Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Donghoon Chang
Search web for home page
Publications
year
title
booktitle
pages
1
2011
On the Security of Hash Functions Employing Blockcipher Postprocessing
fse
146
2
2008
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension
eprint
online
3
2008
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
fse
189-206
4
2008
Improved Indifferentiability Security Analysis of chopMD Hash Function
fse
429-443
5
2008
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths
eprint
online
6
2008
A Short Proof of the PRP/PRF Switching Lemma
eprint
online
7
2008
Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions
eprint
online
8
2007
Hash Function Design Principles Supporting Variable Output Lengths from One Small Function
eprint
online
9
2007
New FORK-256
eprint
online
10
2006
HIGHT: A New Block Cipher Suitable for Low-Resource Device
ches
online
11
2006
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
asiacrypt
online
12
2006
Preimage Attack on Hashing with Polynomials proposed at ICISC'06
eprint
online
13
2006
Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash
eprint
online
14
2006
Preimage Attack on Parallel FFT-Hashing
eprint
online
15
2006
A New Dedicated 256-Bit Hash Function: FORK-256
fse
online
16
2006
General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity
eprint
online
17
2006
Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006
eprint
online
18
2006
Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions)
eprint
online
19
2006
Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA
eprint
online
20
2006
A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions
eprint
online
21
2004
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model
eprint
online
22
2003
New Parallel Domain Extenders for UOWHF
asiacrypt
online
Coauthors of Donghoon Chang
Seongtaek Chee
Seokhie Hong
Deukjo Hong
Kitae Jeong
Jongsung Kim
Hyun Kim
Bonseok Koo
Sangjin Lee
Wonil Lee
Changhoon Lee
Jesang Lee
Jaesang Lee
Eunjin Lee
Jongin Lim
Dukjae Moon
Mridul Nandi
Kouichi Sakurai
Palash Sarkar
Soo Hak Sung
Jaechul Sung
Moti Yung