BibTeX records: Donghoon Chang

download as .bib file

@article{DBLP:journals/iotj/HasanC24,
  author       = {Munawar Hasan and
                  Donghoon Chang},
  title        = {Lynx: Family of Lightweight Authenticated Encryption Schemes Based
                  on Tweakable Blockcipher},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {8},
  pages        = {14357--14369},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3344677},
  doi          = {10.1109/JIOT.2023.3344677},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/HasanC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChangHKT23,
  author       = {Donghoon Chang and
                  Deukjo Hong and
                  Jinkeon Kang and
                  Meltem S{\"{o}}nmez Turan},
  title        = {Resistance of Ascon Family Against Conditional Cube Attacks in Nonce-Misuse
                  Setting},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {4501--4516},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2022.3223991},
  doi          = {10.1109/ACCESS.2022.3223991},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ChangHKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LeeKCH23,
  author       = {Yongseong Lee and
                  Jinkeon Kang and
                  Donghoon Chang and
                  Seokhie Hong},
  title        = {A preimage attack on reduced {GIMLI-HASH} with unbalanced squeezing
                  phase},
  journal      = {{IET} Inf. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {66--79},
  year         = {2023},
  url          = {https://doi.org/10.1049/ise2.12060},
  doi          = {10.1049/ISE2.12060},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LeeKCH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/ChangY23,
  author       = {Donghoon Chang and
                  Moti Yung},
  editor       = {Shlomi Dolev and
                  Ehud Gudes and
                  Pascal Paillier},
  title        = {Midgame Attacks and Defense Against Them},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 7th International
                  Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13914},
  pages        = {471--492},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-34671-2\_33},
  doi          = {10.1007/978-3-031-34671-2\_33},
  timestamp    = {Thu, 29 Jun 2023 08:38:21 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/ChangY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HasanC23,
  author       = {Munawar Hasan and
                  Donghoon Chang},
  title        = {Lynx: Family of Lightweight Authenticated Encryption Schemes based
                  on Tweakable Blockcipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {241},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/241},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HasanC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/SinghKGCS22,
  author       = {Monika Singh and
                  Anviksha Khunteta and
                  Mohona Ghosh and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  title        = {FbHash-E: {A} time and memory efficient version of FbHash similarity
                  hashing algorithm},
  journal      = {Digit. Investig.},
  volume       = {41},
  pages        = {301375},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.fsidi.2022.301375},
  doi          = {10.1016/J.FSIDI.2022.301375},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/SinghKGCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChangGHM22,
  author       = {Donghoon Chang and
                  Surabhi Garg and
                  Munawar Hasan and
                  Sweta Mishra},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {On Security of Fuzzy Commitment Scheme for Biometric Authentication},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {399--419},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_20},
  doi          = {10.1007/978-3-031-22301-3\_20},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChangGHM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangHK22,
  author       = {Donghoon Chang and
                  Deukjo Hong and
                  Jinkeon Kang},
  title        = {Conditional Cube Attacks on Ascon-128 and Ascon-80pq in a Nonce-misuse
                  Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {544},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/544},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangHKT22,
  author       = {Donghoon Chang and
                  Deukjo Hong and
                  Jinkeon Kang and
                  Meltem S{\"{o}}nmez Turan},
  title        = {Resistance of Ascon Family against Conditional Cube Attacks in Nonce-Misuse
                  Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1456},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1456},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangHKT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChangGGH21,
  author       = {Donghoon Chang and
                  Surabhi Garg and
                  Mohona Ghosh and
                  Munawar Hasan},
  title        = {{BIOFUSE:} {A} framework for multi-biometric fusion on biocryptosystem
                  level},
  journal      = {Inf. Sci.},
  volume       = {546},
  pages        = {481--511},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ins.2020.08.065},
  doi          = {10.1016/J.INS.2020.08.065},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ChangGGH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LeeKCH21,
  author       = {Yongseong Lee and
                  Jinkeon Kang and
                  Donghoon Chang and
                  Seokhie Hong},
  editor       = {Jong Hwan Park and
                  Seung{-}Hyun Seo},
  title        = {A Preimage Attack on Reduced Gimli-Hash},
  booktitle    = {Information Security and Cryptology - {ICISC} 2021 - 24th International
                  Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13218},
  pages        = {217--237},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-08896-4\_11},
  doi          = {10.1007/978-3-031-08896-4\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/LeeKCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangT21,
  author       = {Donghoon Chang and
                  Meltem S{\"{o}}nmez Turan},
  title        = {Recovering the Key from the Internal State of Grain-128AEAD},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {439},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/439},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JatiGCSC20,
  author       = {Arpan Jati and
                  Naina Gupta and
                  Anupam Chattopadhyay and
                  Somitra Kumar Sanadhya and
                  Donghoon Chang},
  title        = {Threshold Implementations of \texttt{GIFT}: {A} Trade-Off Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {2110--2120},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2957974},
  doi          = {10.1109/TIFS.2019.2957974},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JatiGCSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChangGHM20,
  author       = {Donghoon Chang and
                  Surabhi Garg and
                  Munawar Hasan and
                  Sweta Mishra},
  title        = {Cancelable Multi-Biometric Approach Using Fuzzy Extractor and Novel
                  Bit-Wise Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3152--3167},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2020.2983250},
  doi          = {10.1109/TIFS.2020.2983250},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChangGHM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-00236,
  author       = {Donghoon Chang and
                  Vinjohn V. Chirakkal and
                  Shubham Goswami and
                  Munawar Hasan and
                  Taekwon Jung and
                  Jinkeon Kang and
                  Seok{-}Cheol Kee and
                  Dongkyu Lee and
                  Ajit Pratap Singh},
  title        = {Multi-lane Detection Using Instance Segmentation and Attentive Voting},
  journal      = {CoRR},
  volume       = {abs/2001.00236},
  year         = {2020},
  url          = {http://arxiv.org/abs/2001.00236},
  eprinttype    = {arXiv},
  eprint       = {2001.00236},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-00236.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChangGSSW19,
  author       = {Donghoon Chang and
                  Mohona Ghosh and
                  Somitra Kumar Sanadhya and
                  Monika Singh and
                  Douglas R. White},
  title        = {FbHash: {A} New Similarity Hashing Scheme for Digital Forensics},
  journal      = {Digit. Investig.},
  volume       = {29 Supplement},
  pages        = {S113--S123},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.diin.2019.04.006},
  doi          = {10.1016/J.DIIN.2019.04.006},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/ChangGSSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ChangJMS19,
  author       = {Donghoon Chang and
                  Arpan Jati and
                  Sweta Mishra and
                  Somitra Kumar Sanadhya},
  title        = {Cryptanalytic time-memory trade-off for password hashing schemes},
  journal      = {Int. J. Inf. Sec.},
  volume       = {18},
  number       = {2},
  pages        = {163--180},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10207-018-0405-5},
  doi          = {10.1007/S10207-018-0405-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ChangJMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/ChangGJKS19,
  author       = {Donghoon Chang and
                  Mohona Ghosh and
                  Arpan Jati and
                  Abhishek Kumar and
                  Somitra Kumar Sanadhya},
  title        = {A Generalized Format Preserving Encryption Framework Using {MDS} Matrices},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {3},
  number       = {1},
  pages        = {3--11},
  year         = {2019},
  url          = {https://doi.org/10.1007/s41635-019-00065-x},
  doi          = {10.1007/S41635-019-00065-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/ChangGJKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChangGMS19,
  author       = {Akshima and
                  Donghoon Chang and
                  Aarushi Goel and
                  Sweta Mishra and
                  Somitra Kumar Sanadhya},
  title        = {Generation of Secure and Reliable Honeywords, Preventing False Detection},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {5},
  pages        = {757--769},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2018.2824323},
  doi          = {10.1109/TDSC.2018.2824323},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChangGMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChangDDMNSS19,
  author       = {Donghoon Chang and
                  Nilanjan Datta and
                  Avijit Dutta and
                  Bart Mennink and
                  Mridul Nandi and
                  Somitra Sanadhya and
                  Ferdinand Sibleyras},
  title        = {Release of Unverified Plaintext: Tight Unified Model and Application
                  to {ANYDAE}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {4},
  pages        = {119--146},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i4.119-146},
  doi          = {10.13154/TOSC.V2019.I4.119-146},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChangDDMNSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/Agrawal0C19,
  author       = {Megha Agrawal and
                  Jianying Zhou and
                  Donghoon Chang},
  editor       = {Cristina Alcaraz},
  title        = {A Survey on Lightweight Authenticated Encryption and Challenges for
                  Securing Industrial IoT},
  booktitle    = {Security and Privacy Trends in the Industrial Internet of Things},
  pages        = {71--94},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12330-7\_4},
  doi          = {10.1007/978-3-030-12330-7\_4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/19/Agrawal0C19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangDDMNSS19,
  author       = {Donghoon Chang and
                  Nilanjan Datta and
                  Avijit Dutta and
                  Bart Mennink and
                  Mridul Nandi and
                  Somitra Sanadhya and
                  Ferdinand Sibleyras},
  title        = {Release of Unverified Plaintext: Tight Unified Model and Application
                  to {ANYDAE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1326},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1326},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangDDMNSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangHJ19,
  author       = {Donghoon Chang and
                  Munawar Hasan and
                  Pranav Jain},
  title        = {Spy Based Analysis of Selfish Mining Attack on Multi-Stage Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1327},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangHJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptography/AgrawalCK18,
  author       = {Megha Agrawal and
                  Donghoon Chang and
                  Jinkeon Kang},
  title        = {Deterministic Authenticated Encryption Scheme for Memory Constrained
                  Devices},
  journal      = {Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {37},
  year         = {2018},
  url          = {https://doi.org/10.3390/cryptography2040037},
  doi          = {10.3390/CRYPTOGRAPHY2040037},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptography/AgrawalCK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/AgrawalBCCHKS18,
  author       = {Megha Agrawal and
                  Tarun Kumar Bansal and
                  Donghoon Chang and
                  Amit Kumar Chauhan and
                  Seokhie Hong and
                  Jinkeon Kang and
                  Somitra Kumar Sanadhya},
  title        = {{RCB:} leakage-resilient authenticated encryption via re-keying},
  journal      = {J. Supercomput.},
  volume       = {74},
  number       = {9},
  pages        = {4173--4198},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11227-016-1824-6},
  doi          = {10.1007/S11227-016-1824-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/AgrawalBCCHKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ChangCKS18,
  author       = {Donghoon Chang and
                  Amit Kumar Chauhan and
                  Sandeep Kumar and
                  Somitra Kumar Sanadhya},
  editor       = {Nigel P. Smart},
  title        = {Revocable Identity-Based Encryption from Codes with Rank Metric},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at
                  the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10808},
  pages        = {435--451},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76953-0\_23},
  doi          = {10.1007/978-3-319-76953-0\_23},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ChangCKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AgrawalHZC18,
  author       = {Megha Agrawal and
                  Tianxiang Huang and
                  Jianying Zhou and
                  Donghoon Chang},
  editor       = {Brahim Hamid and
                  Barbara Gallina and
                  Asaf Shabtai and
                  Yuval Elovici and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {CAN-FD-Sec: Improving Security of {CAN-FD} Protocol},
  booktitle    = {Security and Safety Interplay of Intelligent Software Systems - {ESORICS}
                  2018 International Workshops, ISSA/CSITS@ESORICS 2018, Barcelona,
                  Spain, September 6-7, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11552},
  pages        = {77--93},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-16874-2\_6},
  doi          = {10.1007/978-3-030-16874-2\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AgrawalHZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eusipco/DrozdowskiGRGCB18,
  author       = {Pawel Drozdowski and
                  Surabhi Garg and
                  Christian Rathgeb and
                  Marta Gomez{-}Barrero and
                  Donghoon Chang and
                  Christoph Busch},
  title        = {Privacy-Preserving Indexing of Iris-Codes with Cancelable Bloom Filter-based
                  Search Structures},
  booktitle    = {26th European Signal Processing Conference, {EUSIPCO} 2018, Roma,
                  Italy, September 3-7, 2018},
  pages        = {2360--2364},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/EUSIPCO.2018.8553053},
  doi          = {10.23919/EUSIPCO.2018.8553053},
  timestamp    = {Tue, 05 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eusipco/DrozdowskiGRGCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangCKS18,
  author       = {Donghoon Chang and
                  Amit Kumar Chauhan and
                  Sandeep Kumar and
                  Somitra Kumar Sanadhya},
  title        = {Revocable Identity-based Encryption from Codes with Rank Metric},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangCKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ChangKS17,
  author       = {Donghoon Chang and
                  Abhishek Kumar and
                  Somitra Kumar Sanadhya},
  title        = {Distinguishers for 4-Branch and 8-Branch Generalized Feistel Network},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {27857--27867},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2688427},
  doi          = {10.1109/ACCESS.2017.2688427},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ChangKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/AgrawalCS17,
  author       = {Megha Agrawal and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  title        = {A new authenticated encryption technique for handling long ciphertexts
                  in memory constrained devices},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {236--261},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10007291},
  doi          = {10.1504/IJACT.2017.10007291},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/AgrawalCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/BansalCS17,
  author       = {Tarun Kumar Bansal and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  title        = {Sponge-based {CCA2} secure asymmetric encryption for arbitrary length
                  message (extended version)},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {262--287},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10007290},
  doi          = {10.1504/IJACT.2017.10007290},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/BansalCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhss/RoyCCKMN17,
  author       = {Debapriya Basu Roy and
                  Avik Chakraborti and
                  Donghoon Chang and
                  S. V. Dilip Kumar and
                  Debdeep Mukhopadhyay and
                  Mridul Nandi},
  title        = {Two Efficient Fault-Based Attacks on {CLOC} and {SILC}},
  journal      = {J. Hardw. Syst. Secur.},
  volume       = {1},
  number       = {3},
  pages        = {252--268},
  year         = {2017},
  url          = {https://doi.org/10.1007/s41635-017-0022-1},
  doi          = {10.1007/S41635-017-0022-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhss/RoyCCKMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/ChangGJ0S17,
  author       = {Donghoon Chang and
                  Mohona Ghosh and
                  Arpan Jati and
                  Abhishek Kumar and
                  Somitra Kumar Sanadhya},
  editor       = {Sk Subidh Ali and
                  Jean{-}Luc Danger and
                  Thomas Eisenbarth},
  title        = {eSPF: {A} Family of Format-Preserving Encryption Algorithms Using
                  {MDS} Matrices},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 7th International
                  Conference, {SPACE} 2017, Goa, India, December 13-17, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10662},
  pages        = {133--150},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71501-8\_8},
  doi          = {10.1007/978-3-319-71501-8\_8},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/ChangGJ0S17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangJMS17,
  author       = {Donghoon Chang and
                  Arpan Jati and
                  Sweta Mishra and
                  Somitra Kumar Sanadhya},
  title        = {Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {603},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/603},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangJMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangMSS17,
  author       = {Donghoon Chang and
                  Sweta Mishra and
                  Somitra Kumar Sanadhya and
                  Ajit Pratap Singh},
  title        = {On Making {U2F} Protocol Leakage-Resilient via Re-keying},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {721},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/721},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangMSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/SinghCS16,
  author       = {Monika Singh and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  title        = {Security Analysis of mvHash-B Similarity Hashing},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {11},
  number       = {2},
  pages        = {21--34},
  year         = {2016},
  url          = {https://doi.org/10.15394/jdfsl.2016.1376},
  doi          = {10.15394/JDFSL.2016.1376},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/SinghCS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ChangGGJ0MRS16,
  author       = {Donghoon Chang and
                  Mohona Ghosh and
                  Kishan Chand Gupta and
                  Arpan Jati and
                  Abhishek Kumar and
                  Dukjae Moon and
                  Indranil Ghosh Ray and
                  Somitra Kumar Sanadhya},
  editor       = {Kefei Chen and
                  Dongdai Lin and
                  Moti Yung},
  title        = {{SPF:} {A} New Family of Efficient Format-Preserving Encryption Algorithms},
  booktitle    = {Information Security and Cryptology - 12th International Conference,
                  Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10143},
  pages        = {64--83},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-54705-3\_5},
  doi          = {10.1007/978-3-319-54705-3\_5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ChangGGJ0MRS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/RoyCCKMN16,
  author       = {Debapriya Basu Roy and
                  Avik Chakraborti and
                  Donghoon Chang and
                  S. V. Dilip Kumar and
                  Debdeep Mukhopadhyay and
                  Mridul Nandi},
  editor       = {Claude Carlet and
                  M. Anwar Hasan and
                  Vishal Saraswat},
  title        = {Fault Based Almost Universal Forgeries on {CLOC} and {SILC}},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 6th International
                  Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10076},
  pages        = {66--86},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49445-6\_4},
  doi          = {10.1007/978-3-319-49445-6\_4},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/space/RoyCCKMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/ChangCGJS16,
  author       = {Donghoon Chang and
                  Amit Kumar Chauhan and
                  Naina Gupta and
                  Arpan Jati and
                  Somitra Kumar Sanadhya},
  editor       = {Claude Carlet and
                  M. Anwar Hasan and
                  Vishal Saraswat},
  title        = {Exploiting the Leakage: Analysis of Some Authenticated Encryption
                  Schemes},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 6th International
                  Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10076},
  pages        = {383--401},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49445-6\_22},
  doi          = {10.1007/978-3-319-49445-6\_22},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/space/ChangCGJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BansalCS15,
  author       = {Tarun Kumar Bansal and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Sponge Based {CCA2} Secure Asymmetric Encryption for Arbitrary Length
                  Message},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {93--106},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_6},
  doi          = {10.1007/978-3-319-19962-7\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BansalCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AgrawalCS15,
  author       = {Megha Agrawal and
                  Donghoon Chang and
                  Somitra Sanadhya},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained
                  Devices},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {451--468},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_26},
  doi          = {10.1007/978-3-319-19962-7\_26},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AgrawalCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/Chang15,
  author       = {Donghoon Chang},
  editor       = {Bo Begole and
                  Jinwoo Kim and
                  Kori Inkpen and
                  Woontack Woo},
  title        = {Tuesday Keynote: {UX} Design in the IoT Era},
  booktitle    = {Proceedings of the 33rd Annual {ACM} Conference Extended Abstracts
                  on Human Factors in Computing Systems, Seoul, {CHI} 2015 Extended
                  Abstracts, Republic of Korea, April 18 - 23, 2015},
  pages        = {807--808},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2702613.2725423},
  doi          = {10.1145/2702613.2725423},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/Chang15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ChangGS15,
  author       = {Donghoon Chang and
                  Mohona Ghosh and
                  Somitra Kumar Sanadhya},
  editor       = {Dongdai Lin and
                  XiaoFeng Wang and
                  Moti Yung},
  title        = {Biclique Cryptanalysis of Full Round {AES-128} Based Hashing Modes},
  booktitle    = {Information Security and Cryptology - 11th International Conference,
                  Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9589},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-38898-4\_1},
  doi          = {10.1007/978-3-319-38898-4\_1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ChangGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AkshimaCGGS15,
  author       = {Akshima and
                  Donghoon Chang and
                  Mohona Ghosh and
                  Aarushi Goel and
                  Somitra Kumar Sanadhya},
  editor       = {Soonhak Kwon and
                  Aaram Yun},
  title        = {Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512},
  booktitle    = {Information Security and Cryptology - {ICISC} 2015 - 18th International
                  Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9558},
  pages        = {119--135},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30840-1\_8},
  doi          = {10.1007/978-3-319-30840-1\_8},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AkshimaCGGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChangCKK15,
  author       = {Donghoon Chang and
                  Amit Kumar Chauhan and
                  Muhammed Noufal K and
                  Jinkeon Kang},
  editor       = {Soonhak Kwon and
                  Aaram Yun},
  title        = {Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden
                  Tweaks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2015 - 18th International
                  Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9558},
  pages        = {194--209},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30840-1\_13},
  doi          = {10.1007/978-3-319-30840-1\_13},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/ChangCKK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/ChangSS15,
  author       = {Donghoon Chang and
                  Somitra Kumar Sanadhya and
                  Nishant Sharma},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {New {HMAC} Message Patches: Secret Patch and CrOw Patch},
  booktitle    = {Information Systems Security - 11th International Conference, {ICISS}
                  2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {285--302},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26961-0\_17},
  doi          = {10.1007/978-3-319-26961-0\_17},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/ChangSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/AkshimaCGGS15,
  author       = {Akshima and
                  Donghoon Chang and
                  Mohona Ghosh and
                  Aarushi Goel and
                  Somitra Kumar Sanadhya},
  editor       = {Alex Biryukov and
                  Vipul Goyal},
  title        = {Improved Meet-in-the-Middle Attacks on 7 and 8-Round {ARIA-192} and
                  {ARIA-256}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference
                  on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9462},
  pages        = {198--217},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26617-6\_11},
  doi          = {10.1007/978-3-319-26617-6\_11},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/AkshimaCGGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ChangRS15,
  author       = {Donghoon Chang and
                  Sumesh Manjunath R. and
                  Somitra Kumar Sanadhya},
  editor       = {Man Ho Au and
                  Atsuko Miyaji},
  title        = {{PPAE:} Practical Parazoa Authenticated Encryption Family},
  booktitle    = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
                  Japan, November 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9451},
  pages        = {198--211},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26059-4\_11},
  doi          = {10.1007/978-3-319-26059-4\_11},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ChangRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangJMS15,
  author       = {Donghoon Chang and
                  Arpan Jati and
                  Sweta Mishra and
                  Somitra Kumar Sanadhya},
  title        = {Rig: {A} simple, secure and flexible design for Password Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {9},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangJMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangJMS15a,
  author       = {Donghoon Chang and
                  Arpan Jati and
                  Sweta Mishra and
                  Somitra Kumar Sanadhya},
  title        = {Performance Analysis of Some Password Hashing Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {139},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/139},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangJMS15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalCGS15,
  author       = {Megha Agrawal and
                  Donghoon Chang and
                  Mohona Ghosh and
                  Somitra Kumar Sanadhya},
  title        = {Collision Attack on 4-branch, Type-2 {GFN} based Hash Functions using
                  Sliced Biclique Cryptanalysis Technique},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {234},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/234},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalCGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BansalCS15,
  author       = {Tarun Kumar Bansal and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  title        = {Sponge based {CCA2} secure asymmetric encryption for arbitrary length
                  message},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {330},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/330},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BansalCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalCS15,
  author       = {Megha Agrawal and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  title        = {A New Authenticated Encryption Technique for Handling Long Ciphertexts
                  in Memory Constrained Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {331},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/331},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkshimaCGGS15,
  author       = {Akshima and
                  Donghoon Chang and
                  Mohona Ghosh and
                  Aarushi Goel and
                  Somitra Kumar Sanadhya},
  title        = {Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1227},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1227},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkshimaCGGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/AgrawalCGS14,
  author       = {Megha Agrawal and
                  Donghoon Chang and
                  Mohona Ghosh and
                  Somitra Kumar Sanadhya},
  editor       = {Dongdai Lin and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Collision Attack on 4-Branch, Type-2 {GFN} Based Hash Functions Using
                  Sliced Biclique Cryptanalysis Technique},
  booktitle    = {Information Security and Cryptology - 10th International Conference,
                  Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8957},
  pages        = {343--360},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16745-9\_19},
  doi          = {10.1007/978-3-319-16745-9\_19},
  timestamp    = {Fri, 09 Apr 2021 18:52:22 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/AgrawalCGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ChangJMS14,
  author       = {Donghoon Chang and
                  Arpan Jati and
                  Sweta Mishra and
                  Somitra Kumar Sanadhya},
  editor       = {Dongdai Lin and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Rig: {A} Simple, Secure and Flexible Design for Password Hashing},
  booktitle    = {Information Security and Cryptology - 10th International Conference,
                  Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8957},
  pages        = {361--381},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-16745-9\_20},
  doi          = {10.1007/978-3-319-16745-9\_20},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ChangJMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/BogdanovCGS14,
  author       = {Andrey Bogdanov and
                  Donghoon Chang and
                  Mohona Ghosh and
                  Somitra Kumar Sanadhya},
  editor       = {Jooyoung Lee and
                  Jongsung Kim},
  title        = {Bicliques with Minimal Data and Time Complexity for {AES}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2014 - 17th International
                  Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8949},
  pages        = {160--174},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15943-0\_10},
  doi          = {10.1007/978-3-319-15943-0\_10},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/BogdanovCGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/passwords/ChangJMS14,
  author       = {Donghoon Chang and
                  Arpan Jati and
                  Sweta Mishra and
                  Somitra Kumar Sanadhya},
  editor       = {Stig Fr. Mj{\o}lsnes},
  title        = {Cryptographic Module Based Approach for Password Hashing Schemes},
  booktitle    = {Technology and Practice of Passwords - International Conference on
                  Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9393},
  pages        = {39--57},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-24192-0\_3},
  doi          = {10.1007/978-3-319-24192-0\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/passwords/ChangJMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovCGS14,
  author       = {Andrey Bogdanov and
                  Donghoon Chang and
                  Mohona Ghosh and
                  Somitra Kumar Sanadhya},
  title        = {Bicliques with Minimal Data and Time Complexity for {AES} (Extended
                  Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {932},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/932},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BogdanovCGS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ChangKS13,
  author       = {Donghoon Chang and
                  Abhishek Kumar and
                  Somitra Kumar Sanadhya},
  editor       = {Goutam Paul and
                  Serge Vaudenay},
  title        = {Security Analysis of {GFN:} 8-Round Distinguisher for 4-Branch Type-2
                  {GFN}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2013 - 14th International Conference
                  on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8250},
  pages        = {136--148},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03515-4\_9},
  doi          = {10.1007/978-3-319-03515-4\_9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ChangKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Chang12,
  author       = {Donghoon Chang},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {Sufficient Conditions on Padding Schemes of Sponge Construction and
                  Sponge-Based Authenticated-Encryption Scheme},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {545--563},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_31},
  doi          = {10.1007/978-3-642-34931-7\_31},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Chang12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangY12,
  author       = {Donghoon Chang and
                  Moti Yung},
  title        = {Adaptive Preimage Resistance Analysis Revisited: {\textbackslash}{\textbackslash}
                  Requirements, Subtleties and Implications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ChangNY11,
  author       = {Donghoon Chang and
                  Mridul Nandi and
                  Moti Yung},
  editor       = {Antoine Joux},
  title        = {On the Security of Hash Functions Employing Blockcipher Postprocessing},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {146--166},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_9},
  doi          = {10.1007/978-3-642-21702-9\_9},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/ChangNY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangNY11,
  author       = {Donghoon Chang and
                  Mridul Nandi and
                  Moti Yung},
  title        = {Indifferentiability of the Hash Algorithm {BLAKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {623},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/623},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangNY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangNY10,
  author       = {Donghoon Chang and
                  Mridul Nandi and
                  Moti Yung},
  title        = {On the Security of Hash Functions Employing Blockcipher Postprocessing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {629},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/629},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangNY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ChangNLSHLPC08,
  author       = {Donghoon Chang and
                  Mridul Nandi and
                  Jesang Lee and
                  Jaechul Sung and
                  Seokhie Hong and
                  Jongin Lim and
                  Haeryong Park and
                  Kilsoo Chun},
  title        = {Compression Function Design Principles Supporting Variable Output
                  Lengths from a Single Small Function},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {9},
  pages        = {2607--2614},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.9.2607},
  doi          = {10.1093/IETFEC/E91-A.9.2607},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/ChangNLSHLPC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LeeCKSH08,
  author       = {Eunjin Lee and
                  Donghoon Chang and
                  Jongsung Kim and
                  Jaechul Sung and
                  Seokhie Hong},
  editor       = {Kaisa Nyberg},
  title        = {Second Preimage Attack on 3-Pass {HAVAL} and Partial Key-Recovery
                  Attacks on HMAC/NMAC-3-Pass {HAVAL}},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {189--206},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_12},
  doi          = {10.1007/978-3-540-71039-4\_12},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/LeeCKSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ChangN08,
  author       = {Donghoon Chang and
                  Mridul Nandi},
  editor       = {Kaisa Nyberg},
  title        = {Improved Indifferentiability Security Analysis of chopMD Hash Function},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {429--443},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_27},
  doi          = {10.1007/978-3-540-71039-4\_27},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/ChangN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangSHL08,
  author       = {Donghoon Chang and
                  Jaechul Sung and
                  Seokhie Hong and
                  Sangjin Lee},
  title        = {Improved Cryptanalysis of {APOP-MD4} and {NMAC-MD4} using New Differential
                  Paths},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/048},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangSHL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangN08,
  author       = {Donghoon Chang and
                  Mridul Nandi},
  title        = {A Short Proof of the {PRP/PRF} Switching Lemma},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {78},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/078},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangSHL08a,
  author       = {Donghoon Chang and
                  Jaechul Sung and
                  Seokhie Hong and
                  Sangjin Lee},
  title        = {Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP,
                  chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {407},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/407},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangSHL08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangHSL08,
  author       = {Donghoon Chang and
                  Seokhie Hong and
                  Jaechul Sung and
                  Sangjin Lee},
  title        = {Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications
                  based on the Extension},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {460},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/460},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangHSL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChangYSHL07,
  author       = {Donghoon Chang and
                  Moti Yung and
                  Jaechul Sung and
                  Seokhie Hong and
                  Sangjin Lee},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Preimage Attack on the Parallel FFT-Hashing Function},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {59--67},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_5},
  doi          = {10.1007/978-3-540-73458-1\_5},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChangYSHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HongCSLHLMC07,
  author       = {Deukjo Hong and
                  Donghoon Chang and
                  Jaechul Sung and
                  Sangjin Lee and
                  Seokhie Hong and
                  Jesang Lee and
                  Dukjae Moon and
                  Sungtaek Chee},
  title        = {New {FORK-256}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/185},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HongCSLHLMC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangNLSH07,
  author       = {Donghoon Chang and
                  Mridul Nandi and
                  Jesang Lee and
                  Jaechul Sung and
                  Seokhie Hong},
  title        = {Compression Function Design Principles Supporting Variable Output
                  Lengths from a Single Small Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {416},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/416},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangNLSH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChangLNY06,
  author       = {Donghoon Chang and
                  Sangjin Lee and
                  Mridul Nandi and
                  Moti Yung},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {Indifferentiable Security Analysis of Popular Hash Functions with
                  Prefix-Free Padding},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {283--298},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_19},
  doi          = {10.1007/11935230\_19},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChangLNY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HongSHLLKLCLJKKC06,
  author       = {Deukjo Hong and
                  Jaechul Sung and
                  Seokhie Hong and
                  Jongin Lim and
                  Sangjin Lee and
                  Bonseok Koo and
                  Changhoon Lee and
                  Donghoon Chang and
                  Jesang Lee and
                  Kitae Jeong and
                  Hyun Kim and
                  Jongsung Kim and
                  Seongtaek Chee},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {{HIGHT:} {A} New Block Cipher Suitable for Low-Resource Device},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {46--59},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_4},
  doi          = {10.1007/11894063\_4},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HongSHLLKLCLJKKC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HongCSLHLMC06,
  author       = {Deukjo Hong and
                  Donghoon Chang and
                  Jaechul Sung and
                  Sangjin Lee and
                  Seokhie Hong and
                  Jaesang Lee and
                  Dukjae Moon and
                  Sungtaek Chee},
  editor       = {Matthew J. B. Robshaw},
  title        = {A New Dedicated 256-Bit Hash Function: {FORK-256}},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {195--209},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_13},
  doi          = {10.1007/11799313\_13},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HongCSLHLMC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ChangGN06,
  author       = {Donghoon Chang and
                  Kishan Chand Gupta and
                  Mridul Nandi},
  editor       = {Rana Barua and
                  Tanja Lange},
  title        = {RC4-Hash: {A} New Hash Function Based on {RC4}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
                  on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4329},
  pages        = {80--94},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11941378\_7},
  doi          = {10.1007/11941378\_7},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ChangGN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vietcrypt/LeeHCHL06,
  author       = {Eunjin Lee and
                  Deukjo Hong and
                  Donghoon Chang and
                  Seokhie Hong and
                  Jongin Lim},
  editor       = {Phong Q. Nguyen},
  title        = {A Weak Key Class of {XTEA} for a Related-Key Rectangle Attack},
  booktitle    = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference
                  on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4341},
  pages        = {286--297},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11958239\_19},
  doi          = {10.1007/11958239\_19},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vietcrypt/LeeHCHL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chang06,
  author       = {Donghoon Chang},
  title        = {Preimage Attack on Hashing with Polynomials proposed at ICISC'06},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {411},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/411},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chang06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chang06a,
  author       = {Donghoon Chang},
  title        = {Preimage Attacks on CellHash, SubHash and Strengthened Versions of
                  CellHash and SubHash},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {412},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/412},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chang06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chang06b,
  author       = {Donghoon Chang},
  title        = {Preimage Attack on Parallel FFT-Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {413},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/413},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chang06b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangN06,
  author       = {Donghoon Chang and
                  Mridul Nandi},
  title        = {General Distinguishing Attacks on {NMAC} and {HMAC} with Birthday
                  Attack Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {441},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/441},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangN06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chang06c,
  author       = {Donghoon Chang},
  title        = {Preimage Attacks On Provably Secure {FFT} Hashing proposed at Second
                  Hash Workshop in 2006},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {460},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/460},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chang06c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChangY06,
  author       = {Donghoon Chang and
                  Moti Yung},
  title        = {Do We Need to Vary the Constants? (Methodological Investigation of
                  Block-Cipher Based Hash Functions)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/467},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChangY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chang06d,
  author       = {Donghoon Chang},
  title        = {Near-Collision Attack and Collision-Attack on Double Block Length
                  Compression Functions based on the Block Cipher {IDEA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {478},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/478},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chang06d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chang06e,
  author       = {Donghoon Chang},
  title        = {A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility
                  of Using the Constant As a Trapdoor In Several Double Block Length
                  Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {481},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/481},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chang06e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LeeNSCLS05,
  author       = {Wonil Lee and
                  Mridul Nandi and
                  Palash Sarkar and
                  Donghoon Chang and
                  Sangjin Lee and
                  Kouichi Sakurai},
  title        = {PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {39--48},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_39\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LeeNSCLS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LeeCLSN05,
  author       = {Wonil Lee and
                  Donghoon Chang and
                  Sangjin Lee and
                  Soo Hak Sung and
                  Mridul Nandi},
  title        = {Construction of {UOWHF:} Two New Parallel Methods},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {49--58},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_49\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LeeCLSN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YunSPCHC05,
  author       = {Aaram Yun and
                  Soo Hak Sung and
                  Sangwoo Park and
                  Donghoon Chang and
                  Seokhie Hong and
                  Hong{-}Su Cho},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Finding Collision on 45-Step {HAS-160}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {146--155},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_13},
  doi          = {10.1007/11734727\_13},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YunSPCHC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeNSCLS04,
  author       = {Wonil Lee and
                  Mridul Nandi and
                  Palash Sarkar and
                  Donghoon Chang and
                  Sangjin Lee and
                  Kouichi Sakurai},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Pseudorandomness of SPN-Type Transformations},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {212--223},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_19},
  doi          = {10.1007/978-3-540-27800-9\_19},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LeeNSCLS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ChangLHSLS04,
  author       = {Donghoon Chang and
                  Wonil Lee and
                  Seokhie Hong and
                  Jaechul Sung and
                  Sangjin Lee and
                  Soo Hak Sung},
  editor       = {Anne Canteaut and
                  Kapalee Viswanathan},
  title        = {Impossibility of Construction of {OWHF} and {UOWHF} from {PGV} Model
                  Based on Block Cipher Secure Against {ACPCA}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
                  on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3348},
  pages        = {328--342},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30556-9\_26},
  doi          = {10.1007/978-3-540-30556-9\_26},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ChangLHSLS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeeNSCLS04,
  author       = {Wonil Lee and
                  Mridul Nandi and
                  Palash Sarkar and
                  Donghoon Chang and
                  Sangjin Lee and
                  Kouichi Sakurai},
  title        = {A Generalization of PGV-Hash Functions and Security Analysis in Black-Box
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {69},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/069},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeeNSCLS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LeeCLSN03,
  author       = {Wonil Lee and
                  Donghoon Chang and
                  Sangjin Lee and
                  Soo Hak Sung and
                  Mridul Nandi},
  editor       = {Chi{-}Sung Laih},
  title        = {New Parallel Domain Extenders for {UOWHF}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {208--227},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_13},
  doi          = {10.1007/978-3-540-40061-5\_13},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LeeCLSN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HongHKCLL03,
  author       = {Seokhie Hong and
                  Deukjo Hong and
                  Youngdai Ko and
                  Donghoon Chang and
                  Wonil Lee and
                  Sangjin Lee},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {Differential Cryptanalysis of {TEA} and {XTEA}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {402--417},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_30},
  doi          = {10.1007/978-3-540-24691-6\_30},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/HongHKCLL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/ChangSSLL02,
  author       = {Donghoon Chang and
                  Jaechul Sung and
                  Soo Hak Sung and
                  Sangjin Lee and
                  Jongin Lim},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {Full-Round Differential Attack on the Original Version of the Hash
                  Function Proposed at PKC'98},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {160--174},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_12},
  doi          = {10.1007/3-540-36492-7\_12},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/ChangSSLL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics