Researcher Page

사진

Lee, Jooyoung (이주영) L-5601-2016

Department
School of Computing(전산학부)
Co-author
Collaboration Network Collaboration Network
Website
 
Research Area

Keyword Cloud

Reload 더보기
1

Indifferentiability of the Sum of Random Permutations Toward Optimal Security

Lee, JooyoungresearcherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCIEEE TRANSACTIONS ON INFORMATION THEORY, v.63, no.6, pp.4050 - 4054, 2017-06

2

MJH 해쉬 함수 역상 공격

이주영researcher; 김종성한국정보보호학회정보보호학회논문지, v.26, no.2, pp.315 - 318, 2016-04

3

MJH: a faster alternative to MDC-2

Lee, Jooyoungresearcher; Stam, MartijnSPRINGERDESIGNS CODES AND CRYPTOGRAPHY, v.76, no.2, pp.179 - 205, 2015-08

4

Security of the Misty Structure beyond the Birthday Bound

Lee, JooyoungresearcherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E97A, no.7, pp.1516 - 1522, 2014-07

5

Security of permutation-based compression function lp231

Lee, Jooyoungresearcher; Kwon, DaesungELSEVIER SCIENCE BVINFORMATION PROCESSING LETTERS, v.114, no.7, pp.372 - 381, 2014-07

6

Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation

Lee, Jooyoungresearcher; Steinberger, JohnIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCIEEE TRANSACTIONS ON INFORMATION THEORY, v.58, no.9, pp.6165 - 6182, 2012-09

7

Collision Resistance of the JH Hash Function

Lee, Jooyoungresearcher; Hong, DeukjoIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCIEEE TRANSACTIONS ON INFORMATION THEORY, v.58, no.3, pp.1992 - 1995, 2012-03

8

Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model

Lee, Jooyoungresearcher; Park, Je HongIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E94A, no.1, pp.129 - 138, 2011-01

9

The Security of Abreast-DM in the Ideal Cipher Model

Lee, Jooyoungresearcher; Kwon, DaesungIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E94A, no.1, pp.104 - 109, 2011-01

10

On Lai-Massey and quasi-Feistel ciphers

Yun, Aaram; Park, Je Hong; Lee, JooyoungresearcherSPRINGERDESIGNS CODES AND CRYPTOGRAPHY, v.58, no.1, pp.45 - 72, 2011-01

11

Security of the Misty Structure Using Involutions as Round Functions

Lee, Jooyoungresearcher; Koo, BonwookIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E93A, no.9, pp.1612 - 1619, 2010-09

12

Preimage resistance of LPmkr with r = m-1

Lee, Jooyoungresearcher; Park, Je HongELSEVIER SCIENCE BVINFORMATION PROCESSING LETTERS, v.110, no.14-15, pp.602 - 608, 2010-07

13

IMPERSONATION ATTACK ON THE STRONG IDENTIFICATION BASED ON A HARD-ON-AVERAGE PROBLEM

Koo, Bonwook; Kwon, Daesung; Lee, Jooyoungresearcher; Song, Jung HwanKOREAN MATHEMATICAL SOCBULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, v.47, no.1, pp.63 - 71, 2010-01

14

Tree-based key predistribution for wireless sensor networks

Lee, Jooyoungresearcher; Kwon, DaesungSPRINGERWIRELESS NETWORKS, v.15, no.8, pp.1140 - 1151, 2009-11

15

Efficient RFID authentication protocols based on pseudorandom sequence generators

Lee, Jooyoungresearcher; Yeom, YongjinSPRINGERDESIGNS CODES AND CRYPTOGRAPHY, v.51, no.2, pp.195 - 210, 2009-05

16

On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs

Lee, Jooyoungresearcher; Stinson, Douglas RASSOC COMPUTING MACHINERYACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.11, no.2, 2008-03

17

경량 RFID 상호인증 프로토콜 LMAP, M2AP, EMAP에 대한 향상된 취약성 분석

권대성; 이주영researcher; 구본욱한국정보보호학회정보보호학회논문지, v.17, no.4, pp.103 - 114, 2007-08

18

Common intersection designs

Lee, Jooyoungresearcher; Stinson, DRJOHN WILEY & SONS INCJOURNAL OF COMBINATORIAL DESIGNS, v.14, no.4, pp.251 - 269, 2006-07

19

Tree-based key distribution patterns

Lee, Jooyoungresearcher; Stinson, DRSPRINGER-VERLAG BERLINLECTURE NOTES IN COMPUTER SCIENCE, v.3897, pp.189 - 204, 2006

20

Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005

Kwon, Daesung; Han, Daewan; Lee, Jooyoungresearcher; Yeom, YongjinSPRINGER-VERLAG BERLINLECTURE NOTES IN COMPUTER SCIENCE, v.4097, pp.262 - 270, 2006

Load more items
Loading...

rss_1.0 rss_2.0 atom_1.0