Jaechul Sung
Orcid: 0000-0002-8681-4106
According to our database1,
Jaechul Sung
authored at least 72 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Accurate False-Positive Probability of Multiset-Based Demirci-Selçuk Meet-in-the-Middle Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
Revisiting the Multiple-of Property for SKINNY: The Exact Computation of the Number of Right Pairs.
IEEE Access, 2024
2023
Shining Light on the Shadow: Full-round Practical Distinguisher for Lightweight Block Cipher Shadow.
IACR Cryptol. ePrint Arch., 2023
2022
IACR Trans. Symmetric Cryptol., 2022
2021
A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application.
IEEE Access, 2021
2020
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020
2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
2016
IACR Cryptol. ePrint Arch., 2016
2015
Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis.
Peer-to-Peer Netw. Appl., 2015
The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks.
Entropy, 2015
2014
Int. J. Distributed Sens. Networks, 2014
2013
J. Appl. Math., 2013
Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks.
Int. J. Distributed Sens. Networks, 2013
IACR Cryptol. ePrint Arch., 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IACR Cryptol. ePrint Arch., 2012
2011
Des. Codes Cryptogr., 2011
Cryptanalysis of CIKS-128 and CIKS-128H Suitable for Intelligent Multimedia and Ubiquitous Computing Systems.
Comput. Informatics, 2011
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011
2010
Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems.
Telecommun. Syst., 2010
IACR Cryptol. ePrint Arch., 2010
2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
2008
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IACR Cryptol. ePrint Arch., 2008
Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension.
IACR Cryptol. ePrint Arch., 2008
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
Inf. Process. Lett., 2007
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.
J. Cryptol., 2006
Proceedings of the Progressin Cryptology, 2006
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
Proceedings of the WEWoRC 2005, 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Cryptography and Coding, 2005
Proceedings of the Computational Science and Its Applications, 2005
2004
Proceedings of the Progress in Cryptology, 2004
Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA.
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Information Security and Cryptology, 2004
2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98.
Proceedings of the Selected Areas in Cryptography, 2002
2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis.
Proceedings of the Advances in Cryptology, 2000