Deukjo Hong
Orcid: 0000-0002-0998-2958
According to our database1,
Deukjo Hong
authored at least 56 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Accurate False-Positive Probability of Multiset-Based Demirci-Selçuk Meet-in-the-Middle Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
Revisiting the Multiple-of Property for SKINNY: The Exact Computation of the Number of Right Pairs.
IEEE Access, 2024
2023
Shining Light on the Shadow: Full-round Practical Distinguisher for Lightweight Block Cipher Shadow.
IACR Cryptol. ePrint Arch., 2023
IEEE Access, 2023
2022
IACR Trans. Symmetric Cryptol., 2022
IACR Cryptol. ePrint Arch., 2022
2021
A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application.
IEEE Access, 2021
2020
Secur. Commun. Networks, 2020
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020
2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
2016
Multim. Tools Appl., 2016
IACR Cryptol. ePrint Arch., 2016
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
2013
Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with n-Bit Block and n-Bit Key.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Information Security Applications - 14th International Workshop, 2013
2012
Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
2009
Proceedings of the Information, Security and Cryptology, 2009
Proceedings of the Information, Security and Cryptology, 2009
2008
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
2007
Inf. Process. Lett., 2007
2006
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.
J. Cryptol., 2006
Proceedings of the Progressin Cryptology, 2006
Proceedings of the Progressin Cryptology, 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Proceedings of the Progress in Cryptology, 2005
2004
Int. J. Algebra Comput., 2004
Proceedings of the Advances in Cryptology, 2004
2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
2001
Proceedings of the Advances in Cryptology, 2001