Introduction to Quantum Groups and Crystal Bases J Hong, SJ Kang
American Mathematical Soc., 2002
625 2002 New block cipher: ARIA D Kwon, J Kim, S Park, SH Sung, Y Sohn, JH Song, Y Yeom, EJ Yoon, ...
ICISC 2003 (LNCS 2971), 432-445, 2004
337 2004 New applications of time memory data tradeoffs J Hong, P Sarkar
ASIACRYPT 2005 (LNCS 3788), 353-372, 2005
208 * 2005 Secure and efficient broadcast authentication in wireless sensor networks T Kwon, J Hong
IEEE Transactions on Computers 59 (8), 1120-1133, 2010
74 2010 A comparison of cryptanalytic tradeoff algorithms J Hong, S Moon
Journal of Cryptology 26 (4), 559-637, 2013
72 2013 Algebraic attacks on summation generators D Lee, J Kim, J Hong, J Han, D Moon
FSE 2004 (LNCS 3017), 34-48, 2004
66 2004 Analysis and improvement of a PIN-entry method resilient to shoulder-surfing and recording attacks T Kwon, J Hong
IEEE Transactions on Information Forensics and Security 10 (2), 278-292, 2015
64 2015 Young tableaux and crystal ℬ(∞) for finite simple Lie algebras J Hong, H Lee
Journal of Algebra 320 (10), 3680-3693, 2008
54 2008 A new class of single cycle T-functions J Hong, DH Lee, Y Yeom, D Han
FSE 2005 (LNCS 3557), 68-82, 2005
50 2005 TMD-tradeoff and state entropy loss considerations of streamcipher MICKEY J Hong, WH Kim
INDOCRYPT 2005 (LNCS 3797), 169-182, 2005
46 2005 Variants of the distinguished point method for cryptanalytic time memory trade-offs J Hong, KC Jeong, EY Kwon, IS Lee, D Ma
ISPEC 2008 (LNCS 4991), 131-145, 2008
43 2008 Comparison of perfect table cryptanalytic tradeoff algorithms GW Lee, J Hong
Designs, Codes and Cryptography 80 (3), 473-523, 2016
40 2016 The cost of false alarms in Hellman and rainbow tradeoffs J Hong
Designs, Codes and Cryptography 57 (3), 293-327, 2010
38 2010 Speeding up the Pollard rho method on prime fields JH Cheon, J Hong, M Kim
ASIACRYPT 2008 (LNCS 5350), 471-488, 2008
29 2008 Success probability of the Hellman trade-off D Ma, J Hong
Information Processing Letters 109 (7), 347-351, 2009
27 2009 Key recovery attacks on NTRU without ciphertext validation routine D Han, J Hong, J Han, D Kwon
ACISP 2003 (LNCS 2727), 217-217, 2003
24 * 2003 Analysis of the non-perfect table fuzzy rainbow tradeoff BI Kim, J Hong
ACISP 2013 (LNCS 7959), 347-362, 2013
23 2013 T-function based stream cipher TSC-3 J Hong, DH Lee, Y Yeom, D Han, S Chee
eSTREAM, ECRYPT Stream Cipher Project, Report 2005/031, 2005
23 * 2005 Young wall realization of crystal graphs for J Hong, SJ Kang, H Lee
Communications in Mathematical Physics 244 (1), 111-131, 2004
20 2004 Accelerating Pollard’s rho algorithm on finite fields JH Cheon, J Hong, M Kim
Journal of Cryptology 25 (2), 195-242, 2012
19 2012