008: 540 (2008) - 2007
- [c23]Jongsung Kim, Seokhie Hong, Bart Preneel:
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. FSE 2007: 225-241 - 2006
- [c22]Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. ACISP 2006: 421-431 - [c21]Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee:
HIGHT: A New Block Cipher Suitable for Low-Resource Device. CHES 2006: 46-59 - [c20]Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. ICCSA (3) 2006: 446-455 - [c19]Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman:
Differential and Rectangle Attacks on Reduced-Round SHACAL-1. INDOCRYPT 2006: 17-31 - [c18]Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman:
Related-Key Rectangle Attack on 42-Round SHACAL-2. ISC 2006: 85-100 - [c17]Orr Dunkelman, Nathan Keller, Jongsung Kim:
Related-Key Rectangle Attack on the Full SHACAL-1. Selected Areas in Cryptography 2006: 28-44 - [c16]Jiqiang Lu, Changhoon Lee, Jongsung Kim:
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b. SCN 2006: 95-110 - [c15]Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong:
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). SCN 2006: 242-256 - [i3]Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong:
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. IACR Cryptol. ePrint Arch. 2006: 187 (2006) - [i2]Jongsung Kim:
Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms. IACR Cryptol. ePrint Arch. 2006: 451 (2006) - 2005
- [c14]Seokhie Hong, Jongsung Kim, Sangjin Lee, Bart Preneel:
Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192. FSE 2005: 368-383 - [c13]Jaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee, Jongin Lim:
Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. ICCSA (2) 2005: 567-576 - [c12]Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee:
On the Security of Encryption Modes of MD4, MD5 and HAVAL. ICICS 2005: 147-158 - [c11]Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon:
Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. IMACC 2005: 201-219 - [c10]Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee:
Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. Mycrypt 2005: 244-262 - [c9]Jaechul Sung, Jongsung Kim, Changhoon Lee, Seokhie Hong:
Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds. WEWoRC 2005: 64-75 - [i1]Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee:
On the Security of Encryption Modes of MD4, MD5 and HAVAL. IACR Cryptol. ePrint Arch. 2005: 327 (2005) - 2004
- [c8]YongSup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee:
Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2. ACISP 2004: 110-122 - [c7]Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong:
The Related-Key Rectangle Attack - Application to SHACAL-1. ACISP 2004: 123-136 - [c6]Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong:
Padding Oracle Attacks on Multiple Modes of Operation. ICISC 2004: 343-351 - [c5]Jongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, Jung Hwan Song:
Related-Key Attacks on Reduced Rounds of SHACAL-2. INDOCRYPT 2004: 175-190 - 2003
- [c4]Jongsung Kim, Seokhie Hong, Sangjin Lee, Jung Hwan Song, Hyungjin Yang:
Truncated Differential Attacks on 8-Round CRYPTON. ICISC 2003: 446-456 - [c3]Jongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee:
Impossible Differential Cryptanalysis for Block Cipher Structures. INDOCRYPT 2003: 82-96 - [c2]Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee:
Impossible Differential Attack on 30-Round SHACAL-2. INDOCRYPT 2003: 97-106 - 2002
- [c1]Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seok Won Jung:
Amplified Boomerang Attack against Reduced-Round SHACAL. ASIACRYPT 2002: 243-253
1990 – 1999
- 1997
- [j1]Jongsung Kim, Cheeha Kim:
A total ordering protocol using a dynamic token-passing scheme. Distributed Syst. Eng. 4(2): 87-95 (1997)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint