Wonil Lee

According to our database1, Wonil Lee authored at least 29 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A statistical verification method of random permutations for hiding countermeasure against side-channel attacks.
J. Inf. Secur. Appl., 2024

A Compact and Parallel Swap-Based Shuffler based on butterfly Network and its complexity against Side Channel Analysis.
IACR Cryptol. ePrint Arch., 2024

Sparsity Constrained Linear Tangent Space Alignment Model (LTSA) for 3d Cardiac Extracellular Volume Mapping.
Proceedings of the IEEE International Symposium on Biomedical Imaging, 2024

2023
Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure in Post-Quantum Cryptography.
IACR Cryptol. ePrint Arch., 2023

2007
Poster: Scalable Service-Oriented Telemetry Acquisition and Distribution.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Architecture and Performance of a Scalable Telemetry Acquisition and Distribution Infrastructure.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

2006
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.
J. Cryptol., 2006

An Event Detection Service for Spatio-temporal Applications.
Proceedings of the Web and Wireless Geographical Information Systems, 2006

Services-Oriented Computing in a Ubiquitous Computing Platform.
Proceedings of the Service-Oriented Computing, 2006

Telematics Applications Based On TOPAZ Platform.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Construction of UOWHF: Two New Parallel Methods.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

2004
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model.
IACR Cryptol. ePrint Arch., 2004

Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA.
Proceedings of the Progress in Cryptology, 2004

On the Pseudorandomness of a Modification of KASUMI Type Permutations.
Proceedings of the Information Security and Cryptology, 2004

Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

Pseudorandomness of SPN-Type Transformations.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Differential Cryptanalysis of TEA and XTEA.
Proceedings of the Information Security and Cryptology, 2003

New Parallel Domain Extenders for UOWHF.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

Saturation Attacks on Reduced Round Skipjack.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

Amplified Boomerang Attack against Reduced-Round SHACAL.
Proceedings of the Advances in Cryptology, 2002

2001
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation.
Proceedings of the Information Security and Cryptology, 2001

Known-IV Attacks on Triple Modes of Operation of Block Ciphers.
Proceedings of the Advances in Cryptology, 2001

1998
Unlimited Vocabulary Grapheme to Phoneme Conversion for Korean TTS.
Proceedings of the 36th Annual Meeting of the Association for Computational Linguistics and 17th International Conference on Computational Linguistics, 1998

1996
Phonological modeling for continuous speech recognition in Korean
CoRR, 1996

1995
Chart-driven Connectionist Categorial Parsing of Spoken Korean.
CoRR, 1995

1994
Table-driven Neural Syntactic Analysis of Spoken Korean.
Proceedings of the 15th International Conference on Computational Linguistics, 1994


  Loading...