Namhun Koo
Orcid: 0000-0003-1678-8480
According to our database1,
Namhun Koo
authored at least 32 papers
between 2011 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
1
2
5
7
3
2
1
1
1
2
1
3
1
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
On the functions which are CCZ-equivalent but not EA-equivalent to quadratic functions over Fpn.
Finite Fields Their Appl., 2025
2024
The second-order zero differential uniformity of the swapped inverse functions over finite fields.
CoRR, 2024
IEEE Access, 2024
2023
Discret. Appl. Math., September, 2023
Investigations of <i>c</i>-differential uniformity of permutations with Carlitz rank 3.
Finite Fields Their Appl., February, 2023
Finite Fields Their Appl., 2023
On the Functions Which are CCZ-equivalent but not EA-equivalent to Quadratic Functions over F<sub>p<sup>n</sup></sub>.
CoRR, 2023
CoRR, 2023
2022
On Cryptographic Parameters of Permutation Polynomials of the form <i>x<sup>r</sup>h</i>(<i>x</i><sup>(2<i><sup>n</sup></i>-1)/<i>d</i></sup>).
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., August, 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Finite Fields Their Appl., 2022
Finite Fields Their Appl., 2022
New differentially 4-uniform permutations from modifications of the inverse function.
Finite Fields Their Appl., 2022
CoRR, 2022
CoRR, 2022
2020
Algebraic Fault Analysis of UOV and Rainbow With the Leakage of Random Vinegar Values.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Internet Things J., 2020
2019
On cryptographic parameters of permutation polynomials of the form x<sup>rh(x<sup>(q-1)/d</sup>)</sup>.
IACR Cryptol. ePrint Arch., 2019
Appl. Algebra Eng. Commun. Comput., 2019
2018
Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations - Rainbow and UOV -.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
2017
Finite Fields Their Appl., 2017
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
An Existential Unforgeable Signature Scheme Based on Multivariate Quadratic Equations.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
On r-th Root Extraction Algorithm in 𝔽<sub>q</sub> for q≍lr<sup>s</sup>+1;(mod; r<sup>s+1</sup>) with 0<l<r and Small s.
IEEE Trans. Computers, 2016
2015
New cube root algorithm based on the third order linear recurrence relations in finite fields.
Des. Codes Cryptogr., 2015
2014
IACR Cryptol. ePrint Arch., 2014
2013
IACR Cryptol. ePrint Arch., 2013
New Cube Root Algorithm Based on Third Order Linear Recurrence Relation in Finite Field.
IACR Cryptol. ePrint Arch., 2013
2011
On Nonlinear Polynomial Selection and Geometric Progression (mod N) for Number Field Sieve.
IACR Cryptol. ePrint Arch., 2011