Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Dong Hoon Lee 0002
@article{DBLP:journals/ieicet/KimH015, author = {Soo Hyeon Kim and Daewan Han and Dong Hoon Lee}, title = {Practical Effect of the Predictability of Android OpenSSL {PRNG}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {8}, pages = {1806--1813}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.1806}, doi = {10.1587/TRANSFUN.E98.A.1806}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KimH015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KimJ0JH13, author = {ChangKyun Kim and Eun{-}Gu Jung and Dong Hoon Lee and Chang{-}Ho Jung and Daewan Han}, title = {Cryptanalysis of INCrypt32 in HID's iCLASS Systems}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {1}, pages = {35--41}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.35}, doi = {10.1587/TRANSFUN.E96.A.35}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KimJ0JH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KimH013, author = {Soo Hyeon Kim and Daewan Han and Dong Hoon Lee}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Predictability of Android OpenSSL's pseudo random number generator}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {659--668}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516706}, doi = {10.1145/2508859.2516706}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KimH013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcn/0002P11, author = {Dong Hoon Lee and Sangwoo Park}, title = {Word-based FCSRs with fast software implementations}, journal = {J. Commun. Networks}, volume = {13}, number = {1}, pages = {1--5}, year = {2011}, url = {https://doi.org/10.1109/JCN.2011.6157244}, doi = {10.1109/JCN.2011.6157244}, timestamp = {Fri, 03 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcn/0002P11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/JeongLH11, author = {Kyung Chul Jeong and Dong Hoon Lee and Daewan Han}, editor = {Howon Kim}, title = {An Improved Known Plaintext Attack on {PKZIP} Encryption Algorithm}, booktitle = {Information Security and Cryptology - {ICISC} 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7259}, pages = {235--247}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31912-9\_16}, doi = {10.1007/978-3-642-31912-9\_16}, timestamp = {Wed, 01 Mar 2023 16:53:12 +0100}, biburl = {https://dblp.org/rec/conf/icisc/JeongLH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimJLJH11, author = {ChangKyun Kim and Eun{-}Gu Jung and Dong Hoon Lee and Chang{-}Ho Jung and Daewan Han}, title = {Cryptanalysis of INCrypt32 in HID's iCLASS Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {469}, year = {2011}, url = {http://eprint.iacr.org/2011/469}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimJLJH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LeePH08, author = {Dong Hoon Lee and Je Hong Park and Jae Woo Han}, title = {Security Analysis of a Variant of Self-Shrinking Generator}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {7}, pages = {1824--1827}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.7.1824}, doi = {10.1093/IETFEC/E91-A.7.1824}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LeePH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsc/Lee08, author = {Dong Hoon Lee}, title = {Algebraic degree of the inverse of linearized polynomials}, journal = {J. Symb. Comput.}, volume = {43}, number = {6-7}, pages = {442--451}, year = {2008}, url = {https://doi.org/10.1016/j.jsc.2007.07.009}, doi = {10.1016/J.JSC.2007.07.009}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsc/Lee08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LeeLP08, author = {Jung{-}Keun Lee and Dong Hoon Lee and Sangwoo Park}, editor = {Josef Pieprzyk}, title = {Cryptanalysis of Sosemanuk and {SNOW} 2.0 Using Linear Masks}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {524--538}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_32}, doi = {10.1007/978-3-540-89255-7\_32}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LeeLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ParkL07, author = {Je Hong Park and Dong Hoon Lee}, title = {On the Security of Status Certificate-Based Encryption Scheme}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {1}, pages = {303--304}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.1.303}, doi = {10.1093/IETFEC/E90-A.1.303}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ParkL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeePH07, author = {Dong Hoon Lee and Je Hong Park and Jae Woo Han}, title = {Security analysis of the variant of the self-shrinking generator proposed at {ICISC} 2006}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {8}, year = {2007}, url = {http://eprint.iacr.org/2007/008}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeePH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/CheonL06, author = {Jung Hee Cheon and Dong Hoon Lee}, title = {Quadratic Equations from {APN} Power Functions}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {1}, pages = {19--27}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.1.19}, doi = {10.1093/IETFEC/E89-A.1.19}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/CheonL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/CheonL06, author = {Jung Hee Cheon and Dong Hoon Lee}, title = {Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations}, journal = {{IEEE} Trans. Computers}, volume = {55}, number = {12}, pages = {1536--1542}, year = {2006}, url = {https://doi.org/10.1109/TC.2006.207}, doi = {10.1109/TC.2006.207}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/CheonL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KwonL06a, author = {Taekyoung Kwon and Dong Hoon Lee}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Three-Party Password Authenticated Key Agreement Resistant to Server Compromise}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {312--323}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_24}, doi = {10.1007/978-3-540-71093-6\_24}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KwonL06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Hong0YH05, author = {Jin Hong and Dong Hoon Lee and Yongjin Yeom and Daewan Han}, editor = {Henri Gilbert and Helena Handschuh}, title = {A New Class of Single Cycle T-Functions}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {68--82}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_5}, doi = {10.1007/11502760\_5}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Hong0YH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonL05, author = {Jung Hee Cheon and Dong Hoon Lee}, title = {Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {276}, year = {2005}, url = {http://eprint.iacr.org/2005/276}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/YunKL04, author = {Aaram Yun and Jaeheon Kim and Dong Hoon Lee}, editor = {Duncan A. Buell}, title = {Cryptanalysis of a Divisor Class Group Based Public-Key Cryptosystem}, booktitle = {Algorithmic Number Theory, 6th International Symposium, ANTS-VI, Burlington, VT, USA, June 13-18, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3076}, pages = {442--450}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24847-7\_33}, doi = {10.1007/978-3-540-24847-7\_33}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ants/YunKL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LeeKHHM04, author = {Dong Hoon Lee and Jaeheon Kim and Jin Hong and Jae Woo Han and Dukjae Moon}, editor = {Bimal K. Roy and Willi Meier}, title = {Algebraic Attacks on Summation Generators}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {34--48}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_3}, doi = {10.1007/978-3-540-25937-4\_3}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/LeeKHHM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CheonL04, author = {Jung Hee Cheon and Dong Hoon Lee}, editor = {Bimal K. Roy and Willi Meier}, title = {Resistance of S-Boxes against Algebraic Attacks}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {83--94}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_6}, doi = {10.1007/978-3-540-25937-4\_6}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/CheonL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HongLCS04, author = {Jin Hong and Dong Hoon Lee and Seongtaek Chee and Palash Sarkar}, editor = {Bimal K. Roy and Willi Meier}, title = {Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines}, booktitle = {Fast Software Encryption, 11th International Workshop, {FSE} 2004, Delhi, India, February 5-7, 2004, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3017}, pages = {193--209}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25937-4\_13}, doi = {10.1007/978-3-540-25937-4\_13}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HongLCS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Hwang0HR04, author = {SangCheol Hwang and Dong Hoon Lee and Daewan Han and Jae{-}Cheol Ryou}, editor = {Chae Hoon Lim and Moti Yung}, title = {Vulnerability of a Mobile Payment System Proposed at {WISA} 2002}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {278--285}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_23}, doi = {10.1007/978-3-540-31815-6\_23}, timestamp = {Fri, 17 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Hwang0HR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeKHHM03, author = {Dong Hoon Lee and Jaeheon Kim and Jin Hong and Jae Woo Han and Dukjae Moon}, title = {Algebraic Attacks on Summation Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {229}, year = {2003}, url = {http://eprint.iacr.org/2003/229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeKHHM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CheonL02, author = {Jung Hee Cheon and Dong Hoon Lee}, title = {Diffie-Hellman Problems and Bilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {117}, year = {2002}, url = {http://eprint.iacr.org/2002/117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CheonL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.