Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Seokhie Hong
Search web for home page
Program Committees
1
2010
FSE
pc chair
2
2007
FSE
pc
Publications
year
title
booktitle
pages
1
2011
A Fast and Provably Secure Higher-Order Masking of AES S-Box
ches
95-107
2
2010
Related-Key Boomerang and Rectangle Attacks
eprint
online
3
2010
A note on ``Improved Fast Correlation Attacks on Stream Ciphers"
eprint
online
4
2010
Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers
fse
5
2008
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension
eprint
online
6
2008
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
fse
189-206
7
2008
Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher
eprint
online
8
2008
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths
eprint
online
9
2008
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over $GF(2^m)$ on 8-bit MICAz Mote
eprint
online
10
2008
Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions
eprint
online
11
2007
Hash Function Design Principles Supporting Variable Output Lengths from One Small Function
eprint
online
12
2007
New FORK-256
eprint
online
13
2007
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
fse
225-241
14
2006
HIGHT: A New Block Cipher Suitable for Low-Resource Device
ches
online
15
2006
A New Dedicated 256-Bit Hash Function: FORK-256
fse
online
16
2006
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1
eprint
online
17
2006
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers
jofc
441-462
18
2005
Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192
fse
online
19
2004
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST
fse
299-316
20
2002
Amplified Boomerang Attack against Reduced-Round SHACAL
asiacrypt
online
21
2001
Known-IV Attacks on Triple Modes of Operation of Block Ciphers
asiacrypt
208-221
22
2000
Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis
asiacrypt
274-288
23
2000
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure
fse
273-283
Coauthors of Seokhie Hong
Eli Biham
Alex Biryukov
Donghoon Chang
Seongtaek Chee
Dong Hyeon Cheon
Inho Cho
Orr Dunkelman
Dong-Guk Han
Deukjo Hong
Tetsu Iwata
Kitae Jeong
Seokwon Jung
Ju-Sung Kang
Nathan Keller
Taehyun Kim
HeeSeok Kim
Jongsung Kim
Hyun Kim
Youngdai Ko
Bonseok Koo
Jaesang Lee
Eunjin Lee
Yuseop Lee
Sangjin Lee
Wonil Lee
Changhoon Lee
Jesang Lee
Jongin Lim
Jong In Lim
Dukjae Moon
Mridul Nandi
Sangjoon Park
Bart Preneel
Seog Chung Seo
Jaechul Sung
Okyeon Yi