Jooyoung Lee
Jooyoung Lee
School of Computing, KAIST
Adresse e-mail validée de
Citée par
Citée par
Deterministic key predistribution schemes for distributed sensor networks
J Lee, DR Stinson
International Workshop on Selected Areas in Cryptography, 294-307, 2004
A combinatorial approach to key predistribution for distributed sensor networks
J Lee, DR Stinson
IEEE WCNC 2005, 1200-1205, 2005
On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs
J Lee, DR Stinson
ACM Transactions on Information and System Security (TISSEC) 11 (2), 1:1-1:35, 2008
Minimizing the two-round Even–Mansour cipher
S Chen, R Lampe, J Lee, Y Seurin, J Steinberger
Journal of Cryptology 31 (4), 1064-1119, 2018
Efficient Authenticated Key Exchange Protocols
J Lee, JH Park
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2011
The security of Abreast-DM in the ideal cipher model
J Lee, D Kwon
IEICE transactions on fundamentals of electronics, communications and …, 2011
The collision security of Tandem-DM in the ideal cipher model
J Lee, M Stam, J Steinberger
Annual Cryptology Conference, 561-577, 2011
MJH: A faster alternative to MDC-2
J Lee, M Stam
Cryptographers’ Track at the RSA Conference, 213-236, 2011
The preimage security of double-block-length compression functions
F Armknecht, E Fleischmann, M Krause, J Lee, M Stam, J Steinberger
International Conference on the Theory and Application of Cryptology and …, 2011
An Efficient Authenticated Key Exchange Protocol with a Tight Security Reduction.
J Lee, CS Park
IACR Cryptology ePrint Archive 2008, 345, 2008
Common intersection designs
J Lee, DR Stinson
Journal of Combinatorial Designs 14 (4), 251-269, 2006
On lai–massey and quasi-feistel ciphers
A Yun, JH Park, J Lee
Designs, Codes and Cryptography 58 (1), 45-72, 2011
Towards key-length extension with optimal security: Cascade encryption and xor-cascade encryption
J Lee
Annual International Conference on the Theory and Applications of …, 2013
Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation
J Lee, J Steinberger
IEEE transactions on information theory 58 (9), 6165-6182, 2012
Multi-property-preserving domain extension using polynomial-based modes of operation
J Lee, J Steinberger
Annual International Conference on the Theory and Applications of …, 2010
T-function based streamcipher TSC-4
D Moon, D Kwon, D Han, J Lee, GH Ryu, DW Lee, Y Yeom, S Chee
SASC 2006 Stream Ciphers Revisited, 254, 2006
The security of multiple encryption in the ideal cipher model
Y Dai, J Lee, B Mennink, J Steinberger
Annual Cryptology Conference, 20-38, 2014
Efficient RFID authentication protocols based on pseudorandom sequence generators
J Lee, Y Yeom
Designs, Codes and Cryptography 51 (2), 195-210, 2009
New constructions of MACs from (tweakable) block ciphers
B Cogliati, J Lee, Y Seurin
IACR Transactions on Symmetric Cryptology, 27-58, 2017
Collision resistance of the JH hash function
J Lee, D Hong
IEEE Transactions on Information Theory 58 (3), 1992-1995, 2011
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20