Daesung Kwon

According to our database1, Daesung Kwon authored at least 35 papers between 2001 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Improving MDC-4 to Be More Secure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Revised Version of Block Cipher CHAM.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

2018
Winternitz Signature Scheme Using Nonadjacent Forms.
Secur. Commun. Networks, 2018

2017
The ARIA Algorithm and Its Use with the Secure Real-Time Transport Protocol (SRTP).
RFC, October, 2017

Quantum identity authentication with single photon.
Quantum Inf. Process., 2017

CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

2016
Improved preimage attacks on hash modes of 8-round AES-256.
Multim. Tools Appl., 2016

2014
Converting random bits into random numbers.
J. Supercomput., 2014

Efficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA.
Sensors, 2014

Security of permutation-based compression function Ip231.
Inf. Process. Lett., 2014

Cryptanalysis of Double-Block-Length Hash Modes MDC-4 and MJH.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

LSH: A New Fast Secure Hash Function Family.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

2013
Security Weakness in the Smart Grid Key Distribution Scheme Proposed by Xia and Wang.
IEEE Trans. Smart Grid, 2013

Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with n-Bit Block and n-Bit Key.
IACR Cryptol. ePrint Arch., 2013

LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors.
Proceedings of the Information Security Applications - 14th International Workshop, 2013

2012
Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Known-Key Attacks on Generalized Feistel Schemes with SP Round Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Cryptanalysis of Double-Block-Length Hash Mode MJH.
IACR Cryptol. ePrint Arch., 2012

New Preimage Attack on MDC-4.
IACR Cryptol. ePrint Arch., 2012

2011
Addition of the ARIA Cipher Suites to Transport Layer Security (TLS).
RFC, April, 2011

The Security of Abreast-DM in the Ideal Cipher Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Biclique Attack on the Full HIGHT.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2010
A Description of the ARIA Encryption Algorithm.
RFC, March, 2010

Related-Key Attack on the Full HIGHT.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

2009
Tree-based key predistribution for wireless sensor networks.
Wirel. Networks, 2009

Security of Single-permutation-based Compression Functions.
IACR Cryptol. ePrint Arch., 2009

Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards.
Comput. Stand. Interfaces, 2009

Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash.
Proceedings of the Information, Security and Cryptology, 2009

2006
Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2004
New Method for Bounding the Maximum Differential Probability for SPNs and ARIA.
Proceedings of the Information Security and Cryptology, 2004

On the Security of MOR Public Key Cryptosystem.
Proceedings of the Advances in Cryptology, 2004

2003
New Block Cipher: ARIA.
Proceedings of the Information Security and Cryptology, 2003

2002
Key recovery attacks on NTRU without ciphertext validation routine.
IACR Cryptol. ePrint Arch., 2002

2001
Improved Public Key Cryptosystem using Finite non Abelian Groups.
IACR Cryptol. ePrint Arch., 2001


  Loading...