| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2008 | Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks | asiacrypt | 524-538 |
| 2 | 2007 | Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006 | eprint | online |
| 3 | 2005 | Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations | eprint | online |
| 4 | 2005 | A New Class of Single Cycle T-Functions | fse | online |
| 5 | 2004 | Algebraic Attacks on Summation Generators | fse | 34-48 |
| 6 | 2004 | Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines | fse | 193-209 |
| 7 | 2004 | Resistance of S-Boxes against Algebraic Attacks | fse | 83-94 |
| 8 | 2003 | Algebraic Attacks on Summation Generators | eprint | online |
| 9 | 2002 | Diffie-Hellman Problems and Bilinear Maps | eprint | online |
Coauthors of Dong Hoon Lee |