default search action
Jaechul Sung
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Hanbeom Shin, Insung Kim, Sunyeop Kim, Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Revisiting the Multiple-of Property for SKINNY: The Exact Computation of the Number of Right Pairs. IEEE Access 12: 35502-35511 (2024) - [j31]Dongjae Lee, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Accurate False-Positive Probability of Multiset-Based Demirci-Selçuk Meet-in-the-Middle Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(8): 1212-1228 (2024) - [j30]Seonkyu Kim, Myoungsu Shin, Hanbeom Shin, Insung Kim, Sunyeop Kim, Donggeun Kwon, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Differential Factors Revisited: A Sufficient Condition for the Practical Use of Differential Factors. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(12): 1669-1675 (2024) - [i17]Sunyeop Kim, Insung Kim, Dongjae Lee, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Byte-wise equal property of ARADI. IACR Cryptol. ePrint Arch. 2024: 1772 (2024) - 2023
- [j29]Dongjae Lee, Jaewoo Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong:
A Practical Ciphertext-Only Attack on GMR-2 System. IEEE Access 11: 44519-44530 (2023) - [i16]Sunyeop Kim, Myoungsu Shin, Seonkyu Kim, Hanbeom Shin, Insung Kim, Donggeun Kwon, Dongjae Lee, Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Shining Light on the Shadow: Full-round Practical Distinguisher for Lightweight Block Cipher Shadow. IACR Cryptol. ePrint Arch. 2023: 1200 (2023) - [i15]Hanbeom Shin, Insung Kim, Sunyeop Kim, Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Revisiting The Multiple of Property for SKINNY The Exact Computation of the number of right pairs. IACR Cryptol. ePrint Arch. 2023: 1944 (2023) - 2022
- [j28]Dongjae Lee, Deukjo Hong, Jaechul Sung, Seonggyeom Kim, Seokhie Hong:
Improved Ciphertext-Only Attack on GMR-1. IEEE Access 10: 1979-1989 (2022) - [j27]Sunyeop Kim, Jeseong Kim, Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Integral Cryptanalysis of Lightweight Block Cipher PIPO. IEEE Access 10: 110195-110204 (2022) - [j26]Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Accelerating the Best Trail Search on AES-Like Ciphers. IACR Trans. Symmetric Cryptol. 2022(2): 201-252 (2022) - [i14]Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Accelerating the Best Trail Search on AES-Like Ciphers. IACR Cryptol. ePrint Arch. 2022: 643 (2022) - 2021
- [j25]Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong:
A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application. IEEE Access 9: 150592-150607 (2021) - 2020
- [j24]Seong Gyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Classification of 4-bit S-Boxes for BOGI Permutation. IEEE Access 8: 210935-210949 (2020) - [c30]Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong:
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations. ICISC 2020: 99-122 - [i13]Seong Gyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Classification of 4-bit S-boxes for BOGI-permutation. IACR Cryptol. ePrint Arch. 2020: 397 (2020) - [i12]Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong:
A New Method for Designing Lightweight S-boxes with High Differential and Linear Branch Numbers, and Its Application. IACR Cryptol. ePrint Arch. 2020: 1582 (2020)
2010 – 2019
- 2019
- [j23]Seong Gyeom Kim, Seung Joon Lee, Deukjo Hong, Jaechul Sung, Seokhie Hong:
New Approach to Constructing Noise Source Based on Race Conditions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1272-1284 (2019) - 2017
- [j22]HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Known-Key Attack on SM4 Block Cipher. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(12): 2985-2990 (2017) - [i11]Seojin Kim, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Efficient Differential Trail Searching Algorithm for ARX Block Ciphers. IACR Cryptol. ePrint Arch. 2017: 71 (2017) - 2016
- [i10]Hochang Lee, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong:
New Impossible Differential Characteristic of SPECK64 using MILP. IACR Cryptol. ePrint Arch. 2016: 1137 (2016) - 2015
- [j21]Jun Choi, Dukjae Moon, Seokhie Hong, Jaechul Sung:
The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks. Entropy 17(6): 3692-3709 (2015) - [j20]Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim:
Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. Peer-to-Peer Netw. Appl. 8(4): 716-732 (2015) - 2014
- [j19]Yuseop Lee, Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong:
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing. Int. J. Distributed Sens. Networks 10 (2014) - 2013
- [j18]Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong:
Improved differential fault analysis on PRESENT-80/128. Int. J. Comput. Math. 90(12): 2553-2563 (2013) - [j17]Yuseop Lee, Kitae Jeong, Jaechul Sung, Changhoon Lee, Seokhie Hong, Ku-Young Chang:
Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j16]Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong:
Security Analysis of HMAC/NMAC by Using Fault Injection. J. Appl. Math. 2013: 101907:1-101907:6 (2013) - [j15]Jinkeon Kang, Kitae Jeong, Jaechul Sung, Seokhie Hong, Kyungho Lee:
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis. J. Appl. Math. 2013: 713673:1-713673:10 (2013) - [i9]Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong:
Improved Differential Fault Analysis on ARIA using Small Number of Faults. IACR Cryptol. ePrint Arch. 2013: 191 (2013) - 2012
- [j14]HyungChul Kang, Deukjo Hong, Dukjae Moon, Daesung Kwon, Jaechul Sung, Seokhie Hong:
Known-Key Attacks on Generalized Feistel Schemes with SP Round Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(9): 1550-1560 (2012) - [j13]Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong:
Differential fault analysis on block cipher SEED. Math. Comput. Model. 55(1-2): 26-34 (2012) - [i8]Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong:
Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED. IACR Cryptol. ePrint Arch. 2012: 621 (2012) - 2011
- [j12]Changhoon Lee, Jongsung Kim, Jaechul Sung, Yangsun Lee, Chang Hoon Lee:
Cryptanalysis of CIKS-128 and CIKS-128H Suitable for Intelligent Multimedia and Ubiquitous Computing Systems. Comput. Informatics 30(3): 447-466 (2011) - [j11]Jongsung Kim, Jaechul Sung, Ermaliza Razali, Raphael C.-W. Phan, Marc Joye:
Notions and relations for RKA-secure permutation and function families. Des. Codes Cryptogr. 60(1): 15-35 (2011) - [j10]Jaechul Sung:
Differential cryptanalysis of eight-round SEED. Inf. Process. Lett. 111(10): 474-478 (2011) - [c29]Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong:
Fault Injection Attack on A5/3. ISPA 2011: 300-303 - 2010
- [j9]Deok-Gyu Lee, Jongsung Kim, Jaechul Sung, Yangsun Lee, Seungmin Rho:
Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems. Telecommun. Syst. 44(3-4): 297-306 (2010) - [i7]Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong:
A note on "Improved Fast Correlation Attacks on Stream Ciphers". IACR Cryptol. ePrint Arch. 2010: 21 (2010)
2000 – 2009
- 2009
- [c28]Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park, Yeonjung Kang:
Update on SEED: SEED-192/256. ISA 2009: 1-10 - [c27]Jesang Lee, Seokhie Hong, Jaechul Sung, Haeryong Park:
A New Double-Block-Length Hash Function Using Feistel Structure. ISA 2009: 11-20 - 2008
- [j8]Eunjin Lee, Jongsung Kim, Deukjo Hong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim:
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(2): 642-649 (2008) - [j7]Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong, Jongin Lim, Haeryong Park, Kilsoo Chun:
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9): 2607-2614 (2008) - [j6]Jongsung Kim, Changhoon Lee, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jongin Lim:
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(10): 3047-3058 (2008) - [j5]Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee:
Security analysis of the full-round DDO-64 block cipher. J. Syst. Softw. 81(12): 2328-2335 (2008) - [c26]Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong:
Related-Key Chosen IV Attacks on Grain-v1 and Grain-128. ACISP 2008: 321-335 - [c25]Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong:
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. FSE 2008: 189-206 - [i6]Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths. IACR Cryptol. ePrint Arch. 2008: 48 (2008) - [i5]Tae Hyun Kim, Jongsung Kim, Seokhie Hong, Jaechul Sung:
Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher. IACR Cryptol. ePrint Arch. 2008: 281 (2008) - [i4]Donghoon Chang, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions. IACR Cryptol. ePrint Arch. 2008: 407 (2008) - [i3]Donghoon Chang, Seokhie Hong, Jaechul Sung, Sangjin Lee:
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension. IACR Cryptol. ePrint Arch. 2008: 460 (2008) - 2007
- [j4]Jaechul Sung, Deukjo Hong, Seokhie Hong:
Cryptanalysis of an involutional block cipher using cellular automata. Inf. Process. Lett. 104(5): 183-185 (2007) - [c24]Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Preimage Attack on the Parallel FFT-Hashing Function. ACISP 2007: 59-67 - [c23]Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim:
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. ACISP 2007: 143-157 - [i2]Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jesang Lee, Dukjae Moon, Sungtaek Chee:
New FORK-256. IACR Cryptol. ePrint Arch. 2007: 185 (2007) - [i1]Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung, Seokhie Hong:
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function. IACR Cryptol. ePrint Arch. 2007: 416 (2007) - 2006
- [j3]Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi:
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. J. Cryptol. 19(4): 441-462 (2006) - [c22]Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. ACISP 2006: 421-431 - [c21]Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee:
HIGHT: A New Block Cipher Suitable for Low-Resource Device. CHES 2006: 46-59 - [c20]Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon, Sungtaek Chee:
A New Dedicated 256-Bit Hash Function: FORK-256. FSE 2006: 195-209 - [c19]Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. ICCSA (3) 2006: 446-455 - [c18]Kitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jaeheon Kim, Deukjo Hong:
Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators. VIETCRYPT 2006: 260-270 - 2005
- [c17]Jaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee, Jongin Lim:
Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. ICCSA (2) 2005: 567-576 - [c16]Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon:
Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. IMACC 2005: 201-219 - [c15]Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee:
How to Construct Universal One-Way Hash Functions of Order r. INDOCRYPT 2005: 63-76 - [c14]Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee:
Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. Mycrypt 2005: 244-262 - [c13]Jaechul Sung, Jongsung Kim, Changhoon Lee, Seokhie Hong:
Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds. WEWoRC 2005: 64-75 - 2004
- [c12]Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong:
Padding Oracle Attacks on Multiple Modes of Operation. ICISC 2004: 343-351 - [c11]Youngdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee:
Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H. INDOCRYPT 2004: 191-205 - [c10]Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee, Soo Hak Sung:
Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. INDOCRYPT 2004: 328-342 - 2003
- [c9]Jaechul Sung, Deukjo Hong, Sangjin Lee:
Key Recovery Attacks on the RMAC, TMAC, and IACBC. ACISP 2003: 265-273 - [c8]Jongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee:
Impossible Differential Cryptanalysis for Block Cipher Structures. INDOCRYPT 2003: 82-96 - [c7]Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee:
Impossible Differential Attack on 30-Round SHACAL-2. INDOCRYPT 2003: 97-106 - 2002
- [j2]Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim:
Impossible Differential Cryptanalysis of Zodiac. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 38-43 (2002) - [j1]Seokhie Hong, Jaechul Sung, Sangjin Lee, Jongin Lim, Jongsu Kim:
Provable security for 13 round Skipjack-like structure. Inf. Process. Lett. 82(5): 243-246 (2002) - [c6]Donghoon Chang, Jaechul Sung, Soo Hak Sung, Sangjin Lee, Jongin Lim:
Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98. Selected Areas in Cryptography 2002: 160-174 - 2001
- [c5]Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi:
Known-IV Attacks on Triple Modes of Operation of Block Ciphers. ASIACRYPT 2001: 208-221 - [c4]Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim:
Impossible Differential Cryptanalysis of Zodiac. FSE 2001: 300-311 - [c3]Jaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi:
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. ICISC 2001: 103-113 - 2000
- [c2]Jaechul Sung, Sangjin Lee, Jong In Lim, Seokhie Hong, Sangjoon Park:
Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. ASIACRYPT 2000: 274-288 - [c1]Seokhie Hong, Sangjin Lee, Jongin Lim, Jaechul Sung, Dong Hyeon Cheon, Inho Cho:
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. FSE 2000: 273-283
Coauthor Index
aka: Seong Gyeom Kim
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-12 21:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint