


default search action
Sangjin Lee 0002
Person information
- affiliation: Korea University, School of Cybersecurity, Seoul, South Korea
Other persons with the same name
- Sangjin Lee — disambiguation page
- Sangjin Lee 0001
— Hanyang University, Seoul, Republic of Korea
- Sangjin Lee 0003
— Chung-Ang University, Department of Computer Science and Engineering, Seoul, South Korea
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j78]Junghoon Oh
, Sangjin Lee
, Hyunuk Hwang:
Forensic Detection of Timestamp Manipulation for Digital Forensic Investigation. IEEE Access 12: 72544-72565 (2024) - [j77]Sorin Im, Hyunah Park, Jihun Joun, Sangjin Lee, Jungheum Park:
Revisiting logical image formats for future digital forensics: A comprehensive analysis on L01 and AFF4-L. Digit. Investig. 50(Supplement): 301811 (2024) - 2023
- [j76]Kyounga Shin
, Yunho Lee
, Jungho Lim, Honggoo Kang, Sangjin Lee
:
System API Vectorization for Malware Detection. IEEE Access 11: 53788-53805 (2023) - [j75]Jieon Kim
, Jungheum Park
, Sangjin Lee:
An improved IoT forensic model to identify interconnectivity between things. Forensic Sci. Int. Digit. Investig. 44: 301499 (2023) - [j74]Jihun Joun
, Sangjin Lee, Jungheum Park:
Discovering spoliation of evidence through identifying traces on deleted files in macOS. Forensic Sci. Int. Digit. Investig. 44(Supplement): 301502 (2023) - [j73]Sang Hyuk An
, Sangjin Lee, Jaehyeok Han
:
Data reconstruction and recovery of deduplicated files having non-resident attributes in NTFS volume. Forensic Sci. Int. Digit. Investig. 46: 301571 (2023) - [j72]Hoyong Choi, Sangjin Lee:
Forensic analysis of SQL server transaction log in unallocated area of file system. Forensic Sci. Int. Digit. Investig. 46(Supplement): 301605 (2023) - [j71]Jihun Joun
, Sangjin Lee, Jungheum Park:
Data remnants analysis of document files in Windows: Microsoft 365 as a case study. Forensic Sci. Int. Digit. Investig. 46(Supplement): 301612 (2023) - [j70]Geun-Yeong Choi, Jewan Bang
, Sangjin Lee, Jungheum Park:
Chracer: Memory analysis of Chromium-based browsers. Forensic Sci. Int. Digit. Investig. 46(Supplement): 301613 (2023) - 2022
- [j69]Junghoon Oh
, Sangjin Lee
, Hyunuk Hwang:
Forensic Recovery of File System Metadata for Digital Forensic Investigation. IEEE Access 10: 111591-111606 (2022) - [j68]Jewan Bang
, Jungheum Park
, Sangjin Lee:
Vision: An empirical framework for examiners to accessing password-protected resources for on-the-scene digital investigations. Digit. Investig. 40(Supplement): 301376 (2022) - [j67]Jihyeok Yang, Jieon Kim, Jewan Bang
, Sangjin Lee, Jungheum Park:
CATCH: Cloud Data Acquisition through Comprehensive and Hybrid Approaches. Digit. Investig. 43(Supplement): 301442 (2022) - [j66]Sungha Park, Sangjin Lee:
DiagAnalyzer: User behavior analysis and visualization using Windows Diagnostics logs. Digit. Investig. 43(Supplement): 301450 (2022) - [j65]Yirang Lim, MinA Youn
, Hyunji Chung, Jungheum Park
, Graeme Horsman, Sangjin Lee:
Characterizing client-side caches of audiovisual content sharing services: Findings and suggestions for forensics. J. Inf. Secur. Appl. 65: 103102 (2022) - [j64]Jaehyeok Han, Sangjin Lee:
A Study on the Processing of Timestamps in the Creation of Multimedia Files on Mobile Devices. J. Inf. Process. Syst. 18(3): 402-410 (2022) - 2021
- [j63]Hoyong Choi
, Sangjin Lee
, Doowon Jeong
:
Forensic Recovery of SQL Server Database: Practical Approach. IEEE Access 9: 14564-14575 (2021) - [j62]Jisung Choi, Jungheum Park
, Sangjin Lee:
Forensic exploration on windows File History. Digit. Investig. 36(Supplement): 301134 (2021) - [j61]MinA Youn, Yirang Lim, Kangyoun Seo, Hyunji Chung, Sangjin Lee:
Forensic analysis for AI speaker with display Echo Show 2nd generation as a case study. Digit. Investig. 38(Supplement): 301130 (2021) - [j60]Seonho Lee, Jungheum Park, Hyunuk Hwang, Seungyoung Lee, Sangjin Lee, Doowon Jeong:
Forensic analysis of ReFS journaling. Digit. Investig. 38(Supplement): 301136 (2021) - [j59]Minji Um, Jaehyeok Han
, Sangjin Lee:
File fingerprinting of the ZIP format for identifying and tracking provenance. Digit. Investig. 39: 301271 (2021) - [j58]Junghoon Oh
, Sangjin Lee, Hyunuk Hwang:
NTFS Data Tracker: Tracking file data history based on $LogFile. Digit. Investig. 39: 301309 (2021) - [j57]Hongkyun Kwon, Sangjin Lee, Doowon Jeong:
User profiling via application usage pattern on digital devices for digital forensics. Expert Syst. Appl. 168: 114488 (2021) - [c100]Honggoo Kang, Yonghwi Kwon, Sangjin Lee, Hyungjoon Koo
:
SoftMark: Software Watermarking via a Binary Function Relocation. ACSAC 2021: 169-181 - 2020
- [j56]Dohyun Kim
, Sangjin Lee:
Study of identifying and managing the potential evidence for effective Android forensics. Digit. Investig. 33: 200897 (2020) - [j55]Honggoo Kang, Sangjin Lee:
Automated analysis with Apriori algorithm: deriving guidance for working-level cybersecurity curricula. Inroads 11(4): 20-26 (2020) - [i12]Jaehyeok Han, Jungheum Park, Hyunji Chung, Sangjin Lee:
Forensic analysis of the Windows telemetry for diagnostics. CoRR abs/2002.12506 (2020) - [i11]Hyunji Chung, Jungheum Park, Sangjin Lee:
Forensic Analysis of Residual Information in Adobe PDF Files. CoRR abs/2003.10546 (2020) - [i10]Jaehyeok Han, Jieon Kim, Sangjin Lee:
5W1H-based Expression for the Effective Sharing of Information in Digital Forensic Investigations. CoRR abs/2010.15711 (2020)
2010 – 2019
- 2019
- [j54]Doowon Jeong
, Sangjin Lee
:
High-Speed Searching Target Data Traces Based on Statistical Sampling for Digital Forensics. IEEE Access 7: 172264-172276 (2019) - [j53]Doowon Jeong, Sangjin Lee:
Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts. Digit. Investig. 29: 21-27 (2019) - 2018
- [j52]Jongseong Yoon, Sangjin Lee:
A method and tool to recover data deleted from a MongoDB. Digit. Investig. 24: 106-120 (2018) - [j51]Jungwoo Seo
, Sangjin Lee:
Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling. Secur. Commun. Networks 2018: 9706706:1-9706706:24 (2018) - [j50]Dohyun Kim
, Yunho Lee, Sangjin Lee:
Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices. J. Supercomput. 74(12): 6618-6632 (2018) - [i9]Hyunji Chung, Sangjin Lee:
Intelligent Virtual Assistant knows Your Life. CoRR abs/1803.00466 (2018) - 2017
- [j49]Hyunji Chung, Michaela Iorga, Jeffrey M. Voas, Sangjin Lee:
"Alexa, Can I Trust You?". Computer 50(9): 100-104 (2017) - [j48]Hyunji Chung, Jungheum Park, Sangjin Lee:
Digital forensic approaches for Amazon Alexa ecosystem. Digit. Investig. 22 Supplement: S15-S25 (2017) - [j47]Doowon Jeong, Sangjin Lee:
Study on the tracking revision history of MS Word files for forensic investigation. Digit. Investig. 23: 3-10 (2017) - [i8]Hyunji Chung, Jungheum Park, Sangjin Lee:
Digital Forensic Approaches for Amazon Alexa Ecosystem. CoRR abs/1707.08696 (2017) - [i7]Hyunji Chung, Jungheum Park, Sangjin Lee, Chulhoon Kang:
Digital Forensic Investigation of Cloud Storage Services. CoRR abs/1709.10395 (2017) - 2016
- [j46]Jongseong Yoon, Doowon Jeong, Chulhoon Kang, Sangjin Lee:
Forensic investigation framework for the document store NoSQL DBMS: MongoDB as a case study. Digit. Investig. 17: 53-65 (2016) - [j45]Jeonghyeon Kim, Aran Park, Sangjin Lee:
Recovery method of deleted records and tables from ESE database. Digit. Investig. 18 Supplement: S118-S124 (2016) - [j44]Doowon Jeong, Frank Breitinger
, Hari Kang, Sangjin Lee:
Towards Syntactic Approximate Matching - A Pre-Processing Experiment. J. Digit. Forensics Secur. Law 11(2): 97-110 (2016) - [j43]Jisung Choi, Sangjin Lee:
A study of user relationships in smartphone forensics. Multim. Tools Appl. 75(22): 14971-14983 (2016) - [j42]Jong Hyuk Park, Dohyun Kim
, Ji Soo Park, Sangjin Lee:
An enhanced security framework for reliable Android operating system. Secur. Commun. Networks 9(6): 528-534 (2016) - 2015
- [j41]Doowon Jeong
, Jungheum Park, Sangjin Lee, Chulhoon Kang:
Investigation Methodology of a Virtual Desktop Infrastructure for IoT. J. Appl. Math. 2015: 689870:1-689870:10 (2015) - [j40]Sooyoung Park, Hyunji Chung, Changhoon Lee
, Sangjin Lee, Kyungho Lee:
Methodology and implementation for tracking the file sharers using BitTorrent. Multim. Tools Appl. 74(1): 271-286 (2015) - [c99]Jaehyeok Han, Doowon Jeong, Sangjin Lee:
Analysis of the HIKVISION DVR File System. ICDF2C 2015: 189-199 - 2014
- [j39]Chan-Youn Lee, Sangjin Lee:
Structure and application of IconCache.db files for digital forensics. Digit. Investig. 11(2): 102-110 (2014) - [j38]Jungheum Park, Sangjin Lee:
Data fragment forensics for embedded DVR systems. Digit. Investig. 11(3): 187-200 (2014) - [j37]Jae Deok Ji, Dong-Guk Han
, Seok Won Jung, Sangjin Lee, Jongsub Moon:
Practical Electromagnetic Disturbance Analysis on Commercial Contactless Smartcards. Int. J. Distributed Sens. Networks 10 (2014) - [j36]Kyung-Soo Lim, Changhoon Lee
, Jong Hyuk Park, Sangjin Lee:
Test-driven forensic analysis of satellite automotive navigation systems. J. Intell. Manuf. 25(2): 329-338 (2014) - [j35]Seokhee Lee, Keun-Gi Lee, Jong Hyuk Park, Sangjin Lee:
An on-site digital investigation methodology for data leak case. Secur. Commun. Networks 7(12): 2616-2626 (2014) - 2013
- [j34]Keun-Gi Lee, Changhoon Lee, Sangjin Lee:
On-site investigation methodology for incident response in Windows environments. Comput. Math. Appl. 65(9): 1413-1420 (2013) - [j33]Ilyoung Hong
, Hyeon Yu, Sangjin Lee, Kyungho Lee:
A new triage model conforming to the needs of selective search and seizure of electronic evidence. Digit. Investig. 10(2): 175-192 (2013) - [j32]Namheun Son, Yunho Lee, Dohyun Kim
, Joshua I. James
, Sangjin Lee, Kyungho Lee:
A study of user data integrity during acquisition of Android devices. Digit. Investig. 10(Supplement): S3-S11 (2013) - [j31]Jewan Bang
, Changhoon Lee
, Sangjin Lee, Kyungho Lee:
Damaged backup data recovery method for Windows mobile. J. Supercomput. 66(2): 875-887 (2013) - 2012
- [j30]Hyunji Chung, Jungheum Park, Sangjin Lee, Cheulhoon Kang:
Digital forensic investigation of cloud storage services. Digit. Investig. 9(2): 81-95 (2012) - [j29]Jungheum Park, Hyunji Chung, Sangjin Lee:
Forensic analysis techniques for fragmented flash memory pages in smartphones. Digit. Investig. 9(2): 109-118 (2012) - [j28]Sungsu Lim, Byeongyeong Yoo, Jungheum Park, KeunDuck Byun, Sangjin Lee:
A research on the investigation method of digital forensics for a VMware Workstation's virtual machine. Math. Comput. Model. 55(1-2): 151-160 (2012) - [j27]Kyung-Soo Lim, Antonio Savoldi, Changhoon Lee
, Sangjin Lee:
On-the-spot digital investigation by means of LDFS: Live Data Forensic System. Math. Comput. Model. 55(1-2): 223-240 (2012) - [j26]Byeongyeong Yoo, Jungheum Park, Sungsu Lim, Jewan Bang, Sangjin Lee:
A study on multimedia file carving method. Multim. Tools Appl. 61(1): 243-261 (2012) - [j25]Sangjun Jeon, Jewan Bang, KeunDuck Byun, Sangjin Lee:
A recovery method of deleted record for SQLite database. Pers. Ubiquitous Comput. 16(6): 707-715 (2012) - [j24]Namheun Son, Keun-Gi Lee, Sangjun Jeon, Sangjin Lee, Changhoon Lee
:
The effective method of database server forensics on the enterprise environment. Secur. Commun. Networks 5(10): 1086-1093 (2012) - [c98]Sooyoung Park, Hyunji Chung, Changhoon Lee
, Sangjin Lee:
Methodology for Digital Investigation of Illegal Sharing Using BitTorrent. ITCS 2012: 187-195 - [c97]Jeehee Lee, Hyunji Chung, Changhoon Lee
, Sangjin Lee:
Methodology for Digital Forensic Investigation of iCloud. ITCS 2012: 197-206 - [c96]Jong-Hyun Choi, Keun-Gi Lee, Jungheum Park, Changhoon Lee
, Sangjin Lee:
Analysis Framework to Detect Artifacts of Portable Web Browser. ITCS 2012: 207-214 - [c95]Junghoon Oh
, Namheun Son, Sangjin Lee, Kyungho Lee:
A Study for Classification of Web Browser Log and Timeline Visualization. WISA 2012: 192-207 - 2011
- [j23]Jewan Bang
, Byeongyeong Yoo, Sangjin Lee:
Analysis of changes in file time attributes with file manipulation. Digit. Investig. 7(3-4): 135-144 (2011) - [j22]Junghoon Oh
, SeungBong Lee, Sangjin Lee:
Advanced evidence collection and analysis of web browser activity. Digit. Investig. 8(Supplement): S62-S70 (2011) - [c94]Namheun Son, Keun-Gi Lee, Sangjun Jeon, Hyunji Chung, Sangjin Lee, Changhoon Lee:
The Method of Database Server Detection and Investigation in the Enterprise Environment. STA 2011: 164-171 - 2010
- [j21]Jongsung Kim, Yuseop Lee, Sangjin Lee:
DES with any reduced masked rounds is not secure against side-channel attacks. Comput. Math. Appl. 60(2): 347-354 (2010) - [j20]Seokhee Lee, Antonio Savoldi, Kyoung Soo Lim, Jong Hyuk Park, Sangjin Lee:
A proposal for automating investigations in live forensics. Comput. Stand. Interfaces 32(5-6): 246-255 (2010) - [j19]Jewan Bang
, Byeongyeong Yoo, Sangjin Lee:
Secure USB bypassing tool. Digit. Investig. 7(Supplement): S114-S120 (2010) - [j18]Jun Choi, Dukjae Moon, Sangjin Lee:
A New Primitive For Stream Ciphers Applicable To Pervasive Environments. Intell. Autom. Soft Comput. 16(3): 461-470 (2010) - [j17]Sung Jae Lee, Seog Chung Seo, Dong-Guk Han, Seokhie Hong, Sangjin Lee:
Acceleration of Differential Power Analysis through the Parallel Use of GPU and CPU. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(9): 1688-1692 (2010) - [j16]Changhoon Lee, Sangjin Lee, Jong Hyuk Park, Sajid Hussain, Jung Hwan Song:
Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device. Telecommun. Syst. 44(3-4): 267-279 (2010)
2000 – 2009
- 2009
- [j15]Bora Park, Jungheum Park, Sangjin Lee:
Data concealment and detection in Microsoft Office 2007 files. Digit. Investig. 5(3-4): 104-114 (2009) - [j14]Jungheum Park, Sangjin Lee:
Forensic investigation of Microsoft PowerPoint files. Digit. Investig. 6(1-2): 16-24 (2009) - [j13]Jong Hyuk Park, Sangjin Lee, Jongin Lim, Laurence T. Yang:
U-HMS: hybrid system for secure intelligent multimedia data services in Ubi-Home. J. Intell. Manuf. 20(3): 337-346 (2009) - [j12]Daesung Lim, Nam Su Chang, Sung Yeon Ji, Chang Han Kim, Sangjin Lee, Young-Ho Park
:
An efficient signed digit montgomery multiplication for RSA. J. Syst. Archit. 55(7-9): 355-362 (2009) - [c93]Kimin Seo, Jaemin Choi, Yong-seok Choi, Dong-chan Lee, Sangjin Lee:
Research about extracting and analyzing accounting data of company to detect financial fraud. ISI 2009: 200-202 - [c92]SeungBong Lee, Jewan Bang, Kyung-Soo Lim, Jongsung Kim, Sangjin Lee:
A Stepwise Methodology for Tracing Computer Usage. NCM 2009: 1852-1857 - [c91]Jewan Bang
, Byeongyeong Yoo, Jongsung Kim, Sangjin Lee:
Analysis of Time Information for Digital Investigation. NCM 2009: 1858-1864 - 2008
- [j11]Jongsung Kim, Changhoon Lee, Jaechul Sung
, Seokhie Hong, Sangjin Lee, Jongin Lim:
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(10): 3047-3058 (2008) - [j10]Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung
, Sangjin Lee:
Security analysis of the full-round DDO-64 block cipher. J. Syst. Softw. 81(12): 2328-2335 (2008) - [j9]Jeong Choon Ryoo, Dong-Guk Han, Sung-Kyoung Kim, Sangjin Lee:
Performance Enhancement of Differential Power Analysis Attacks With Signal Companding Methods. IEEE Signal Process. Lett. 15: 625-628 (2008) - [c90]Eunju Baek, Yeog Kim, Jinwon Sung, Sangjin Lee:
The design of framework for detecting an insider's leak of confidential information. e-Forensics 2008: 14 - [c89]Keun-Gi Lee, Hyewon Lee, Chang-Wook Park, Jewan Bang, Kwon-youp Kim, Sangjin Lee:
USB PassOn: Secure USB Thumb Drive Forensic Toolkit. FGCN (2) 2008: 279-282 - [c88]Kyung-Soo Lim, Sangjin Lee:
A Methodology for Forensic Analysis of Embedded Systems. FGCN (2) 2008: 283-286 - [c87]Keun-Gi Lee, Antonio Savoldi, Paolo Gubian, Kyung-Soo Lim, Seokhee Lee, Sangjin Lee:
Methodologies for Detecting Covert Database. IIH-MSP 2008: 538-541 - [c86]Sunmi Yun, Antonio Savoldi, Paolo Gubian, Yeog Kim, Seokhee Lee, Sangjin Lee:
Design and Implementation of a Tool for System Restore Point Analysis. IIH-MSP 2008: 542-546 - [c85]Yeog Kim, Antonio Savoldi, Hyewon Lee, Sunmi Yun, Sangjin Lee, Jongin Lim:
Design and Implementation of a Tool to Detect Accounting Frauds. IIH-MSP 2008: 547-552 - [c84]Bora Park, Antonio Savoldi, Paolo Gubian, Jungheum Park, Seokhee Lee, Sangjin Lee:
Recovery of Damaged Compressed Files for Digital Forensic Purposes. MUE 2008: 365-372 - [c83]Jungheum Park, Bora Park, Sangjin Lee, Seokhie Hong, Jong Hyuk Park:
Extraction of Residual Information in the Microsoft PowerPoint file from the Viewpoint of Digital Forensics considering PerCom Environment. PerCom 2008: 584-589 - [i6]Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths. IACR Cryptol. ePrint Arch. 2008: 48 (2008) - [i5]Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions. IACR Cryptol. ePrint Arch. 2008: 407 (2008) - [i4]Donghoon Chang, Seokhie Hong, Jaechul Sung, Sangjin Lee:
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension. IACR Cryptol. ePrint Arch. 2008: 460 (2008) - 2007
- [c82]Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Preimage Attack on the Parallel FFT-Hashing Function. ACISP 2007: 59-67 - [c81]Jong Hyuk Park, Sangjin Lee, Dong Hoon Lee, Jongin Lim, In-Hwa Hong, Laurence Tianruo Yang:
Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home. AINA 2007: 311-316 - [c80]Seokhee Lee
, Antonio Savoldi, Sangjin Lee, Jongin Lim:
Windows Pagefile Collection and Analysis for a Live Forensics Context. FGCN (2) 2007: 97-101 - [c79]Gu Taek Lee, Seokhee Lee
, Elena Tsomko, Sangjin Lee:
Discovering Methodology and Scenario to Detect Covert Database System. FGCN (2) 2007: 130-135 - [c78]Yeog Kim, Jewan Bang, Gu Taek Lee, Sangjin Lee, Jongin Lim:
A Field Guide to Hidden Accounting Information Detection. FGCN (2) 2007: 146-150 - [c77]Kwangsoo Lee, Andreas Westfeld, Sangjin Lee:
Generalised Category Attack - Improving Histogram-Based Attack on JPEG LSB Embedding. Information Hiding 2007: 378-391 - [c76]Seokhee Lee, Antonio Savoldi, Sangjin Lee, Jongin Lim:
Password Recovery Using an Evidence Collection Tool and Countermeasures. IIH-MSP 2007: 97-102 - [i3]Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jesang Lee, Dukjae Moon, Sungtaek Chee:
New FORK-256. IACR Cryptol. ePrint Arch. 2007: 185 (2007) - 2006
- [j8]Jong Hyuk Park, Sangjin Lee, In-Hwa Hong:
DRBAC Model Using a WSNM for Services in i-Home. IEICE Trans. Inf. Syst. 89-D(12): 2831-2837 (2006) - [j7]Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung
, Okyeon Yi:
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. J. Cryptol. 19(4): 441-462 (2006) - [c75]Changhoon Lee, Jongsung Kim, Jaechul Sung
, Seokhie Hong, Sangjin Lee:
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. ACISP 2006: 421-431 - [c74]Donghoon Chang, Sangjin Lee, Mridul Nandi
, Moti Yung:
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding. ASIACRYPT 2006: 283-298 - [c73]Deukjo Hong, Jaechul Sung
, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee:
HIGHT: A New Block Cipher Suitable for Low-Resource Device. CHES 2006: 46-59 - [c72]Jong Hyuk Park, Sangjin Lee, Sung Hee Hong:
C-iUMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home. EUC Workshops 2006: 660-670 - [c71]Deukjo Hong, Donghoon Chang, Jaechul Sung
, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon, Sungtaek Chee:
A New Dedicated 256-Bit Hash Function: FORK-256. FSE 2006: 195-209 - [c70]Jong Hyuk Park, Sangjin Lee, Byoung-Soo Koh:
A Flexible DRM System Considering Ubiquitous Environment. ICCSA (4) 2006: 236-244 - [c69]Jong Hyuk Park, Jungsuk Song, Sangjin Lee, Byoung-Soo Koh, In-Hwa Hong:
User Centric Intelligent IPMPS in Ubi-Home. ICCSA (4) 2006: 245-254 - [c68]Changhoon Lee, Jongsung Kim, Jaechul Sung
, Seokhie Hong, Sangjin Lee:
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. ICCSA (3) 2006: 446-455 - [c67]Bonseok Koo, Dongwook Lee, Gwonho Ryu, Taejoo Chang, Sangjin Lee:
High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem. ICISC 2006: 81-93 - [c66]Kwangsoo Lee, Andreas Westfeld, Sangjin Lee:
Category Attack for LSB Steganalysis of JPEG Images. IWDW 2006: 35-48 - [c65]Hwajong Oh, Kwangsoo Lee, Sangjin Lee:
Attack on JPEG2000 Steganography Using LRCA. IWDW 2006: 268-281 - [c64]Jong Hyuk Park, Sangjin Lee, Byoung-Soo Koh, Jae-Hyuk Jang:
uiH-PMAC Model Suitable for Ubi-Home Gateway in Ubiquitous Intelligent Environment. KES (2) 2006: 777-784 - [c63]Jong Hyuk Park, Ji-Sook Park, Sangjin Lee, Byoung-Soo Koh:
A DRBAC Model Based on Context for Smart and Secure Services in Intelligent Ubiquitous Home. UIC 2006: 893-901 - [c62]Kitae Jeong, Jaechul Sung
, Seokhie Hong, Sangjin Lee, Jaeheon Kim, Deukjo Hong:
Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators. VIETCRYPT 2006: 260-270 - 2005
- [j6]Jun Choi, Deukjo Hong, Seokhie Hong, Sangjin Lee:
Linear Attack Using Multiple Linear Approximations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 2-8 (2005) - [j5]Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 39-48 (2005) - [j4]Wonil Lee, Donghoon Chang, Sangjin Lee, Soo Hak Sung, Mridul Nandi:
Construction of UOWHF: Two New Parallel Methods. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 49-58 (2005) - [c61]Jong Hyuk Park, Jun Choi, Sangjin Lee, Hye-Ung Park, Deok-Gyu Lee:
User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home. CIS (1) 2005: 313-320 - [c60]Kwangsoo Lee, Changho Jung, Sangjin Lee, HyungJun Kim, Jongin Lim:
Applying LR Cube Analysis to JSteg Detection. Communications and Multimedia Security 2005: 275-276 - [c59]Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee:
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model. FSE 2005: 243-254 - [c58]Seokhie Hong, Jongsung Kim, Sangjin Lee, Bart Preneel:
Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192. FSE 2005: 368-383 - [c57]Jong Hyuk Park, Sangjin Lee, Yeog Kim, Byoung-Soo Koh:
Design and Implementation of the IMS-IPMP System in Convergence Home-Network Environment. ICADL 2005: 465-466 - [c56]Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim:
Color Cube Analysis for Detection of LSB Steganography in RGB Color Images. ICCSA (2) 2005: 537-546 - [c55]Jaemin Choi, Jongsung Kim, Jaechul Sung
, Sangjin Lee, Jongin Lim:
Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. ICCSA (2) 2005: 567-576 - [c54]Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee:
On the Security of Encryption Modes of MD4, MD5 and HAVAL. ICICS 2005: 147-158 - [c53]Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim:
New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography. Information Hiding 2005: 312-326 - [c52]Changhoon Lee, Jongsung Kim, Jaechul Sung
, Seokhie Hong, Sangjin Lee, Dukjae Moon:
Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. IMACC 2005: 201-219 - [c51]Deukjo Hong, Jaechul Sung
, Seokhie Hong, Sangjin Lee:
How to Construct Universal One-Way Hash Functions of Order r. INDOCRYPT 2005: 63-76 - [c50]Jong Hyuk Park, Heung-Soo Park, Sangjin Lee, Jun Choi, Deok-Gyu Lee:
Intelligent Multimedia Service System Based on Context Awareness in Smart Home. KES (1) 2005: 1146-1152 - [c49]Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung
, Sangjin Lee:
Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. Mycrypt 2005: 244-262 - [c48]KeunDuck Byun, Sangjin Lee, HyungJun Kim:
A Watermarking Method Using Quantization and Statistical Characteristics of Wavelet Transform. PDCAT 2005: 689-693 - [c47]Seokhee Lee
, Hyunsang Kim, Sangjin Lee, Jongin Lim:
Digital evidence collection process in integrity and memory information gathering. SADFE 2005: 236-247 - [i2]Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee:
On the Security of Encryption Modes of MD4, MD5 and HAVAL. IACR Cryptol. ePrint Arch. 2005: 327 (2005) - 2004
- [c46]YongSup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee:
Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2. ACISP 2004: 110-122 - [c45]Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong
:
The Related-Key Rectangle Attack - Application to SHACAL-1. ACISP 2004: 123-136 - [c44]Youngdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee:
Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1. ACISP 2004: 137-148 - [c43]Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
Pseudorandomness of SPN-Type Transformations. ACISP 2004: 212-223 - [c42]Deukjo Hong, Bart Preneel, Sangjin Lee:
Higher Order Universal One-Way Hash Functions. ASIACRYPT 2004: 201-213 - [c41]Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee, Ju-Sung Kang:
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. FSE 2004: 299-316 - [c40]Wonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee:
On the Pseudorandomness of a Modification of KASUMI Type Permutations. ICISC 2004: 313-329 - [c39]Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung
, Sangjin Lee, Dowon Hong
:
Padding Oracle Attacks on Multiple Modes of Operation. ICISC 2004: 343-351 - [c38]Kisik Chang, Robert H. Deng
, Feng Bao, Sangjin Lee, HyungJun Kim, Jongin Lim:
On Security Notions for Steganalysis. ICISC 2004: 440-454 - [c37]Jongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, Jung Hwan Song:
Related-Key Attacks on Reduced Rounds of SHACAL-2. INDOCRYPT 2004: 175-190 - [c36]Youngdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung
, Sangjin Lee:
Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H. INDOCRYPT 2004: 191-205 - [c35]Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung
, Sangjin Lee, Soo Hak Sung:
Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. INDOCRYPT 2004: 328-342 - [c34]Kisik Chang, Robert H. Deng
, Feng Bao, Sangjin Lee, HyungJun Kim:
On Security Notions of Steganographic Systems. IWDW 2004: 137-151 - [c33]Jeong Jae Yu, Changho Jung, Seok-Koo Yoon, Sangjin Lee:
Steganographic Scheme Using a Block Cipher. IWDW 2004: 163-170 - [i1]Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model. IACR Cryptol. ePrint Arch. 2004: 69 (2004) - 2003
- [j3]Kilsoo Chun, Seungjoo Kim
, Sangjin Lee, Soo Hak Sung, Seonhee Yoon:
Differential and linear cryptanalysis for 2-round SPNs. Inf. Process. Lett. 87(5): 277-282 (2003) - [c32]Jaechul Sung
, Deukjo Hong, Sangjin Lee:
Key Recovery Attacks on the RMAC, TMAC, and IACBC. ACISP 2003: 265-273 - [c31]Wonil Lee, Donghoon Chang, Sangjin Lee, Soo Hak Sung, Mridul Nandi:
New Parallel Domain Extenders for UOWHF. ASIACRYPT 2003: 208-227 - [c30]Sangwoo Park, Soo Hak Sung, Sangjin Lee, Jongin Lim:
Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES. FSE 2003: 247-260 - [c29]Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee:
Differential Cryptanalysis of TEA and XTEA. ICISC 2003: 402-417 - [c28]Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong
:
New Block Cipher: ARIA. ICISC 2003: 432-445 - [c27]Jongsung Kim, Seokhie Hong, Sangjin Lee, Jung Hwan Song, Hyungjin Yang:
Truncated Differential Attacks on 8-Round CRYPTON. ICISC 2003: 446-456 - [c26]Jongsung Kim, Seokhie Hong, Jaechul Sung
, Changhoon Lee, Sangjin Lee:
Impossible Differential Cryptanalysis for Block Cipher Structures. INDOCRYPT 2003: 82-96 - [c25]Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee:
Impossible Differential Attack on 30-Round SHACAL-2. INDOCRYPT 2003: 97-106 - [c24]Taeshik Shon, Jongsub Moon, Sangjin Lee, Dong Hoon Lee, Jongin Lim:
Covert Channel Detection in the ICMP Payload Using Support Vector Machine. ISCIS 2003: 828-835 - [c23]Hyejoung Yoo, Hyungwoo Lee, Sangjin Lee, Jongin Lim:
Designated Verification of Non-invertible Watermark. ISC 2003: 338-351 - [c22]Jeong Jae Yu, Jae Won Han, Kwang Su Lee, Seung Cheol O, Sangjin Lee, Il Hwan Park:
A Secure Steganographic Scheme against Statistical Analyses. IWDW 2003: 497-507 - [c21]Kisik Chang, Changho Jung, Sangjin Lee, Wooil Yang:
High Quality Perceptual Steganographic Techniques. IWDW 2003: 518-531 - [c20]Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim:
Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property. MMM-ACNS 2003: 298-307 - 2002
- [j2]Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim:
Impossible Differential Cryptanalysis of Zodiac. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 38-43 (2002) - [j1]Seokhie Hong, Jaechul Sung
, Sangjin Lee, Jongin Lim, Jongsu Kim:
Provable security for 13 round Skipjack-like structure. Inf. Process. Lett. 82(5): 243-246 (2002) - [c19]Dong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee, Hyungjin Yang:
A Practical Approach Defeating Blackmailing. ACISP 2002: 464-481 - [c18]Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seok Won Jung:
Amplified Boomerang Attack against Reduced-Round SHACAL. ASIACRYPT 2002: 243-253 - [c17]Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, Jongin Lim:
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA. FSE 2002: 49-60 - [c16]Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim:
Saturation Attacks on Reduced Round Skipjack. FSE 2002: 100-111 - [c15]Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, Jongin Lim:
A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. ICICS 2002: 456-468 - [c14]Young-Ho Park
, Sangho Oh, Sangjin Lee, Jongin Lim, Maenghee Sung:
An Improved Method of Multiplication on Certain Elliptic Curves. Public Key Cryptography 2002: 310-322 - [c13]Donghoon Chang, Jaechul Sung
, Soo Hak Sung, Sangjin Lee, Jongin Lim:
Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. Selected Areas in Cryptography 2002: 160-174 - [c12]Heajoung Yoo, Seungchul Seo, Sangjin Lee, Jongin Lim:
Practical off-line authentication. Security and Watermarking of Multimedia Contents 2002: 141-148 - 2001
- [c11]Deukjo Hong, Jaechul Sung
, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi:
Known-IV Attacks on Triple Modes of Operation of Block Ciphers. ASIACRYPT 2001: 208-221 - [c10]Deukjo Hong, Jaechul Sung
, Shiho Moriai, Sangjin Lee, Jongin Lim:
Impossible Differential Cryptanalysis of Zodiac. FSE 2001: 300-311 - [c9]Seonhee Lee, Seokhie Hong, Sangjin Lee, Jongin Lim, Seonhee Yoon:
Truncated Differential Cryptanalysis of Camellia. ICISC 2001: 32-38 - [c8]Jaechul Sung
, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi:
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. ICISC 2001: 103-113 - [c7]Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee, Jongin Lim:
Off-Line Authentication Using Watermarks. ICISC 2001: 200-213 - 2000
- [c6]Heajoung Yoo, Seokhie Hong, Sangjin Lee, Jong In Lim, Okyeon Yi, Maenghee Sung:
A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring. ACISP 2000: 41-48 - [c5]Jaechul Sung
, Sangjin Lee, Jong In Lim, Seokhie Hong, Sangjoon Park:
Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. ASIACRYPT 2000: 274-288 - [c4]Seokhie Hong, Sangjin Lee, Jongin Lim, Jaechul Sung
, Dong Hyeon Cheon, Inho Cho:
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. FSE 2000: 273-283 - [c3]Dong Hyeon Cheon, Seokhie Hong, Sangjin Lee, Sung Jae Lee, Kyung Hwan Park, Seonhee Yoon:
Difference Distribution Attack on DONUT and Improved DONUT. ICISC 2000: 37-48 - [c2]Dong Hyeon Cheon, Sangjin Lee, Jong In Lim, Sung Jae Lee:
New Block Cipher DONUT Using Pairwise Perfect Decorrelation. INDOCRYPT 2000: 262-270
1990 – 1999
- 1999
- [c1]Ju-Sung Kang, Choonsik Park, Sangjin Lee, Jong In Lim:
On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis. ICISC 1999: 38-52
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-30 20:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint