Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Daewan Han
@article{DBLP:journals/corr/abs-2102-01453, author = {Panjin Kim and Daewan Han}, title = {Measurement-based Uncomputation Applied to Controlled Modular Multiplication}, journal = {CoRR}, volume = {abs/2102.01453}, year = {2021}, url = {https://arxiv.org/abs/2102.01453}, eprinttype = {arXiv}, eprint = {2102.01453}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-01453.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-04298, author = {Hochang Lee and Kyung Chul Jung and Daewan Han and Panjin Kim}, title = {An Algorithm for Reversible Logic Circuit Synthesis Based on Tensor Decomposition}, journal = {CoRR}, volume = {abs/2107.04298}, year = {2021}, url = {https://arxiv.org/abs/2107.04298}, eprinttype = {arXiv}, eprint = {2107.04298}, timestamp = {Tue, 20 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-04298.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/KimHJ18, author = {Panjin Kim and Daewan Han and Kyung Chul Jeong}, title = {Time-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to {AES} and {SHA-2}}, journal = {Quantum Inf. Process.}, volume = {17}, number = {12}, pages = {339}, year = {2018}, url = {https://doi.org/10.1007/s11128-018-2107-3}, doi = {10.1007/S11128-018-2107-3}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/KimHJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-05534, author = {Panjin Kim and Kyung Chul Jeong and Daewan Han}, title = {Time-Space Complexity of Quantum Search Algorithms in Symmetric Cryptanalysis}, journal = {CoRR}, volume = {abs/1805.05534}, year = {2018}, url = {http://arxiv.org/abs/1805.05534}, eprinttype = {arXiv}, eprint = {1805.05534}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-05534.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimJH18, author = {Panjin Kim and Kyung Chul Jeong and Daewan Han}, title = {Time-Space Complexity of Quantum Search Algorithms in Symmetric Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {452}, year = {2018}, url = {https://eprint.iacr.org/2018/452}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimJH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KimH015, author = {Soo Hyeon Kim and Daewan Han and Dong Hoon Lee}, title = {Practical Effect of the Predictability of Android OpenSSL {PRNG}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {8}, pages = {1806--1813}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.1806}, doi = {10.1587/TRANSFUN.E98.A.1806}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KimH015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KimJ0JH13, author = {ChangKyun Kim and Eun{-}Gu Jung and Dong Hoon Lee and Chang{-}Ho Jung and Daewan Han}, title = {Cryptanalysis of INCrypt32 in HID's iCLASS Systems}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {1}, pages = {35--41}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.35}, doi = {10.1587/TRANSFUN.E96.A.35}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KimJ0JH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimH013, author = {Soo Hyeon Kim and Daewan Han and Dong Hoon Lee}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Predictability of Android OpenSSL's pseudo random number generator}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {659--668}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516706}, doi = {10.1145/2508859.2516706}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KimH013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/Han11, author = {Daewan Han}, title = {Grobner Basis Attacks on Lightweight {RFID} Authentication Protocols}, journal = {J. Inf. Process. Syst.}, volume = {7}, number = {4}, pages = {691--706}, year = {2011}, url = {https://doi.org/10.3745/JIPS.2011.7.4.691}, doi = {10.3745/JIPS.2011.7.4.691}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jips/Han11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/JeongLH11, author = {Kyung Chul Jeong and Dong Hoon Lee and Daewan Han}, editor = {Howon Kim}, title = {An Improved Known Plaintext Attack on {PKZIP} Encryption Algorithm}, booktitle = {Information Security and Cryptology - {ICISC} 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7259}, pages = {235--247}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31912-9\_16}, doi = {10.1007/978-3-642-31912-9\_16}, timestamp = {Wed, 01 Mar 2023 16:53:12 +0100}, biburl = {https://dblp.org/rec/conf/icisc/JeongLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isocc/JungHL11, author = {Eun{-}Gu Jung and Daewan Han and Jeong{-}Gun Lee}, title = {Low area and high speed {SHA-1} implementation}, booktitle = {International SoC Design Conference, {ISOCC} 2011, Jeju, South Korea, November 17-18, 2011}, pages = {365--367}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISOCC.2011.6138786}, doi = {10.1109/ISOCC.2011.6138786}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/isocc/JungHL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimJLJH11, author = {ChangKyun Kim and Eun{-}Gu Jung and Dong Hoon Lee and Chang{-}Ho Jung and Daewan Han}, title = {Cryptanalysis of INCrypt32 in HID's iCLASS Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {469}, year = {2011}, url = {http://eprint.iacr.org/2011/469}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimJLJH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/HanK09, author = {Daewan Han and Daesung Kwon}, title = {Vulnerability of an {RFID} authentication protocol conforming to {EPC} Class 1 Generation 2 Standards}, journal = {Comput. Stand. Interfaces}, volume = {31}, number = {4}, pages = {648--652}, year = {2009}, url = {https://doi.org/10.1016/j.csi.2008.06.006}, doi = {10.1016/J.CSI.2008.06.006}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/HanK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HanKY07, author = {Daewan Han and Myung{-}Hwan Kim and Yongjin Yeom}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from {PKC} 2003}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {107--117}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_8}, doi = {10.1007/978-3-540-71677-8\_8}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HanKY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/KwonHLY06, author = {Daesung Kwon and Daewan Han and Jooyoung Lee and Yongjin Yeom}, editor = {Xiaobo Zhou and Oleg Sokolsky and Lu Yan and Eun{-}Sun Jung and Zili Shao and Yi Mu and Dong Chun Lee and Daeyoung Kim and Young{-}Sik Jeong and Cheng{-}Zhong Xu}, title = {Vulnerability of an {RFID} Authentication Protocol Proposed in at SecUbiq 2005}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4097}, pages = {262--270}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11807964\_27}, doi = {10.1007/11807964\_27}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/euc/KwonHLY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/HanL05, author = {Daewan Han and Moonsik Lee}, title = {An algebraic attack on the improved summation generator with 2-bit memory}, journal = {Inf. Process. Lett.}, volume = {93}, number = {1}, pages = {43--46}, year = {2005}, url = {https://doi.org/10.1016/j.ipl.2004.08.012}, doi = {10.1016/J.IPL.2004.08.012}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/HanL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Hong0YH05, author = {Jin Hong and Dong Hoon Lee and Yongjin Yeom and Daewan Han}, editor = {Henri Gilbert and Helena Handschuh}, title = {A New Class of Single Cycle T-Functions}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {68--82}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_5}, doi = {10.1007/11502760\_5}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Hong0YH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Hwang0HR04, author = {SangCheol Hwang and Dong Hoon Lee and Daewan Han and Jae{-}Cheol Ryou}, editor = {Chae Hoon Lim and Moti Yung}, title = {Vulnerability of a Mobile Payment System Proposed at {WISA} 2002}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {278--285}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_23}, doi = {10.1007/978-3-540-31815-6\_23}, timestamp = {Fri, 17 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Hwang0HR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HanHHK03, author = {Daewan Han and Jin Hong and Jae Woo Han and Daesung Kwon}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Key Recovery Attacks on {NTRU} without Ciphertext Validation Routine}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {274--284}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_24}, doi = {10.1007/3-540-45067-X\_24}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HanHHK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KwonKPSSSYYLLCHH03, author = {Daesung Kwon and Jaesung Kim and Sangwoo Park and Soo Hak Sung and Yaekwon Sohn and Jung Hwan Song and Yongjin Yeom and E{-}Joong Yoon and Sangjin Lee and Jaewon Lee and Seongtaek Chee and Daewan Han and Jin Hong}, editor = {Jong In Lim and Dong Hoon Lee}, title = {New Block Cipher: {ARIA}}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {432--445}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_32}, doi = {10.1007/978-3-540-24691-6\_32}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KwonKPSSSYYLLCHH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HanPC02, author = {Daewan Han and Sangwoo Park and Seongtaek Chee}, editor = {Joan Daemen and Vincent Rijmen}, title = {Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {252--262}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_20}, doi = {10.1007/3-540-45661-9\_20}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/HanPC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanHHK02, author = {Daewan Han and Jin Hong and Jae Woo Han and Daesung Kwon}, title = {Key recovery attacks on {NTRU} without ciphertext validation routine}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {188}, year = {2002}, url = {http://eprint.iacr.org/2002/188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanHHK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.