Researcher Page

사진

Lee, Jooyoung (이주영) L-5601-2016

Department
School of Computing(전산학부)
Co-author
Collaboration Network Collaboration Network
Website
 
Research Area

Keyword Cloud

Reload 더보기
1

Key alternating ciphers based on involutions

Lee, JooyoungresearcherSPRINGERDESIGNS CODES AND CRYPTOGRAPHY, v.86, no.5, pp.955 - 988, 2018-05

2

Connecting Tweakable and Multi-Key Blockcipher Security

Lee, Jooyoungresearcher; Luykx, Atul; Mennink, Bart; Minematsu, KazuhikoSPRINGERDESIGNS CODES AND CRYPTOGRAPHY, v.86, no.3, pp.623 - 640, 2018-03

3

Indifferentiability of the Sum of Random Permutations Toward Optimal Security

Lee, JooyoungresearcherIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCIEEE TRANSACTIONS ON INFORMATION THEORY, v.63, no.6, pp.4050 - 4054, 2017-06

4

The Security of Tandem-DM in the Ideal Cipher Model

Lee, Jooyoungresearcher; Steinberger, John; Stam, MartijnSPRINGERJOURNAL OF CRYPTOLOGY, v.30, no.2, pp.495 - 518, 2017-04

5

New Constructions of MACs from (Tweakable) Block Ciphers

Cogliati, Benoit; Lee, Jooyoungresearcher; Seurin, YannickRuhr University BochumIACR Transactions on Symmetric Cryptology, v.2017, no.2, pp.27 - 58, 2017-01

6

MJH 해쉬 함수 역상 공격

이주영researcher; 김종성한국정보보호학회정보보호학회논문지, v.26, no.2, pp.315 - 318, 2016-04

7

MJH: a faster alternative to MDC-2

Lee, Jooyoungresearcher; Stam, MartijnSPRINGERDESIGNS CODES AND CRYPTOGRAPHY, v.76, no.2, pp.179 - 205, 2015-08

8

Security of the Misty Structure beyond the Birthday Bound

Lee, JooyoungresearcherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E97A, no.7, pp.1516 - 1522, 2014-07

9

Security of permutation-based compression function lp231

Lee, Jooyoungresearcher; Kwon, DaesungELSEVIER SCIENCE BVINFORMATION PROCESSING LETTERS, v.114, no.7, pp.372 - 381, 2014-07

10

Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation

Lee, Jooyoungresearcher; Steinberger, JohnIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCIEEE TRANSACTIONS ON INFORMATION THEORY, v.58, no.9, pp.6165 - 6182, 2012-09

11

Collision Resistance of the JH Hash Function

Lee, Jooyoungresearcher; Hong, DeukjoIEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INCIEEE TRANSACTIONS ON INFORMATION THEORY, v.58, no.3, pp.1992 - 1995, 2012-03

12

On Lai-Massey and quasi-Feistel ciphers

Yun, Aaram; Park, Je Hong; Lee, JooyoungresearcherSPRINGERDESIGNS CODES AND CRYPTOGRAPHY, v.58, no.1, pp.45 - 72, 2011-01

13

Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model

Lee, Jooyoungresearcher; Park, Je HongIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E94A, no.1, pp.129 - 138, 2011-01

14

The Security of Abreast-DM in the Ideal Cipher Model

Lee, Jooyoungresearcher; Kwon, DaesungIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E94A, no.1, pp.104 - 109, 2011-01

15

Security of the Misty Structure Using Involutions as Round Functions

Lee, Jooyoungresearcher; Koo, BonwookIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENGIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E93A, no.9, pp.1612 - 1619, 2010-09

16

Preimage resistance of LPmkr with r = m-1

Lee, Jooyoungresearcher; Park, Je HongELSEVIER SCIENCE BVINFORMATION PROCESSING LETTERS, v.110, no.14-15, pp.602 - 608, 2010-07

17

IMPERSONATION ATTACK ON THE STRONG IDENTIFICATION BASED ON A HARD-ON-AVERAGE PROBLEM

Koo, Bonwook; Kwon, Daesung; Lee, Jooyoungresearcher; Song, Jung HwanKOREAN MATHEMATICAL SOCBULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, v.47, no.1, pp.63 - 71, 2010-01

18

Tree-based key predistribution for wireless sensor networks

Lee, Jooyoungresearcher; Kwon, DaesungSPRINGERWIRELESS NETWORKS, v.15, no.8, pp.1140 - 1151, 2009-11

19

Efficient RFID authentication protocols based on pseudorandom sequence generators

Lee, Jooyoungresearcher; Yeom, YongjinSPRINGERDESIGNS CODES AND CRYPTOGRAPHY, v.51, no.2, pp.195 - 210, 2009-05

20

On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs

Lee, Jooyoungresearcher; Stinson, Douglas RASSOC COMPUTING MACHINERYACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.11, no.2, 2008-03

Load more items
Loading...

rss_1.0 rss_2.0 atom_1.0