Introduction to Quantum Groups and Crystal Bases J Hong, SJ Kang American Mathematical Soc., 2002 | 634 | 2002 |
New block cipher: ARIA D Kwon, J Kim, S Park, SH Sung, Y Sohn, JH Song, Y Yeom, EJ Yoon, ... ICISC 2003 (LNCS 2971), 432-445, 2004 | 343 | 2004 |
New applications of time memory data tradeoffs J Hong, P Sarkar ASIACRYPT 2005 (LNCS 3788), 353-372, 2005 | 212* | 2005 |
Secure and efficient broadcast authentication in wireless sensor networks T Kwon, J Hong IEEE Transactions on Computers 59 (8), 1120-1133, 2010 | 75 | 2010 |
A comparison of cryptanalytic tradeoff algorithms J Hong, S Moon Journal of Cryptology 26 (4), 559-637, 2013 | 72 | 2013 |
Algebraic attacks on summation generators D Lee, J Kim, J Hong, J Han, D Moon FSE 2004 (LNCS 3017), 34-48, 2004 | 68 | 2004 |
Analysis and improvement of a PIN-entry method resilient to shoulder-surfing and recording attacks T Kwon, J Hong IEEE Transactions on Information Forensics and Security 10 (2), 278-292, 2015 | 66 | 2015 |
Young tableaux and crystal ℬ(∞) for finite simple Lie algebras J Hong, H Lee Journal of Algebra 320 (10), 3680-3693, 2008 | 54 | 2008 |
A new class of single cycle T-functions J Hong, DH Lee, Y Yeom, D Han FSE 2005 (LNCS 3557), 68-82, 2005 | 50 | 2005 |
TMD-tradeoff and state entropy loss considerations of streamcipher MICKEY J Hong, WH Kim INDOCRYPT 2005 (LNCS 3797), 169-182, 2005 | 46 | 2005 |
Variants of the distinguished point method for cryptanalytic time memory trade-offs J Hong, KC Jeong, EY Kwon, IS Lee, D Ma ISPEC 2008 (LNCS 4991), 131-145, 2008 | 43 | 2008 |
Comparison of perfect table cryptanalytic tradeoff algorithms GW Lee, J Hong Designs, Codes and Cryptography 80 (3), 473-523, 2016 | 40 | 2016 |
The cost of false alarms in Hellman and rainbow tradeoffs J Hong Designs, Codes and Cryptography 57 (3), 293-327, 2010 | 38 | 2010 |
Speeding up the Pollard rho method on prime fields JH Cheon, J Hong, M Kim ASIACRYPT 2008 (LNCS 5350), 471-488, 2008 | 29 | 2008 |
Success probability of the Hellman trade-off D Ma, J Hong Information Processing Letters 109 (7), 347-351, 2009 | 27 | 2009 |
Key recovery attacks on NTRU without ciphertext validation routine D Han, J Hong, J Han, D Kwon ACISP 2003 (LNCS 2727), 217-217, 2003 | 25* | 2003 |
Analysis of the non-perfect table fuzzy rainbow tradeoff BI Kim, J Hong ACISP 2013 (LNCS 7959), 347-362, 2013 | 23 | 2013 |
T-function based stream cipher TSC-3 J Hong, DH Lee, Y Yeom, D Han, S Chee eSTREAM, ECRYPT Stream Cipher Project, Report 2005/031, 2005 | 23* | 2005 |
Accelerating ID-based encryption based on trapdoor DL using pre-computation HT Lee, JH Cheon, J Hong Cryptology ePrint Archive, Report 2011/187, 2012 | 21* | 2012 |
Young wall realization of crystal graphs for J Hong, SJ Kang, H Lee Communications in Mathematical Physics 244 (1), 111-131, 2004 | 20 | 2004 |