default search action
Daesung Kwon
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j14]Deukjo Hong, Dong-Chan Kim, Daesung Kwon:
Improving MDC-4 to Be More Secure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 278-289 (2019) - [c13]Dongyoung Roh, Bonwook Koo, Younghoon Jung, Ilwoong Jeong, Donggeon Lee, Daesung Kwon, Woo-Hwan Kim:
Revised Version of Block Cipher CHAM. ICISC 2019: 1-19 - 2018
- [j13]Dongyoung Roh, Sangim Jung, Daesung Kwon:
Winternitz Signature Scheme Using Nonadjacent Forms. Secur. Commun. Networks 2018: 1452457:1-1452457:12 (2018) - 2017
- [j12]Chang-ho Hong, Jino Heo, Jin Gak Jang, Daesung Kwon:
Quantum identity authentication with single photon. Quantum Inf. Process. 16(10): 236 (2017) - [c12]Bonwook Koo, Dongyoung Roh, Hyeonjin Kim, Younghoon Jung, Donggeon Lee, Daesung Kwon:
CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices. ICISC 2017: 3-25 - [i10]Woo-Hwan Kim, Jung-Keun Lee, Je Hong Park, Daesung Kwon, Dong-Chan Kim:
The ARIA Algorithm and Its Use with the Secure Real-Time Transport Protocol (SRTP). RFC 8269: 1-19 (2017) - 2016
- [j11]Deukjo Hong, Dong-Chan Kim, Daesung Kwon, Jongsung Kim:
Improved preimage attacks on hash modes of 8-round AES-256. Multim. Tools Appl. 75(22): 14525-14539 (2016) - 2014
- [j10]Deukjo Hong, Daesung Kwon:
Cryptanalysis of Double-Block-Length Hash Modes MDC-4 and MJH. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(8): 1747-1753 (2014) - [j9]Jooyoung Lee, Daesung Kwon:
Security of permutation-based compression function Ip231. Inf. Process. Lett. 114(7): 372-381 (2014) - [j8]Donggeon Lee, Dong-Chan Kim, Daesung Kwon, Howon Kim:
Efficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA. Sensors 14(1): 975-994 (2014) - [j7]Bonwook Koo, Dongyoung Roh, Daesung Kwon:
Converting random bits into random numbers. J. Supercomput. 70(1): 236-246 (2014) - [c11]Jung-Keun Lee, Bonwook Koo, Dongyoung Roh, Woo-Hwan Kim, Daesung Kwon:
Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers. ICISC 2014: 132-159 - [c10]Dong-Chan Kim, Deukjo Hong, Jung-Keun Lee, Woo-Hwan Kim, Daesung Kwon:
LSH: A New Fast Secure Hash Function Family. ICISC 2014: 286-313 - 2013
- [j6]Je Hong Park, Minkyu Kim, Daesung Kwon:
Security Weakness in the Smart Grid Key Distribution Scheme Proposed by Xia and Wang. IEEE Trans. Smart Grid 4(3): 1613-1614 (2013) - [c9]Deukjo Hong, Jung-Keun Lee, Dong-Chan Kim, Daesung Kwon, Kwon Ho Ryu, Donggeon Lee:
LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors. WISA 2013: 3-27 - [e1]Taekyoung Kwon, Mun-Kyu Lee, Daesung Kwon:
Information Security and Cryptology - ICISC 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7839, Springer 2013, ISBN 978-3-642-37681-8 [contents] - [i9]Deukjo Hong, Daesung Kwon:
Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with n-Bit Block and n-Bit Key. IACR Cryptol. ePrint Arch. 2013: 174 (2013) - 2012
- [j5]Dukjae Moon, Deukjo Hong, Daesung Kwon, Seokhie Hong:
Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(8): 1379-1389 (2012) - [j4]HyungChul Kang, Deukjo Hong, Dukjae Moon, Daesung Kwon, Jaechul Sung, Seokhie Hong:
Known-Key Attacks on Generalized Feistel Schemes with SP Round Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(9): 1550-1560 (2012) - [i8]Deukjo Hong, Daesung Kwon:
New Preimage Attack on MDC-4. IACR Cryptol. ePrint Arch. 2012: 633 (2012) - [i7]Deukjo Hong, Daesung Kwon:
Cryptanalysis of Double-Block-Length Hash Mode MJH. IACR Cryptol. ePrint Arch. 2012: 634 (2012) - 2011
- [j3]Jooyoung Lee, Daesung Kwon:
The Security of Abreast-DM in the Ideal Cipher Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 104-109 (2011) - [c8]Deukjo Hong, Bonwook Koo, Daesung Kwon:
Biclique Attack on the Full HIGHT. ICISC 2011: 365-374 - [i6]Woo-Hwan Kim, Jung-Keun Lee, Je Hong Park, Daesung Kwon:
Addition of the ARIA Cipher Suites to Transport Layer Security (TLS). RFC 6209: 1-9 (2011) - 2010
- [c7]Bonwook Koo, Deukjo Hong, Daesung Kwon:
Related-Key Attack on the Full HIGHT. ICISC 2010: 49-67 - [i5]Jung-Keun Lee, Jooyoung Lee, Jaeheon Kim, Daesung Kwon, Choon-Soo Kim:
A Description of the ARIA Encryption Algorithm. RFC 5794: 1-18 (2010)
2000 – 2009
- 2009
- [j2]Daewan Han, Daesung Kwon:
Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards. Comput. Stand. Interfaces 31(4): 648-652 (2009) - [j1]Jooyoung Lee, Daesung Kwon:
Tree-based key predistribution for wireless sensor networks. Wirel. Networks 15(8): 1140-1151 (2009) - [c6]Deukjo Hong, Bonwook Koo, Woo-Hwan Kim, Daesung Kwon:
Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash. ICISC 2009: 315-331 - [i4]Jooyoung Lee, Daesung Kwon:
Security of Single-permutation-based Compression Functions. IACR Cryptol. ePrint Arch. 2009: 145 (2009) - [i3]Jooyoung Lee, Daesung Kwon:
The Security of Abreast-DM in the Ideal Cipher Model. IACR Cryptol. ePrint Arch. 2009: 225 (2009) - 2006
- [c5]Daesung Kwon, Daewan Han, Jooyoung Lee, Yongjin Yeom:
Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005. EUC Workshops 2006: 262-270 - 2004
- [c4]In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nahm, Nam-Seok Kwak, Yoo-Jin Baek:
On the Security of MOR Public Key Cryptosystem. ASIACRYPT 2004: 387-400 - [c3]Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim:
New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. ICISC 2004: 21-32 - 2003
- [c2]Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon:
Key Recovery Attacks on NTRU without Ciphertext Validation Routine. ACISP 2003: 274-284 - [c1]Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong:
New Block Cipher: ARIA. ICISC 2003: 432-445 - 2002
- [i2]Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon:
Key recovery attacks on NTRU without ciphertext validation routine. IACR Cryptol. ePrint Arch. 2002: 188 (2002) - 2001
- [i1]Seong-Hun Paeng, Daesung Kwon, Kil-Chan Ha, Jae Heon Kim:
Improved Public Key Cryptosystem using Finite non Abelian Groups. IACR Cryptol. ePrint Arch. 2001: 66 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint