关注
Jin Hong
Jin Hong
在 snu.ac.kr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Introduction to Quantum Groups and Crystal Bases
J Hong, SJ Kang
American Mathematical Soc., 2002
6342002
New block cipher: ARIA
D Kwon, J Kim, S Park, SH Sung, Y Sohn, JH Song, Y Yeom, EJ Yoon, ...
ICISC 2003 (LNCS 2971), 432-445, 2004
3432004
New applications of time memory data tradeoffs
J Hong, P Sarkar
ASIACRYPT 2005 (LNCS 3788), 353-372, 2005
212*2005
Secure and efficient broadcast authentication in wireless sensor networks
T Kwon, J Hong
IEEE Transactions on Computers 59 (8), 1120-1133, 2010
752010
A comparison of cryptanalytic tradeoff algorithms
J Hong, S Moon
Journal of Cryptology 26 (4), 559-637, 2013
722013
Algebraic attacks on summation generators
D Lee, J Kim, J Hong, J Han, D Moon
FSE 2004 (LNCS 3017), 34-48, 2004
682004
Analysis and improvement of a PIN-entry method resilient to shoulder-surfing and recording attacks
T Kwon, J Hong
IEEE Transactions on Information Forensics and Security 10 (2), 278-292, 2015
662015
Young tableaux and crystal ℬ(∞) for finite simple Lie algebras
J Hong, H Lee
Journal of Algebra 320 (10), 3680-3693, 2008
542008
A new class of single cycle T-functions
J Hong, DH Lee, Y Yeom, D Han
FSE 2005 (LNCS 3557), 68-82, 2005
502005
TMD-tradeoff and state entropy loss considerations of streamcipher MICKEY
J Hong, WH Kim
INDOCRYPT 2005 (LNCS 3797), 169-182, 2005
462005
Variants of the distinguished point method for cryptanalytic time memory trade-offs
J Hong, KC Jeong, EY Kwon, IS Lee, D Ma
ISPEC 2008 (LNCS 4991), 131-145, 2008
432008
Comparison of perfect table cryptanalytic tradeoff algorithms
GW Lee, J Hong
Designs, Codes and Cryptography 80 (3), 473-523, 2016
402016
The cost of false alarms in Hellman and rainbow tradeoffs
J Hong
Designs, Codes and Cryptography 57 (3), 293-327, 2010
382010
Speeding up the Pollard rho method on prime fields
JH Cheon, J Hong, M Kim
ASIACRYPT 2008 (LNCS 5350), 471-488, 2008
292008
Success probability of the Hellman trade-off
D Ma, J Hong
Information Processing Letters 109 (7), 347-351, 2009
272009
Key recovery attacks on NTRU without ciphertext validation routine
D Han, J Hong, J Han, D Kwon
ACISP 2003 (LNCS 2727), 217-217, 2003
25*2003
Analysis of the non-perfect table fuzzy rainbow tradeoff
BI Kim, J Hong
ACISP 2013 (LNCS 7959), 347-362, 2013
232013
T-function based stream cipher TSC-3
J Hong, DH Lee, Y Yeom, D Han, S Chee
eSTREAM, ECRYPT Stream Cipher Project, Report 2005/031, 2005
23*2005
Accelerating ID-based encryption based on trapdoor DL using pre-computation
HT Lee, JH Cheon, J Hong
Cryptology ePrint Archive, Report 2011/187, 2012
21*2012
Young wall realization of crystal graphs for
J Hong, SJ Kang, H Lee
Communications in Mathematical Physics 244 (1), 111-131, 2004
202004
系统目前无法执行此操作,请稍后再试。
文章 1–20