Ju-Sung Kang
Orcid: 0000-0002-0846-389X
According to our database1,
Ju-Sung Kang
authored at least 24 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IPCC7: Post-Quantum Encryption Scheme Based on a Perfect Dominating Set in 3-Regular Graph.
IEEE Access, 2024
2023
Practical Entropy Accumulation for Random Number Generators with Image Sensor-Based Quantum Noise Sources.
Entropy, July, 2023
2019
Secur. Commun. Networks, 2019
IEEE Access, 2019
2018
Discret. Appl. Math., 2018
2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
2016
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016
2014
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
2012
Practical Multi-party Versions of Private Set Intersection Protocols with Hardware Tokens.
Proceedings of the Computer Applications for Communication, Networking, and Digital Contents, 2012
2011
Proceedings of the Security Technology, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
2007
A Practical Privacy-Preserving Cooperative Computation Protocol without Oblivious Transfer for Linear Systems of Equations.
J. Inf. Process. Syst., 2007
2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
2005
IEEE Commun. Lett., 2005
2004
Inf. Process. Lett., 2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures.
Proceedings of the Information Security and Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
1999
On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis.
Proceedings of the Information Security and Cryptology, 1999