Jongsung Kim
Orcid: 0000-0002-2608-8878
According to our database1,
Jongsung Kim
authored at least 131 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., October, 2024
IEEE Trans. Computers, August, 2024
Forensic Sci. Int. Digit. Investig., 2024
A study on vulnerability of the Wickr login system in windows from a live forensics perspective.
Comput. Secur., 2024
2023
Forensic Sci. Int. Digit. Investig., December, 2023
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
2022
Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions.
Quantum Inf. Process., 2022
J. Inf. Secur. Appl., 2022
A reused key attack on an encrypted mobile app database: Case study on KakaoTalk and ProtonMail.
J. Inf. Secur. Appl., 2022
IACR Cryptol. ePrint Arch., 2022
Digit. Investig., 2022
Methods for recovering deleted data from the Realm database: Case study on Minitalk and Xabber.
Digit. Investig., 2022
Cryptogr. Commun., 2022
Speeding Up LAT: Generating a Linear Approximation Table Using a Bitsliced Implementation.
IEEE Access, 2022
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
2021
Corrigendum to "Decrypting password-based encrypted backup data for Huawei smartphones" [Digital Investigation 28 (2019) 200890].
Digit. Investig., 2021
A study on LG content lock and data acquisition from apps based on content lock function.
Digit. Investig., 2021
Forensic analysis of instant messaging apps: Decrypting Wickr and private text messaging data.
Digit. Investig., 2021
Methods for decrypting the data encrypted by the latest Samsung smartphone backup programs in Windows and macOS.
Digit. Investig., 2021
Corrigendum to "Data acquisition methods using backup data decryption of sony smartphones" [Foren. Sci. Int: Digital Investigation 31 (2019) 200890].
Digit. Investig., 2021
A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application.
IEEE Access, 2021
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021
2020
Weaknesses of some lightweight blockciphers suitable for IoT systems and their applications in hash modes.
Peer-to-Peer Netw. Appl., 2020
Peer-to-Peer Netw. Appl., 2020
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system.
Digit. Investig., 2020
A study on the decryption methods of telegram X and BBM-Enterprise databases in mobile and PC.
Digit. Investig., 2020
Special Issue on Soft Computing for Network and System Security of Internet of Everything.
Appl. Soft Comput., 2020
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020
2019
Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security.
Multim. Tools Appl., 2019
Digit. Investig., 2019
Digit. Investig., 2019
2018
J. Supercomput., 2018
Digit. Investig., 2018
2017
Special Issue: Advanced Technologies and Applications for Future Wireless and Mobile Communication Systems.
Wirel. Pers. Commun., 2017
2016
Miniaturized and Wireless Optical Neurotransmitter Sensor for Real-Time Monitoring of Dopamine in the Brain.
Sensors, 2016
Multim. Tools Appl., 2016
Introduction to the special section on pervasive device and communications technologies for beyond IoT and CPS.
Comput. Electr. Eng., 2016
2015
Peer-to-Peer Netw. Appl., 2015
A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments.
Multim. Tools Appl., 2015
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
2014
An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks.
J. Supercomput., 2014
Soil Phosphorus and Nitrogen Predictions Across Spatial Escalating Scales in an Aquatic Ecosystem Using Remote Sensing Images.
IEEE Trans. Geosci. Remote. Sens., 2014
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher.
Theor. Comput. Sci., 2014
J. Intell. Manuf., 2014
Advanced Convergence Technologies and Practices for Wireless Ad Hoc and Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
Environ. Model. Softw., 2014
Correlating messages from multiple IM networks to identify digital forensic artifacts.
Electron. Commer. Res., 2014
Electron. Commer. Res., 2014
Comput. J., 2014
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014
Robust Surface Pattern Matching for Ball Spin Estimation with Multi-exposed Images Under Varying Illumination Conditions.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014
2013
ELACCA: Efficient Learning Automata Based Cell Clustering Algorithm for Wireless Sensor Networks.
Wirel. Pers. Commun., 2013
Wirel. Pers. Commun., 2013
Telecommun. Syst., 2013
ACM Trans. Embed. Comput. Syst., 2013
Pers. Ubiquitous Comput., 2013
On the security of the block cipher GOST suitable for the protection in U-business services.
Pers. Ubiquitous Comput., 2013
Probabilistic trust aware data replica placement strategy for online video streaming applications in vehicular delay tolerant networks.
Math. Comput. Model., 2013
Int. J. Comput. Math., 2013
The effects of relationship benefit on relationship quality and store loyalty from convergence environments - NPS analysis and moderating effects.
Electron. Commer. Res., 2013
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013
2012
IEEE Trans. Inf. Theory, 2012
Simul., 2012
Study on the security of the extended version for the ISO/IEC international standardized block cipher SEED.
Secur. Commun. Networks, 2012
Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system.
Multim. Tools Appl., 2012
Math. Comput. Model., 2012
IET Inf. Secur., 2012
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012
Performance Analysis of Zone Based Routing by Varying Radius of Zone Using Ant Colony in MANET.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
2011
Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents.
Wirel. Pers. Commun., 2011
Int. J. Internet Protoc. Technol., 2011
Des. Codes Cryptogr., 2011
Cryptanalysis of CIKS-128 and CIKS-128H Suitable for Intelligent Multimedia and Ubiquitous Computing Systems.
Comput. Informatics, 2011
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011
2010
Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems.
Telecommun. Syst., 2010
Comput. Math. Appl., 2010
2009
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments.
J. Univers. Comput. Sci., 2009
Cryptologia, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009
2008
Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IACR Cryptol. ePrint Arch., 2008
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1.
Proceedings of the Topics in Cryptology, 2008
2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms.
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract).
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Progress in Cryptology, 2006
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the WEWoRC 2005, 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Cryptography and Coding, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Information Security and Cryptology, 2003
2002
Proceedings of the Advances in Cryptology, 2002
1997
Distributed Syst. Eng., 1997