Researcher Page

사진
Lee, Jooyoung (이주영)
부교수, School of Computing(전산학부)
Research Area
Computer Science, Secure Computing, Cryptology
Co-researchers
    Similar researchers

    Keyword Cloud

    Reload 더보기
    NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
    1
    Minimizing the Two-Round Even-Mansour Cipher

    Chen, Shan; Lampe, Rodolphe; Lee, Jooyoungresearcher; et al, JOURNAL OF CRYPTOLOGY, v.31, no.4, pp.1064 - 1119, 2018-10

    2
    Key alternating ciphers based on involutions

    Lee, Jooyoungresearcher, DESIGNS CODES AND CRYPTOGRAPHY, v.86, no.5, pp.955 - 988, 2018-05

    3
    Connecting Tweakable and Multi-Key Blockcipher Security

    Lee, Jooyoungresearcher; Luykx, Atul; Mennink, Bart; et al, DESIGNS CODES AND CRYPTOGRAPHY, v.86, no.3, pp.623 - 640, 2018-03

    4
    Indifferentiability of the Sum of Random Permutations Toward Optimal Security

    Lee, Jooyoungresearcher, IEEE TRANSACTIONS ON INFORMATION THEORY, v.63, no.6, pp.4050 - 4054, 2017-06

    5
    The Security of Tandem-DM in the Ideal Cipher Model

    Lee, Jooyoungresearcher; Steinberger, John; Stam, Martijn, JOURNAL OF CRYPTOLOGY, v.30, no.2, pp.495 - 518, 2017-04

    6
    New Constructions of MACs from (Tweakable) Block Ciphers

    Cogliati, Benoit; Lee, Jooyoungresearcher; Seurin, Yannick, IACR Transactions on Symmetric Cryptology, v.2017, no.2, pp.27 - 58, 2017-01

    7
    MJH 해쉬 함수 역상 공격

    이주영researcher; 김종성, 정보보호학회논문지, v.26, no.2, pp.315 - 318, 2016-04

    8
    MJH: a faster alternative to MDC-2

    Lee, Jooyoungresearcher; Stam, Martijn, DESIGNS CODES AND CRYPTOGRAPHY, v.76, no.2, pp.179 - 205, 2015-08

    9
    Security of the Misty Structure beyond the Birthday Bound

    Lee, Jooyoungresearcher, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E97A, no.7, pp.1516 - 1522, 2014-07

    10
    Security of permutation-based compression function lp231

    Lee, Jooyoungresearcher; Kwon, Daesung, INFORMATION PROCESSING LETTERS, v.114, no.7, pp.372 - 381, 2014-07

    11
    Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation

    Lee, Jooyoungresearcher; Steinberger, John, IEEE TRANSACTIONS ON INFORMATION THEORY, v.58, no.9, pp.6165 - 6182, 2012-09

    12
    Collision Resistance of the JH Hash Function

    Lee, Jooyoungresearcher; Hong, Deukjo, IEEE TRANSACTIONS ON INFORMATION THEORY, v.58, no.3, pp.1992 - 1995, 2012-03

    13
    The Security of Abreast-DM in the Ideal Cipher Model

    Lee, Jooyoungresearcher; Kwon, Daesung, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E94A, no.1, pp.104 - 109, 2011-01

    14
    Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model

    Lee, Jooyoungresearcher; Park, Je Hong, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E94A, no.1, pp.129 - 138, 2011-01

    15
    On Lai-Massey and quasi-Feistel ciphers

    Yun, Aaram; Park, Je Hong; Lee, Jooyoungresearcher, DESIGNS CODES AND CRYPTOGRAPHY, v.58, no.1, pp.45 - 72, 2011-01

    16
    Security of the Misty Structure Using Involutions as Round Functions

    Lee, Jooyoungresearcher; Koo, Bonwook, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E93A, no.9, pp.1612 - 1619, 2010-09

    17
    Preimage resistance of LPmkr with r = m-1

    Lee, Jooyoungresearcher; Park, Je Hong, INFORMATION PROCESSING LETTERS, v.110, no.14-15, pp.602 - 608, 2010-07

    18
    IMPERSONATION ATTACK ON THE STRONG IDENTIFICATION BASED ON A HARD-ON-AVERAGE PROBLEM

    Koo, Bonwook; Kwon, Daesung; Lee, Jooyoungresearcher; et al, BULLETIN OF THE KOREAN MATHEMATICAL SOCIETY, v.47, no.1, pp.63 - 71, 2010-01

    19
    Tree-based key predistribution for wireless sensor networks

    Lee, Jooyoungresearcher; Kwon, Daesung, WIRELESS NETWORKS, v.15, no.8, pp.1140 - 1151, 2009-11

    20
    Efficient RFID authentication protocols based on pseudorandom sequence generators

    Lee, Jooyoungresearcher; Yeom, Yongjin, DESIGNS CODES AND CRYPTOGRAPHY, v.51, no.2, pp.195 - 210, 2009-05

    Load more items
    Loading...

    rss_1.0 rss_2.0 atom_1.0