Suivre
Donghoon Chang
Donghoon Chang
IIIT-Delhi, India
Adresse e-mail validée de iiitd.ac.in
Titre
Citée par
Citée par
Année
HIGHT: A new block cipher suitable for low-resource device
D Hong, J Sung, S Hong, J Lim, S Lee, BS Koo, C Lee, D Chang, J Lee, ...
International workshop on cryptographic hardware and embedded systems, 46-59, 2006
8862006
Differential Cryptanalysis of TEA and XTEA
S Hong, D Hong, Y Ko, D Chang, W Lee, S Lee
International Conference on Information Security and Cryptology, 402-417, 2003
1172003
Indifferentiable security analysis of popular hash functions with prefix-free padding
D Chang, S Lee, M Nandi, M Yung
International Conference on the Theory and Application of Cryptology and …, 2006
752006
Improved indifferentiability security analysis of chopMD hash function
D Chang, M Nandi
International Workshop on Fast Software Encryption, 429-443, 2008
742008
A new dedicated 256-bit hash function: FORK-256
D Hong, D Chang, J Sung, S Lee, S Hong, J Lee, D Moon, S Chee
International Workshop on Fast Software Encryption, 195-209, 2006
572006
RC4-Hash: A new hash function based on RC4
D Chang, KC Gupta, M Nandi
International Conference on Cryptology in India, 80-94, 2006
432006
Status report on the first round of the NIST lightweight cryptography standardization process
MS Turan, KA McKay, Ç Çalik, D Chang, L Bassham
National Institute of Standards and Technology, Gaithersburg, MD, NIST …, 2019
352019
A keyed sponge construction with pseudorandomness in the standard model
D Chang, M Dworkin, S Hong, J Kelsey, M Nandi
The Third SHA-3 Candidate Conference (March 2012) 3, 7, 2012
302012
A short proof of the PRP/PRF switching lemma
D Chang, M Nandi
Cryptology ePrint Archive, 2008
282008
Cancelable multi-biometric approach using fuzzy extractor and novel bit-wise encryption
D Chang, S Garg, M Hasan, S Mishra
IEEE Transactions on Information Forensics and Security 15, 3152-3167, 2020
262020
Bicliques with minimal data and time complexity for AES
A Bogdanov, D Chang, M Ghosh, SK Sanadhya
International Conference on Information Security and Cryptology, 160-174, 2014
232014
Indifferentiability of the hash algorithm BLAKE
D Chang, M Nandi, M Yung
Cryptology ePrint Archive, 2011
232011
Finding collision on 45-step HAS-160
A Yun, SH Sung, S Park, D Chang, S Hong, HS Cho
International Conference on Information Security and Cryptology, 146-155, 2005
232005
Privacy-preserving indexing of iris-codes with cancelable bloom filter-based search structures
P Drozdowski, S Garg, C Rathgeb, M Gomez-Barrcro, D Chang, C Busch
2018 26th European Signal Processing Conference (EUSIPCO), 2360-2364, 2018
202018
New parallel domain extenders for UOWHF
W Lee, D Chang, S Lee, S Sung, M Nandi
International Conference on the Theory and Application of Cryptology and …, 2003
202003
FbHash: A new similarity hashing scheme for digital forensics
D Chang, M Ghosh, SK Sanadhya, M Singh, DR White
Digital Investigation 29, S113-S123, 2019
192019
A survey on lightweight authenticated encryption and challenges for securing industrial IoT
M Agrawal, J Zhou, D Chang
Security and Privacy Trends in the Industrial Internet of Things, 71-94, 2019
192019
Rig: A Simple, Secure and Flexible Design for Password Hashing
D Chang, A Jati, S Mishra, SK Sanadhya
International Conference on Information Security and Cryptology, 361-381, 2014
192014
Status report on the second round of the SHA-3 cryptographic hash algorithm competition
MS Turan, R Perlner, LE Bassham, W Burr, D Chang, S jen Chang, ...
NIST Interagency Report 7764, 2011
192011
Generation of secure and reliable honeywords, preventing false detection
D Chang, A Goel, S Mishra, SK Sanadhya
IEEE Transactions on Dependable and Secure Computing 16 (5), 757-769, 2018
172018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20