Researcher Page

사진

Lee, Jooyoung (이주영) L-5601-2016

Department
School of Computing(전산학부)
Website
 
Research Area
Computer Science, Secure Computing, Cryptology

Keyword Cloud

Reload 더보기
1

Minimizing the Two-Round Even-Mansour Cipher

Chen, Shan; Lampe, Rodolphe; Lee, Jooyoungresearcher; et al, JOURNAL OF CRYPTOLOGY, v.31, no.4, pp.1064 - 1119, 2018-10

2

Key alternating ciphers based on involutions

Lee, Jooyoungresearcher, DESIGNS CODES AND CRYPTOGRAPHY, v.86, no.5, pp.955 - 988, 2018-05

3

Connecting Tweakable and Multi-Key Blockcipher Security

Lee, Jooyoungresearcher; Luykx, Atul; Mennink, Bart; et al, DESIGNS CODES AND CRYPTOGRAPHY, v.86, no.3, pp.623 - 640, 2018-03

4

Indifferentiability of the Sum of Random Permutations Toward Optimal Security

Lee, Jooyoungresearcher, IEEE TRANSACTIONS ON INFORMATION THEORY, v.63, no.6, pp.4050 - 4054, 2017-06

5

The Security of Tandem-DM in the Ideal Cipher Model

Lee, Jooyoungresearcher; Steinberger, John; Stam, Martijn, JOURNAL OF CRYPTOLOGY, v.30, no.2, pp.495 - 518, 2017-04

6

New Constructions of MACs from (Tweakable) Block Ciphers

Cogliati, Benoit; Lee, Jooyoungresearcher; Seurin, Yannick, IACR Transactions on Symmetric Cryptology, v.2017, no.2, pp.27 - 58, 2017-01

7

MJH 해쉬 함수 역상 공격

이주영researcher; 김종성, 정보보호학회논문지, v.26, no.2, pp.315 - 318, 2016-04

8

MJH: a faster alternative to MDC-2

Lee, Jooyoungresearcher; Stam, Martijn, DESIGNS CODES AND CRYPTOGRAPHY, v.76, no.2, pp.179 - 205, 2015-08

9

Security of the Misty Structure beyond the Birthday Bound

Lee, Jooyoungresearcher, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E97A, no.7, pp.1516 - 1522, 2014-07

10

Security of permutation-based compression function lp231

Lee, Jooyoungresearcher; Kwon, Daesung, INFORMATION PROCESSING LETTERS, v.114, no.7, pp.372 - 381, 2014-07

11

Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation

Lee, Jooyoungresearcher; Steinberger, John, IEEE TRANSACTIONS ON INFORMATION THEORY, v.58, no.9, pp.6165 - 6182, 2012-09

12

Collision Resistance of the JH Hash Function

Lee, Jooyoungresearcher; Hong, Deukjo, IEEE TRANSACTIONS ON INFORMATION THEORY, v.58, no.3, pp.1992 - 1995, 2012-03

13

The Security of Abreast-DM in the Ideal Cipher Model

Lee, Jooyoungresearcher; Kwon, Daesung, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E94A, no.1, pp.104 - 109, 2011-01

14

Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model

Lee, Jooyoungresearcher; Park, Je Hong, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E94A, no.1, pp.129 - 138, 2011-01

15

On Lai-Massey and quasi-Feistel ciphers

Yun, Aaram; Park, Je Hong; Lee, Jooyoungresearcher, DESIGNS CODES AND CRYPTOGRAPHY, v.58, no.1, pp.45 - 72, 2011-01

16

Security of the Misty Structure Using Involutions as Round Functions

Lee, Jooyoungresearcher; Koo, Bonwook, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E93A, no.9, pp.1612 - 1619, 2010-09

17

Preimage resistance of LPmkr with r = m-1

Lee, Jooyoungresearcher; Park, Je Hong, INFORMATION PROCESSING LETTERS, v.110, no.14-15, pp.602 - 608, 2010-07

18

IMPERSONATION ATTACK ON THE STRONG IDENTIFICATION BASED ON A HARD-ON-AVERAGE PROBLEM

Koo, Bonwook; Kwon, Daesung; Lee, Jooyoungresearcher; et al, BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, v.47, no.1, pp.63 - 71, 2010-01

19

Tree-based key predistribution for wireless sensor networks

Lee, Jooyoungresearcher; Kwon, Daesung, WIRELESS NETWORKS, v.15, no.8, pp.1140 - 1151, 2009-11

20

Efficient RFID authentication protocols based on pseudorandom sequence generators

Lee, Jooyoungresearcher; Yeom, Yongjin, DESIGNS CODES AND CRYPTOGRAPHY, v.51, no.2, pp.195 - 210, 2009-05

Load more items
Loading...

rss_1.0 rss_2.0 atom_1.0