default search action
Changhoon Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j81]Hyejin Eom, Minjeong Cho, Changhoon Lee:
Conditional Cube Attack on Lightweight Sycon-AEAD-64. IEEE Internet Things J. 11(7): 11652-11662 (2024) - [i5]Jihoon Cho, Changhoon Lee, Eunkyung Kim, Jieun Lee, Beumjin Cho:
Software-Defined Cryptography: A Design Feature of Cryptographic Agility. CoRR abs/2404.01808 (2024) - [i4]Jihoon Cho, Changhoon Lee, Eunkyung Kim, Jieun Lee, Beumjin Cho:
Software-Defined Cryptography: A Design Feature of Cryptographic Agility. IACR Cryptol. ePrint Arch. 2024: 518 (2024) - 2023
- [j80]Seunghee Seo, Byoungjin Seok, Changhoon Lee:
Digital forensic investigation framework for the metaverse. J. Supercomput. 79(9): 9467-9485 (2023) - [c30]Changhoon Lee, Minjae Song, Kyungha Min, EunGyeom Ha, JunHa Lee, Wooju Kim:
Optimization of Cloud Computing Workload Prediction Model with Domain-based Feature Selection Method. ICAIIC 2023: 868-871 - [c29]Changhoon Lee, Eunsoo Ko, Minjae Song, Hoyeong Yun, Wooju Kim:
Partial Granger causality-based feature selection algorithm for workload prediction in cloud systems. ICTC 2023: 81-86 - [i3]Jun Park, Changhoon Lee:
TPTNet: A Data-Driven Temperature Prediction Model Based on Turbulent Potential Temperature. CoRR abs/2312.14980 (2023) - 2022
- [j79]Sushil Kumar Singh, Changhoon Lee, Jong Hyuk Park:
CoVAC: A P2P smart contract-based intelligent smart city architecture for vaccine manufacturing. Comput. Ind. Eng. 166: 107967 (2022) - 2021
- [j78]Dat Phuc Tran Song, Yong-Hyeon Shin, Changhoon Lee:
Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks. KSII Trans. Internet Inf. Syst. 15(6): 2148-2167 (2021) - [i2]Jongsu Kim, Changhoon Lee:
Deep Particulate Matter Forecasting Model Using Correntropy-Induced Loss. CoRR abs/2106.03032 (2021) - 2020
- [j77]Dat Phuc Tran Song, Byoungjin Seok, Changhoon Lee:
HANMRE - An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches. Appl. Soft Comput. 97(Part): 106663 (2020) - [j76]Junhyuk Kim, Changhoon Lee:
Deep unsupervised learning of turbulence for inflow generation at various Reynolds numbers. J. Comput. Phys. 406: 109216 (2020) - [j75]SungJin Kim, Jaeik Cho, Changhoon Lee, Taeshik Shon:
Smart seed selection-based effective black box fuzzing for IIoT protocol. J. Supercomput. 76(12): 10140-10154 (2020)
2010 – 2019
- 2019
- [j74]Chunxue Wu, Langfeng Li, Changwei Peng, Yan Wu, Naixue Xiong, Changhoon Lee:
Design and analysis of an effective graphics collaborative editing system. EURASIP J. Image Video Process. 2019: 50 (2019) - [j73]Byoungjin Seok, Changhoon Lee:
Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor. Int. J. Distributed Sens. Networks 15(9) (2019) - [c28]Changhoon Lee, Yongjin Park, Jae-Hyeon Ahn:
Early-Bird or Last-Minute? The Impact of Mobile Channel Adoption on Purchasing Behavior. ICIS 2019 - 2018
- [j72]Haoqi Liu, Changhoon Lee, Mingming Han, Zhongbin Su, Varshinee Anu Padigala, Weizheng Shen:
Information-based management mode based on value network analysis for livestock enterprises. Enterp. Inf. Syst. 12(1): 36-53 (2018) - [j71]Neal N. Xiong, Yang Shen, Kangye Yang, Changhoon Lee, Chunxue Wu:
Color sensors and their applications based on real-time color image segmentation for cyber physical systems. EURASIP J. Image Video Process. 2018: 23 (2018) - [j70]Xiaomin Pan, Changhoon Lee, Jung-Il Choi:
Efficient monolithic projection method for time-dependent conjugate heat transfer problems. J. Comput. Phys. 369: 191-208 (2018) - [j69]Liping Gao, Dongfang Gao, Naixue Xiong, Changhoon Lee:
CoWebDraw: a real-time collaborative graphical editing system supporting multi-clients based on HTML5. Multim. Tools Appl. 77(4): 5067-5082 (2018) - [j68]Dat Phuc Tran Song, Changhoon Lee:
Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets. Symmetry 10(8): 353 (2018) - [j67]Seonghyeon Gong, Jaeik Cho, Changhoon Lee:
A Reliability Comparison Method for OSINT Validity Analysis. IEEE Trans. Ind. Informatics 14(12): 5428-5435 (2018) - 2017
- [j66]Shehzad Ashraf Chaudhry, Aiiad Albeshri, Naixue Xiong, Changhoon Lee, Taeshik Shon:
A privacy preserving authentication scheme for roaming in ubiquitous networks. Clust. Comput. 20(2): 1223-1236 (2017) - [j65]Jin-Lee Lee, Doo-Ho Park, Changhoon Lee:
Feature Selection Algorithm for Intrusions Detection System using Sequential Forward Search and Random Forest Classifier. KSII Trans. Internet Inf. Syst. 11(10): 5132-5148 (2017) - [j64]Xiaomin Pan, Kyoungyoun Kim, Changhoon Lee, Jung-Il Choi:
Fully decoupled monolithic projection method for natural convection problems. J. Comput. Phys. 334: 582-606 (2017) - [j63]Juwon Jang, Changhoon Lee:
An immersed boundary method for nonuniform grids. J. Comput. Phys. 341: 1-12 (2017) - [j62]Feng Jiang, Jie Ren, Changhoon Lee, Wuzhen Shi, Shaohui Liu, Debin Zhao:
Spatial and temporal pyramid-based real-time gesture recognition. J. Real Time Image Process. 13(3): 599-611 (2017) - [j61]Yang Yu, Ziyan Jia, Weige Tao, Bo Xue, Changhoon Lee:
An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things. Wirel. Pers. Commun. 93(2): 571-587 (2017) - [j60]Dat Phuc Tran Song, Neal Naixue Xiong, Changhoon Lee:
Cryptanalysis of the XO-64 Suitable for Wireless Systems. Wirel. Pers. Commun. 93(2): 589-600 (2017) - 2016
- [j59]Xiaomin Pan, Changhoon Lee, Kyoungyoun Kim, Jung-Il Choi:
Analysis of velocity-components decoupled projection method for the incompressible Navier-Stokes equations. Comput. Math. Appl. 71(8): 1722-1743 (2016) - [j58]Xiaomin Pan, Kyoungyoun Kim, Changhoon Lee, Jung-Il Choi:
A decoupled monolithic projection method for natural convection problems. J. Comput. Phys. 314: 160-166 (2016) - [j57]Hyunwook Park, Xiaomin Pan, Changhoon Lee, Jung-Il Choi:
A pre-conditioned implicit direct forcing based immersed boundary method for incompressible viscous flows. J. Comput. Phys. 314: 774-799 (2016) - [j56]Wenzheng Zhu, Changhoon Lee:
A Security Protection Framework for Cloud Computing. J. Inf. Process. Syst. 12(3): 538-547 (2016) - [j55]Changhoon Lee, Geyong Min, Weifeng Chen:
Guest Editorial: Data Mining and Machine Learning Technologies for Multimedia Information Retrieval and Recommendation. Multim. Tools Appl. 75(9): 4845-4849 (2016) - [j54]Changhoon Lee:
Guest Editorial: Automated Big Data Analysis for Social Multimedia Network Environments. Multim. Tools Appl. 75(20): 12663-12667 (2016) - [j53]Zhijun Fang, Fengchang Fei, Yuming Fang, Changhoon Lee, Naixue Xiong, Lei Shu, Sheng Chen:
Abnormal event detection in crowded scenes based on deep learning. Multim. Tools Appl. 75(22): 14617-14639 (2016) - [j52]Aamir Shahzad, Malrey Lee, Changhoon Lee, Naixue Xiong, Suntae Kim, Young Keun Lee, Kangmin Kim, Seon-Mi Woo, Gisung Jeong:
The protocol design and New approach for SCADA security enhancement during sensors broadcasting system. Multim. Tools Appl. 75(22): 14641-14668 (2016) - [j51]Aamir Shahzad, René Landry, Malrey Lee, Naixue Xiong, Jongho Lee, Changhoon Lee:
A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols. Sensors 16(6): 821 (2016) - [j50]Changhoon Lee, Kyusuk Han, Juan Li:
Editorial: A special section on "Emerging Platform Technologies". J. Supercomput. 72(1): 1-4 (2016) - [j49]Hyunhee Park, Changhoon Lee, Yang Sun Lee, Eui-Jik Kim:
Performance analysis for contention adaptation of M2M devices with directional antennas. J. Supercomput. 72(9): 3387-3408 (2016) - [j48]Dat Phuc Tran Song, Changhoon Lee:
Security analysis of SDDO-based block cipher for wireless sensor network. J. Supercomput. 72(9): 3619-3628 (2016) - [j47]Seheon Song, Changhoon Lee, Sangil Lee, Jaehyun Park:
Capability-based semantic matching for dynamic resource allocation in tactical edge environment. J. Supercomput. 72(9): 3646-3662 (2016) - 2015
- [j46]Dat Phuc Tran Song, Changhoon Lee:
Related-Key Differential Attacks on COSB-128. Int. J. Distributed Sens. Networks 11: 617972:1-617972:8 (2015) - [j45]Sooyoung Park, Hyunji Chung, Changhoon Lee, Sangjin Lee, Kyungho Lee:
Methodology and implementation for tracking the file sharers using BitTorrent. Multim. Tools Appl. 74(1): 271-286 (2015) - [j44]Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim:
Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. Peer-to-Peer Netw. Appl. 8(4): 716-732 (2015) - [c27]Changhoon Lee, Chang Dong Yoo:
Segment-wise online learning based on greedy algorithm for real-time multi-target tracking. ICIP 2015: 872-876 - [c26]HyungChul Kang, Myungseo Park, Dukjae Moon, Changhoon Lee, Jongsung Kim, Kimoon Kim, Juhyuk Kim, Seokhie Hong:
New Efficient Padding Methods Secure Against Padding Oracle Attacks. ICISC 2015: 329-342 - [c25]Jaeseong Jang, Chi Young Ahn, Kiwan Jeon, Jung-Il Choi, Changhoon Lee, Jin Keun Seo:
A reconstruction method of intra-ventricular blood flow using color flow ultrasound: a simulation study. Medical Imaging: Biomedical Applications in Molecular, Structural, and Functional Imaging 2015: 941728 - 2014
- [j43]Yuseop Lee, Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong:
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing. Int. J. Distributed Sens. Networks 10 (2014) - [j42]Qun Jin, Sethuraman Panchanathan, Changhoon Lee:
Special section on human-centric computing. Inf. Sci. 257: 229-230 (2014) - [j41]Wenzheng Zhu, Changhoon Lee:
A New Approach to Web Data Mining Based on Cloud Computing. J. Comput. Sci. Eng. 8(4): 181-186 (2014) - [j40]Kyung-Soo Lim, Changhoon Lee, Jong Hyuk Park, Sangjin Lee:
Test-driven forensic analysis of satellite automotive navigation systems. J. Intell. Manuf. 25(2): 329-338 (2014) - [j39]Sanghyun Seo, Changhoon Lee, Xilin Chen:
Special issue on convergence of real-time 3D imaging and optical communications. J. Real Time Image Process. 9(3): 519-521 (2014) - [j38]Changhoon Lee, J. Wenny Rahayu, Uyen Trang Nguyen:
Knowledge management technologies for semantic multimedia services. Multim. Tools Appl. 71(1): 195-198 (2014) - [j37]Changhoon Lee, Xiaohong Jiang, Christian Becker, Laurence T. Yang:
Editorial: special issue on "Recent advanced in ubiquitous infrastructure technology". Telecommun. Syst. 55(1): 1-3 (2014) - [j36]Mingbiao Li, Naixue Xiong, Bo Yang, Zhonghua Li, Jong Hyuk Park, Changhoon Lee:
Posted price model based on GRS and its optimization for improving grid resource sharing efficiency. Telecommun. Syst. 55(1): 71-79 (2014) - [j35]Changhoon Lee:
Biclique cryptanalysis of PRESENT-80 and PRESENT-128. J. Supercomput. 70(1): 95-103 (2014) - [j34]Hang Tu, Neeraj Kumar, Debiao He, Jongsung Kim, Changhoon Lee:
An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks. J. Supercomput. 70(1): 224-235 (2014) - [c24]Tae-Ho Kim, Changhoon Lee, Chang Dong Yoo:
Greedy algorithm for real-time multi-object tracking. ICIP 2014: 398-402 - 2013
- [j33]Keun-Gi Lee, Changhoon Lee, Sangjin Lee:
On-site investigation methodology for incident response in Windows environments. Comput. Math. Appl. 65(9): 1413-1420 (2013) - [j32]Kyung-Soo Lim, Changhoon Lee:
A framework for unified digital evidence management in security convergence. Electron. Commer. Res. 13(3): 379-398 (2013) - [j31]Kitae Jeong, Changhoon Lee, Jong Lim:
Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2013: 151 (2013) - [j30]Yuseop Lee, Kitae Jeong, Jaechul Sung, Changhoon Lee, Seokhie Hong, Ku-Young Chang:
Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j29]Youngho Suh, Changhoon Lee:
A numerical method for the calculation of drag and lift of a deformable droplet in shear flow. J. Comput. Phys. 241: 35-57 (2013) - [j28]Hongju Cheng, Naixue Xiong, Laurence T. Yang, Guolong Chen, Xiaofang Zhuang, Changhoon Lee:
Links organization for channel assignment in multi-radio wireless mesh networks. Multim. Tools Appl. 65(2): 239-258 (2013) - [j27]Chulhong Min, Chanyou Hwang, Taiwoo Park, Yuhwan Kim, Uichin Lee, Inseok Hwang, Chungkuk Yoo, Changhoon Lee, Younghyun Ju, Junehwa Song, Jaeung Lee, Miri Moon, Haechan Lee, Youngki Lee:
ACM HotMobile 2013 demo: bringing in-situ social awareness to mobile systems: everyday interaction monitoring and its applications. ACM SIGMOBILE Mob. Comput. Commun. Rev. 17(3): 9-10 (2013) - [j26]Taek-Young Youn, Eun Sook Kang, Changhoon Lee:
Efficient three-party key exchange protocols with round efficiency. Telecommun. Syst. 52(2): 1367-1376 (2013) - [j25]Jangwoo Park, Dae-Heon Park, Changhoon Lee:
Angle and ranging based localization method for ad hoc network. J. Supercomput. 64(2): 507-521 (2013) - [j24]Jewan Bang, Changhoon Lee, Sangjin Lee, Kyungho Lee:
Damaged backup data recovery method for Windows mobile. J. Supercomput. 66(2): 875-887 (2013) - 2012
- [j23]Lansheng Han, Cai Fu, Deqing Zou, Changhoon Lee, Wenjing Jia:
Task-based behavior detection of illegal codes. Math. Comput. Model. 55(1-2): 80-86 (2012) - [j22]Kyung-Soo Lim, Antonio Savoldi, Changhoon Lee, Sangjin Lee:
On-the-spot digital investigation by means of LDFS: Live Data Forensic System. Math. Comput. Model. 55(1-2): 223-240 (2012) - [j21]Jong Hyuk Park, Oscar C. Au, Mikael Wiberg, Changhoon Lee:
Recent advances and future directions in multimedia and mobile computing. Multim. Tools Appl. 57(2): 237-242 (2012) - [j20]Namheun Son, Keun-Gi Lee, Sangjun Jeon, Sangjin Lee, Changhoon Lee:
The effective method of database server forensics on the enterprise environment. Secur. Commun. Networks 5(10): 1086-1093 (2012) - [j19]Sudip Misra, P. Venkata Krishna, Akhil Bhiwal, Amardeep Singh Chawla, Bernd E. Wolfinger, Changhoon Lee:
A learning automata-based fault-tolerant routing algorithm for mobile ad hoc networks. J. Supercomput. 62(1): 4-23 (2012) - [c23]Jinkeon Kang, Kitae Jeong, Sang-Soo Yeo, Changhoon Lee:
Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments. AINA Workshops 2012: 726-731 - [c22]Sooyoung Park, Hyunji Chung, Changhoon Lee, Sangjin Lee:
Methodology for Digital Investigation of Illegal Sharing Using BitTorrent. ITCS 2012: 187-195 - [c21]Jeehee Lee, Hyunji Chung, Changhoon Lee, Sangjin Lee:
Methodology for Digital Forensic Investigation of iCloud. ITCS 2012: 197-206 - [c20]Jong-Hyun Choi, Keun-Gi Lee, Jungheum Park, Changhoon Lee, Sangjin Lee:
Analysis Framework to Detect Artifacts of Portable Web Browser. ITCS 2012: 207-214 - [c19]Yuseop Lee, Jongsung Kim, Seokhie Hong, Changhoon Lee:
Improved Differential Fault Analysis on Block Cipher SEED-128. NBiS 2012: 675-680 - [i1]Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong:
Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED. IACR Cryptol. ePrint Arch. 2012: 621 (2012) - 2011
- [j18]Changhoon Lee, Jongsung Kim, Jaechul Sung, Yangsun Lee, Chang Hoon Lee:
Cryptanalysis of CIKS-128 and CIKS-128H Suitable for Intelligent Multimedia and Ubiquitous Computing Systems. Comput. Informatics 30(3): 447-466 (2011) - [j17]Taek-Young Youn, Changhoon Lee, Young-Ho Park:
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes. Comput. Commun. 34(3): 353-357 (2011) - [c18]Namheun Son, Keun-Gi Lee, Sangjun Jeon, Hyunji Chung, Sangjin Lee, Changhoon Lee:
The Method of Database Server Detection and Investigation in the Enterprise Environment. STA 2011: 164-171 - [e2]Changhoon Lee, Jean-Marc Seigneur, James J. Park, Roland R. Wagner:
Secure and Trust Computing, Data Management, and Applications - STA 2011 Workshops: IWCS 2011 and STAVE 2011, Loutraki, Greece, June 28-30, 2011. Proceedings. Communications in Computer and Information Science 187, Springer 2011, ISBN 978-3-642-22364-8 [contents] - 2010
- [j16]Muhammad Usama, Muhammad Khurram Khan, Khaled Alghathbar, Changhoon Lee:
Chaos-based secure satellite imagery cryptosystem. Comput. Math. Appl. 60(2): 326-337 (2010) - [j15]Hamid R. Arabnia, Wai-Chi Fang, Changhoon Lee, Yan Zhang:
Context-Aware Middleware and Intelligent Agents for Smart Environments. IEEE Intell. Syst. 25(2): 10-11 (2010) - [j14]Changhoon Lee, Han-Chieh Chao, Irfan Awan:
Special issue on "Modeling and simulation techniques for future generation communication networks". Simul. Model. Pract. Theory 18(4): 405-406 (2010) - [j13]Jaeik Cho, Changhoon Lee, Sang Hyun Cho, Jung Hwan Song, Jongin Lim, Jongsub Moon:
A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data. Simul. Model. Pract. Theory 18(4): 431-435 (2010) - [j12]Changhoon Lee, Sangjin Lee, Jong Hyuk Park, Sajid Hussain, Jung Hwan Song:
Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device. Telecommun. Syst. 44(3-4): 267-279 (2010) - [j11]YunSeop Yu, Seong-Ho Choi, Hyung-Kun Park, Changhoon Lee, Young-Sik Jeong, Sang-Hoon Kim:
A power-, delay- and emergency-efficient protocol of ubiquitous sensor network systems for silver town applications. J. Supercomput. 54(1): 122-137 (2010) - [j10]Eun-Jun Yoon, Kee-Young Yoo, Sang-Soo Yeo, Changhoon Lee:
Robust Deniable Authentication Protocol. Wirel. Pers. Commun. 55(1): 81-90 (2010)
2000 – 2009
- 2009
- [j9]Seungheon Hyeon, Changhoon Lee, Chang Eon Shin, Seungwon Choi:
Implementation of a Smart Antenna Base Station for Mobile WiMAX Based on OFDMA. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [j8]Kitae Jeong, Changhoon Lee, Jongsung Kim, Seokhie Hong:
Security analysis of the SCO-family using key schedules. Inf. Sci. 179(24): 4232-4242 (2009) - [j7]Changhoon Lee, Jongsung Kim, Seokhie Hong, Yangsun Lee:
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments. J. Univers. Comput. Sci. 15(5): 1007-1022 (2009) - [c17]Wenzheng Zhu, Changhoon Lee:
Design for Security Operating System. Asia International Conference on Modelling and Simulation 2009: 667-670 - [c16]Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park, Yeonjung Kang:
Update on SEED: SEED-192/256. ISA 2009: 1-10 - [e1]Jong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee, Tai-Hoon Kim, Sang-Soo Yeo:
Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings. Lecture Notes in Computer Science 5576, Springer 2009, ISBN 978-3-642-02616-4 [contents] - 2008
- [j6]Eunjin Lee, Jongsung Kim, Deukjo Hong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim:
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(2): 642-649 (2008) - [j5]Jongsung Kim, Changhoon Lee, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jongin Lim:
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(10): 3047-3058 (2008) - [j4]Changhoon Lee, Myung-Hwan Whangbo, Jürgen Köhler:
Analysis of electronic structures and chemical bonding of metal-rich compounds. I. Density functional study of Pt metal, LiPt2, LiPt, and Li2Pt. J. Comput. Chem. 29(13): 2154-2160 (2008) - [j3]Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee:
Security analysis of the full-round DDO-64 block cipher. J. Syst. Softw. 81(12): 2328-2335 (2008) - 2007
- [c15]Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim:
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. ACISP 2007: 143-157 - 2006
- [c14]Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. ACISP 2006: 421-431 - [c13]Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee:
HIGHT: A New Block Cipher Suitable for Low-Resource Device. CHES 2006: 46-59 - [c12]Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. ICCSA (3) 2006: 446-455 - [c11]HongJin Park, Changhoon Lee:
Sized-Based Replacement-k Replacement Policy in Data Grid Environments. ISPA 2006: 353-361 - [c10]Jiqiang Lu, Changhoon Lee, Jongsung Kim:
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b. SCN 2006: 95-110 - 2005
- [j2]Jinsung Oh, Changhoon Lee, Younam Kim:
Minimum-Maximum Exclusive Weighted-Mean Filter with Adaptive Window. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(9): 2451-2454 (2005) - [c9]Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon:
Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. IMACC 2005: 201-219 - [c8]Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee:
Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. Mycrypt 2005: 244-262 - [c7]Jaechul Sung, Jongsung Kim, Changhoon Lee, Seokhie Hong:
Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds. WEWoRC 2005: 64-75 - 2004
- [c6]Youngdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee:
Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1. ACISP 2004: 137-148 - [c5]Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong:
Padding Oracle Attacks on Multiple Modes of Operation. ICISC 2004: 343-351 - [c4]Youngdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee:
Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H. INDOCRYPT 2004: 191-205 - 2003
- [c3]Jongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee:
Impossible Differential Cryptanalysis for Block Cipher Structures. INDOCRYPT 2003: 82-96 - [c2]Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee:
Impossible Differential Attack on 30-Round SHACAL-2. INDOCRYPT 2003: 97-106 - 2002
- [c1]Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, Jongin Lim:
A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. ICICS 2002: 456-468
1990 – 1999
- 1993
- [j1]James T. Kirby, Changhoon Lee:
Short Waves in a Rotating, Shallow Tank with Bathymetry: A Model Equation in the Mild-Slope Approximation. SIAM J. Appl. Math. 53(5): 1381-1400 (1993)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint