BibTeX records: Daewan Han

download as .bib file

@article{DBLP:journals/corr/abs-2102-01453,
  author       = {Panjin Kim and
                  Daewan Han},
  title        = {Measurement-based Uncomputation Applied to Controlled Modular Multiplication},
  journal      = {CoRR},
  volume       = {abs/2102.01453},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.01453},
  eprinttype    = {arXiv},
  eprint       = {2102.01453},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-01453.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-04298,
  author       = {Hochang Lee and
                  Kyung Chul Jung and
                  Daewan Han and
                  Panjin Kim},
  title        = {An Algorithm for Reversible Logic Circuit Synthesis Based on Tensor
                  Decomposition},
  journal      = {CoRR},
  volume       = {abs/2107.04298},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.04298},
  eprinttype    = {arXiv},
  eprint       = {2107.04298},
  timestamp    = {Tue, 20 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-04298.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/KimHJ18,
  author       = {Panjin Kim and
                  Daewan Han and
                  Kyung Chul Jeong},
  title        = {Time-space complexity of quantum search algorithms in symmetric cryptanalysis:
                  applying to {AES} and {SHA-2}},
  journal      = {Quantum Inf. Process.},
  volume       = {17},
  number       = {12},
  pages        = {339},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11128-018-2107-3},
  doi          = {10.1007/S11128-018-2107-3},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/KimHJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-05534,
  author       = {Panjin Kim and
                  Kyung Chul Jeong and
                  Daewan Han},
  title        = {Time-Space Complexity of Quantum Search Algorithms in Symmetric Cryptanalysis},
  journal      = {CoRR},
  volume       = {abs/1805.05534},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.05534},
  eprinttype    = {arXiv},
  eprint       = {1805.05534},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-05534.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimJH18,
  author       = {Panjin Kim and
                  Kyung Chul Jeong and
                  Daewan Han},
  title        = {Time-Space Complexity of Quantum Search Algorithms in Symmetric Cryptanalysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {452},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/452},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimJH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KimH015,
  author       = {Soo Hyeon Kim and
                  Daewan Han and
                  Dong Hoon Lee},
  title        = {Practical Effect of the Predictability of Android OpenSSL {PRNG}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {8},
  pages        = {1806--1813},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.1806},
  doi          = {10.1587/TRANSFUN.E98.A.1806},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KimH015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KimJ0JH13,
  author       = {ChangKyun Kim and
                  Eun{-}Gu Jung and
                  Dong Hoon Lee and
                  Chang{-}Ho Jung and
                  Daewan Han},
  title        = {Cryptanalysis of INCrypt32 in HID's iCLASS Systems},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {1},
  pages        = {35--41},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.35},
  doi          = {10.1587/TRANSFUN.E96.A.35},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KimJ0JH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KimH013,
  author       = {Soo Hyeon Kim and
                  Daewan Han and
                  Dong Hoon Lee},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Predictability of Android OpenSSL's pseudo random number generator},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {659--668},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516706},
  doi          = {10.1145/2508859.2516706},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KimH013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/Han11,
  author       = {Daewan Han},
  title        = {Grobner Basis Attacks on Lightweight {RFID} Authentication Protocols},
  journal      = {J. Inf. Process. Syst.},
  volume       = {7},
  number       = {4},
  pages        = {691--706},
  year         = {2011},
  url          = {https://doi.org/10.3745/JIPS.2011.7.4.691},
  doi          = {10.3745/JIPS.2011.7.4.691},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jips/Han11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/JeongLH11,
  author       = {Kyung Chul Jeong and
                  Dong Hoon Lee and
                  Daewan Han},
  editor       = {Howon Kim},
  title        = {An Improved Known Plaintext Attack on {PKZIP} Encryption Algorithm},
  booktitle    = {Information Security and Cryptology - {ICISC} 2011 - 14th International
                  Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7259},
  pages        = {235--247},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31912-9\_16},
  doi          = {10.1007/978-3-642-31912-9\_16},
  timestamp    = {Wed, 01 Mar 2023 16:53:12 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/JeongLH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isocc/JungHL11,
  author       = {Eun{-}Gu Jung and
                  Daewan Han and
                  Jeong{-}Gun Lee},
  title        = {Low area and high speed {SHA-1} implementation},
  booktitle    = {International SoC Design Conference, {ISOCC} 2011, Jeju, South Korea,
                  November 17-18, 2011},
  pages        = {365--367},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISOCC.2011.6138786},
  doi          = {10.1109/ISOCC.2011.6138786},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/isocc/JungHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimJLJH11,
  author       = {ChangKyun Kim and
                  Eun{-}Gu Jung and
                  Dong Hoon Lee and
                  Chang{-}Ho Jung and
                  Daewan Han},
  title        = {Cryptanalysis of INCrypt32 in HID's iCLASS Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {469},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/469},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimJLJH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/HanK09,
  author       = {Daewan Han and
                  Daesung Kwon},
  title        = {Vulnerability of an {RFID} authentication protocol conforming to {EPC}
                  Class 1 Generation 2 Standards},
  journal      = {Comput. Stand. Interfaces},
  volume       = {31},
  number       = {4},
  pages        = {648--652},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.csi.2008.06.006},
  doi          = {10.1016/J.CSI.2008.06.006},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/HanK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HanKY07,
  author       = {Daewan Han and
                  Myung{-}Hwan Kim and
                  Yongjin Yeom},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from {PKC} 2003},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {107--117},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_8},
  doi          = {10.1007/978-3-540-71677-8\_8},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HanKY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/KwonHLY06,
  author       = {Daesung Kwon and
                  Daewan Han and
                  Jooyoung Lee and
                  Yongjin Yeom},
  editor       = {Xiaobo Zhou and
                  Oleg Sokolsky and
                  Lu Yan and
                  Eun{-}Sun Jung and
                  Zili Shao and
                  Yi Mu and
                  Dong Chun Lee and
                  Daeyoung Kim and
                  Young{-}Sik Jeong and
                  Cheng{-}Zhong Xu},
  title        = {Vulnerability of an {RFID} Authentication Protocol Proposed in at
                  SecUbiq 2005},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006
                  Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea,
                  August 1-4, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4097},
  pages        = {262--270},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11807964\_27},
  doi          = {10.1007/11807964\_27},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/KwonHLY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/HanL05,
  author       = {Daewan Han and
                  Moonsik Lee},
  title        = {An algebraic attack on the improved summation generator with 2-bit
                  memory},
  journal      = {Inf. Process. Lett.},
  volume       = {93},
  number       = {1},
  pages        = {43--46},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.ipl.2004.08.012},
  doi          = {10.1016/J.IPL.2004.08.012},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/HanL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Hong0YH05,
  author       = {Jin Hong and
                  Dong Hoon Lee and
                  Yongjin Yeom and
                  Daewan Han},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {A New Class of Single Cycle T-Functions},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {68--82},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_5},
  doi          = {10.1007/11502760\_5},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Hong0YH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Hwang0HR04,
  author       = {SangCheol Hwang and
                  Dong Hoon Lee and
                  Daewan Han and
                  Jae{-}Cheol Ryou},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Vulnerability of a Mobile Payment System Proposed at {WISA} 2002},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {278--285},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_23},
  doi          = {10.1007/978-3-540-31815-6\_23},
  timestamp    = {Fri, 17 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Hwang0HR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HanHHK03,
  author       = {Daewan Han and
                  Jin Hong and
                  Jae Woo Han and
                  Daesung Kwon},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Key Recovery Attacks on {NTRU} without Ciphertext Validation Routine},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {274--284},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_24},
  doi          = {10.1007/3-540-45067-X\_24},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HanHHK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KwonKPSSSYYLLCHH03,
  author       = {Daesung Kwon and
                  Jaesung Kim and
                  Sangwoo Park and
                  Soo Hak Sung and
                  Yaekwon Sohn and
                  Jung Hwan Song and
                  Yongjin Yeom and
                  E{-}Joong Yoon and
                  Sangjin Lee and
                  Jaewon Lee and
                  Seongtaek Chee and
                  Daewan Han and
                  Jin Hong},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {New Block Cipher: {ARIA}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {432--445},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_32},
  doi          = {10.1007/978-3-540-24691-6\_32},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KwonKPSSSYYLLCHH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HanPC02,
  author       = {Daewan Han and
                  Sangwoo Park and
                  Seongtaek Chee},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Cryptanalysis of the Modified Version of the Hash Function Proposed
                  at PKC'98},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {252--262},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_20},
  doi          = {10.1007/3-540-45661-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HanPC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanHHK02,
  author       = {Daewan Han and
                  Jin Hong and
                  Jae Woo Han and
                  Daesung Kwon},
  title        = {Key recovery attacks on {NTRU} without ciphertext validation routine},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {188},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanHHK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics