Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Donghoon Chang
@article{DBLP:journals/iotj/HasanC24, author = {Munawar Hasan and Donghoon Chang}, title = {Lynx: Family of Lightweight Authenticated Encryption Schemes Based on Tweakable Blockcipher}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {8}, pages = {14357--14369}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3344677}, doi = {10.1109/JIOT.2023.3344677}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/HasanC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChangHKT23, author = {Donghoon Chang and Deukjo Hong and Jinkeon Kang and Meltem S{\"{o}}nmez Turan}, title = {Resistance of Ascon Family Against Conditional Cube Attacks in Nonce-Misuse Setting}, journal = {{IEEE} Access}, volume = {11}, pages = {4501--4516}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2022.3223991}, doi = {10.1109/ACCESS.2022.3223991}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ChangHKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LeeKCH23, author = {Yongseong Lee and Jinkeon Kang and Donghoon Chang and Seokhie Hong}, title = {A preimage attack on reduced {GIMLI-HASH} with unbalanced squeezing phase}, journal = {{IET} Inf. Secur.}, volume = {17}, number = {1}, pages = {66--79}, year = {2023}, url = {https://doi.org/10.1049/ise2.12060}, doi = {10.1049/ISE2.12060}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/LeeKCH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/ChangY23, author = {Donghoon Chang and Moti Yung}, editor = {Shlomi Dolev and Ehud Gudes and Pascal Paillier}, title = {Midgame Attacks and Defense Against Them}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, {CSCML} 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13914}, pages = {471--492}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-34671-2\_33}, doi = {10.1007/978-3-031-34671-2\_33}, timestamp = {Thu, 29 Jun 2023 08:38:21 +0200}, biburl = {https://dblp.org/rec/conf/cscml/ChangY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HasanC23, author = {Munawar Hasan and Donghoon Chang}, title = {Lynx: Family of Lightweight Authenticated Encryption Schemes based on Tweakable Blockcipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {241}, year = {2023}, url = {https://eprint.iacr.org/2023/241}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HasanC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/SinghKGCS22, author = {Monika Singh and Anviksha Khunteta and Mohona Ghosh and Donghoon Chang and Somitra Kumar Sanadhya}, title = {FbHash-E: {A} time and memory efficient version of FbHash similarity hashing algorithm}, journal = {Digit. Investig.}, volume = {41}, pages = {301375}, year = {2022}, url = {https://doi.org/10.1016/j.fsidi.2022.301375}, doi = {10.1016/J.FSIDI.2022.301375}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/SinghKGCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChangGHM22, author = {Donghoon Chang and Surabhi Garg and Munawar Hasan and Sweta Mishra}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {On Security of Fuzzy Commitment Scheme for Biometric Authentication}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {399--419}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_20}, doi = {10.1007/978-3-031-22301-3\_20}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChangGHM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangHK22, author = {Donghoon Chang and Deukjo Hong and Jinkeon Kang}, title = {Conditional Cube Attacks on Ascon-128 and Ascon-80pq in a Nonce-misuse Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {544}, year = {2022}, url = {https://eprint.iacr.org/2022/544}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangHKT22, author = {Donghoon Chang and Deukjo Hong and Jinkeon Kang and Meltem S{\"{o}}nmez Turan}, title = {Resistance of Ascon Family against Conditional Cube Attacks in Nonce-Misuse Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1456}, year = {2022}, url = {https://eprint.iacr.org/2022/1456}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChangHKT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChangGGH21, author = {Donghoon Chang and Surabhi Garg and Mohona Ghosh and Munawar Hasan}, title = {{BIOFUSE:} {A} framework for multi-biometric fusion on biocryptosystem level}, journal = {Inf. Sci.}, volume = {546}, pages = {481--511}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2020.08.065}, doi = {10.1016/J.INS.2020.08.065}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ChangGGH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LeeKCH21, author = {Yongseong Lee and Jinkeon Kang and Donghoon Chang and Seokhie Hong}, editor = {Jong Hwan Park and Seung{-}Hyun Seo}, title = {A Preimage Attack on Reduced Gimli-Hash}, booktitle = {Information Security and Cryptology - {ICISC} 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13218}, pages = {217--237}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-08896-4\_11}, doi = {10.1007/978-3-031-08896-4\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/LeeKCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangT21, author = {Donghoon Chang and Meltem S{\"{o}}nmez Turan}, title = {Recovering the Key from the Internal State of Grain-128AEAD}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {439}, year = {2021}, url = {https://eprint.iacr.org/2021/439}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JatiGCSC20, author = {Arpan Jati and Naina Gupta and Anupam Chattopadhyay and Somitra Kumar Sanadhya and Donghoon Chang}, title = {Threshold Implementations of \texttt{GIFT}: {A} Trade-Off Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {2110--2120}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2957974}, doi = {10.1109/TIFS.2019.2957974}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JatiGCSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChangGHM20, author = {Donghoon Chang and Surabhi Garg and Munawar Hasan and Sweta Mishra}, title = {Cancelable Multi-Biometric Approach Using Fuzzy Extractor and Novel Bit-Wise Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3152--3167}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2020.2983250}, doi = {10.1109/TIFS.2020.2983250}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChangGHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-00236, author = {Donghoon Chang and Vinjohn V. Chirakkal and Shubham Goswami and Munawar Hasan and Taekwon Jung and Jinkeon Kang and Seok{-}Cheol Kee and Dongkyu Lee and Ajit Pratap Singh}, title = {Multi-lane Detection Using Instance Segmentation and Attentive Voting}, journal = {CoRR}, volume = {abs/2001.00236}, year = {2020}, url = {http://arxiv.org/abs/2001.00236}, eprinttype = {arXiv}, eprint = {2001.00236}, timestamp = {Fri, 10 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-00236.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChangGSSW19, author = {Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya and Monika Singh and Douglas R. White}, title = {FbHash: {A} New Similarity Hashing Scheme for Digital Forensics}, journal = {Digit. Investig.}, volume = {29 Supplement}, pages = {S113--S123}, year = {2019}, url = {https://doi.org/10.1016/j.diin.2019.04.006}, doi = {10.1016/J.DIIN.2019.04.006}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/ChangGSSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ChangJMS19, author = {Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya}, title = {Cryptanalytic time-memory trade-off for password hashing schemes}, journal = {Int. J. Inf. Sec.}, volume = {18}, number = {2}, pages = {163--180}, year = {2019}, url = {https://doi.org/10.1007/s10207-018-0405-5}, doi = {10.1007/S10207-018-0405-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ChangJMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/ChangGJKS19, author = {Donghoon Chang and Mohona Ghosh and Arpan Jati and Abhishek Kumar and Somitra Kumar Sanadhya}, title = {A Generalized Format Preserving Encryption Framework Using {MDS} Matrices}, journal = {J. Hardw. Syst. Secur.}, volume = {3}, number = {1}, pages = {3--11}, year = {2019}, url = {https://doi.org/10.1007/s41635-019-00065-x}, doi = {10.1007/S41635-019-00065-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/ChangGJKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChangGMS19, author = {Akshima and Donghoon Chang and Aarushi Goel and Sweta Mishra and Somitra Kumar Sanadhya}, title = {Generation of Secure and Reliable Honeywords, Preventing False Detection}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {5}, pages = {757--769}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2018.2824323}, doi = {10.1109/TDSC.2018.2824323}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChangGMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChangDDMNSS19, author = {Donghoon Chang and Nilanjan Datta and Avijit Dutta and Bart Mennink and Mridul Nandi and Somitra Sanadhya and Ferdinand Sibleyras}, title = {Release of Unverified Plaintext: Tight Unified Model and Application to {ANYDAE}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {4}, pages = {119--146}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i4.119-146}, doi = {10.13154/TOSC.V2019.I4.119-146}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChangDDMNSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/Agrawal0C19, author = {Megha Agrawal and Jianying Zhou and Donghoon Chang}, editor = {Cristina Alcaraz}, title = {A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT}, booktitle = {Security and Privacy Trends in the Industrial Internet of Things}, pages = {71--94}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12330-7\_4}, doi = {10.1007/978-3-030-12330-7\_4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/19/Agrawal0C19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangDDMNSS19, author = {Donghoon Chang and Nilanjan Datta and Avijit Dutta and Bart Mennink and Mridul Nandi and Somitra Sanadhya and Ferdinand Sibleyras}, title = {Release of Unverified Plaintext: Tight Unified Model and Application to {ANYDAE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1326}, year = {2019}, url = {https://eprint.iacr.org/2019/1326}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangDDMNSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangHJ19, author = {Donghoon Chang and Munawar Hasan and Pranav Jain}, title = {Spy Based Analysis of Selfish Mining Attack on Multi-Stage Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1327}, year = {2019}, url = {https://eprint.iacr.org/2019/1327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangHJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AgrawalCK18, author = {Megha Agrawal and Donghoon Chang and Jinkeon Kang}, title = {Deterministic Authenticated Encryption Scheme for Memory Constrained Devices}, journal = {Cryptogr.}, volume = {2}, number = {4}, pages = {37}, year = {2018}, url = {https://doi.org/10.3390/cryptography2040037}, doi = {10.3390/CRYPTOGRAPHY2040037}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AgrawalCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/AgrawalBCCHKS18, author = {Megha Agrawal and Tarun Kumar Bansal and Donghoon Chang and Amit Kumar Chauhan and Seokhie Hong and Jinkeon Kang and Somitra Kumar Sanadhya}, title = {{RCB:} leakage-resilient authenticated encryption via re-keying}, journal = {J. Supercomput.}, volume = {74}, number = {9}, pages = {4173--4198}, year = {2018}, url = {https://doi.org/10.1007/s11227-016-1824-6}, doi = {10.1007/S11227-016-1824-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/AgrawalBCCHKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ChangCKS18, author = {Donghoon Chang and Amit Kumar Chauhan and Sandeep Kumar and Somitra Kumar Sanadhya}, editor = {Nigel P. Smart}, title = {Revocable Identity-Based Encryption from Codes with Rank Metric}, booktitle = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10808}, pages = {435--451}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76953-0\_23}, doi = {10.1007/978-3-319-76953-0\_23}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ChangCKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AgrawalHZC18, author = {Megha Agrawal and Tianxiang Huang and Jianying Zhou and Donghoon Chang}, editor = {Brahim Hamid and Barbara Gallina and Asaf Shabtai and Yuval Elovici and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {CAN-FD-Sec: Improving Security of {CAN-FD} Protocol}, booktitle = {Security and Safety Interplay of Intelligent Software Systems - {ESORICS} 2018 International Workshops, ISSA/CSITS@ESORICS 2018, Barcelona, Spain, September 6-7, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11552}, pages = {77--93}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-16874-2\_6}, doi = {10.1007/978-3-030-16874-2\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AgrawalHZC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eusipco/DrozdowskiGRGCB18, author = {Pawel Drozdowski and Surabhi Garg and Christian Rathgeb and Marta Gomez{-}Barrero and Donghoon Chang and Christoph Busch}, title = {Privacy-Preserving Indexing of Iris-Codes with Cancelable Bloom Filter-based Search Structures}, booktitle = {26th European Signal Processing Conference, {EUSIPCO} 2018, Roma, Italy, September 3-7, 2018}, pages = {2360--2364}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/EUSIPCO.2018.8553053}, doi = {10.23919/EUSIPCO.2018.8553053}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eusipco/DrozdowskiGRGCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangCKS18, author = {Donghoon Chang and Amit Kumar Chauhan and Sandeep Kumar and Somitra Kumar Sanadhya}, title = {Revocable Identity-based Encryption from Codes with Rank Metric}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2018}, url = {https://eprint.iacr.org/2018/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangCKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChangKS17, author = {Donghoon Chang and Abhishek Kumar and Somitra Kumar Sanadhya}, title = {Distinguishers for 4-Branch and 8-Branch Generalized Feistel Network}, journal = {{IEEE} Access}, volume = {5}, pages = {27857--27867}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2688427}, doi = {10.1109/ACCESS.2017.2688427}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ChangKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/AgrawalCS17, author = {Megha Agrawal and Donghoon Chang and Somitra Kumar Sanadhya}, title = {A new authenticated encryption technique for handling long ciphertexts in memory constrained devices}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {3}, pages = {236--261}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10007291}, doi = {10.1504/IJACT.2017.10007291}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/AgrawalCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/BansalCS17, author = {Tarun Kumar Bansal and Donghoon Chang and Somitra Kumar Sanadhya}, title = {Sponge-based {CCA2} secure asymmetric encryption for arbitrary length message (extended version)}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {3}, pages = {262--287}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10007290}, doi = {10.1504/IJACT.2017.10007290}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/BansalCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhss/RoyCCKMN17, author = {Debapriya Basu Roy and Avik Chakraborti and Donghoon Chang and S. V. Dilip Kumar and Debdeep Mukhopadhyay and Mridul Nandi}, title = {Two Efficient Fault-Based Attacks on {CLOC} and {SILC}}, journal = {J. Hardw. Syst. Secur.}, volume = {1}, number = {3}, pages = {252--268}, year = {2017}, url = {https://doi.org/10.1007/s41635-017-0022-1}, doi = {10.1007/S41635-017-0022-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhss/RoyCCKMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/ChangGJ0S17, author = {Donghoon Chang and Mohona Ghosh and Arpan Jati and Abhishek Kumar and Somitra Kumar Sanadhya}, editor = {Sk Subidh Ali and Jean{-}Luc Danger and Thomas Eisenbarth}, title = {eSPF: {A} Family of Format-Preserving Encryption Algorithms Using {MDS} Matrices}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 7th International Conference, {SPACE} 2017, Goa, India, December 13-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10662}, pages = {133--150}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71501-8\_8}, doi = {10.1007/978-3-319-71501-8\_8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/ChangGJ0S17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangJMS17, author = {Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya}, title = {Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {603}, year = {2017}, url = {http://eprint.iacr.org/2017/603}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangJMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangMSS17, author = {Donghoon Chang and Sweta Mishra and Somitra Kumar Sanadhya and Ajit Pratap Singh}, title = {On Making {U2F} Protocol Leakage-Resilient via Re-keying}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {721}, year = {2017}, url = {http://eprint.iacr.org/2017/721}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangMSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdfsl/SinghCS16, author = {Monika Singh and Donghoon Chang and Somitra Kumar Sanadhya}, title = {Security Analysis of mvHash-B Similarity Hashing}, journal = {J. Digit. Forensics Secur. Law}, volume = {11}, number = {2}, pages = {21--34}, year = {2016}, url = {https://doi.org/10.15394/jdfsl.2016.1376}, doi = {10.15394/JDFSL.2016.1376}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdfsl/SinghCS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChangGGJ0MRS16, author = {Donghoon Chang and Mohona Ghosh and Kishan Chand Gupta and Arpan Jati and Abhishek Kumar and Dukjae Moon and Indranil Ghosh Ray and Somitra Kumar Sanadhya}, editor = {Kefei Chen and Dongdai Lin and Moti Yung}, title = {{SPF:} {A} New Family of Efficient Format-Preserving Encryption Algorithms}, booktitle = {Information Security and Cryptology - 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10143}, pages = {64--83}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-54705-3\_5}, doi = {10.1007/978-3-319-54705-3\_5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChangGGJ0MRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/RoyCCKMN16, author = {Debapriya Basu Roy and Avik Chakraborti and Donghoon Chang and S. V. Dilip Kumar and Debdeep Mukhopadhyay and Mridul Nandi}, editor = {Claude Carlet and M. Anwar Hasan and Vishal Saraswat}, title = {Fault Based Almost Universal Forgeries on {CLOC} and {SILC}}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10076}, pages = {66--86}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49445-6\_4}, doi = {10.1007/978-3-319-49445-6\_4}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/space/RoyCCKMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/ChangCGJS16, author = {Donghoon Chang and Amit Kumar Chauhan and Naina Gupta and Arpan Jati and Somitra Kumar Sanadhya}, editor = {Claude Carlet and M. Anwar Hasan and Vishal Saraswat}, title = {Exploiting the Leakage: Analysis of Some Authenticated Encryption Schemes}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, {SPACE} 2016, Hyderabad, India, December 14-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10076}, pages = {383--401}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49445-6\_22}, doi = {10.1007/978-3-319-49445-6\_22}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/space/ChangCGJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BansalCS15, author = {Tarun Kumar Bansal and Donghoon Chang and Somitra Kumar Sanadhya}, editor = {Ernest Foo and Douglas Stebila}, title = {Sponge Based {CCA2} Secure Asymmetric Encryption for Arbitrary Length Message}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {93--106}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_6}, doi = {10.1007/978-3-319-19962-7\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BansalCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AgrawalCS15, author = {Megha Agrawal and Donghoon Chang and Somitra Sanadhya}, editor = {Ernest Foo and Douglas Stebila}, title = {sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {451--468}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_26}, doi = {10.1007/978-3-319-19962-7\_26}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AgrawalCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/Chang15, author = {Donghoon Chang}, editor = {Bo Begole and Jinwoo Kim and Kori Inkpen and Woontack Woo}, title = {Tuesday Keynote: {UX} Design in the IoT Era}, booktitle = {Proceedings of the 33rd Annual {ACM} Conference Extended Abstracts on Human Factors in Computing Systems, Seoul, {CHI} 2015 Extended Abstracts, Republic of Korea, April 18 - 23, 2015}, pages = {807--808}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2702613.2725423}, doi = {10.1145/2702613.2725423}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/Chang15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChangGS15, author = {Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya}, editor = {Dongdai Lin and XiaoFeng Wang and Moti Yung}, title = {Biclique Cryptanalysis of Full Round {AES-128} Based Hashing Modes}, booktitle = {Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9589}, pages = {3--21}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-38898-4\_1}, doi = {10.1007/978-3-319-38898-4\_1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChangGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/AkshimaCGGS15, author = {Akshima and Donghoon Chang and Mohona Ghosh and Aarushi Goel and Somitra Kumar Sanadhya}, editor = {Soonhak Kwon and Aaram Yun}, title = {Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512}, booktitle = {Information Security and Cryptology - {ICISC} 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9558}, pages = {119--135}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30840-1\_8}, doi = {10.1007/978-3-319-30840-1\_8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/AkshimaCGGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChangCKK15, author = {Donghoon Chang and Amit Kumar Chauhan and Muhammed Noufal K and Jinkeon Kang}, editor = {Soonhak Kwon and Aaram Yun}, title = {Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks}, booktitle = {Information Security and Cryptology - {ICISC} 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9558}, pages = {194--209}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30840-1\_13}, doi = {10.1007/978-3-319-30840-1\_13}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/ChangCKK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/ChangSS15, author = {Donghoon Chang and Somitra Kumar Sanadhya and Nishant Sharma}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {New {HMAC} Message Patches: Secret Patch and CrOw Patch}, booktitle = {Information Systems Security - 11th International Conference, {ICISS} 2015, Kolkata, India, December 16-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {285--302}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26961-0\_17}, doi = {10.1007/978-3-319-26961-0\_17}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/ChangSS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/AkshimaCGGS15, author = {Akshima and Donghoon Chang and Mohona Ghosh and Aarushi Goel and Somitra Kumar Sanadhya}, editor = {Alex Biryukov and Vipul Goyal}, title = {Improved Meet-in-the-Middle Attacks on 7 and 8-Round {ARIA-192} and {ARIA-256}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2015 - 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9462}, pages = {198--217}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26617-6\_11}, doi = {10.1007/978-3-319-26617-6\_11}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/AkshimaCGGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ChangRS15, author = {Donghoon Chang and Sumesh Manjunath R. and Somitra Kumar Sanadhya}, editor = {Man Ho Au and Atsuko Miyaji}, title = {{PPAE:} Practical Parazoa Authenticated Encryption Family}, booktitle = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9451}, pages = {198--211}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26059-4\_11}, doi = {10.1007/978-3-319-26059-4\_11}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ChangRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangJMS15, author = {Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya}, title = {Rig: {A} simple, secure and flexible design for Password Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {9}, year = {2015}, url = {http://eprint.iacr.org/2015/009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangJMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangJMS15a, author = {Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya}, title = {Performance Analysis of Some Password Hashing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2015}, url = {http://eprint.iacr.org/2015/139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangJMS15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalCGS15, author = {Megha Agrawal and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya}, title = {Collision Attack on 4-branch, Type-2 {GFN} based Hash Functions using Sliced Biclique Cryptanalysis Technique}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {234}, year = {2015}, url = {http://eprint.iacr.org/2015/234}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalCGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BansalCS15, author = {Tarun Kumar Bansal and Donghoon Chang and Somitra Kumar Sanadhya}, title = {Sponge based {CCA2} secure asymmetric encryption for arbitrary length message}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {330}, year = {2015}, url = {http://eprint.iacr.org/2015/330}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BansalCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalCS15, author = {Megha Agrawal and Donghoon Chang and Somitra Kumar Sanadhya}, title = {A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2015}, url = {http://eprint.iacr.org/2015/331}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkshimaCGGS15, author = {Akshima and Donghoon Chang and Mohona Ghosh and Aarushi Goel and Somitra Kumar Sanadhya}, title = {Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1227}, year = {2015}, url = {http://eprint.iacr.org/2015/1227}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkshimaCGGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/AgrawalCGS14, author = {Megha Agrawal and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya}, editor = {Dongdai Lin and Moti Yung and Jianying Zhou}, title = {Collision Attack on 4-Branch, Type-2 {GFN} Based Hash Functions Using Sliced Biclique Cryptanalysis Technique}, booktitle = {Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8957}, pages = {343--360}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16745-9\_19}, doi = {10.1007/978-3-319-16745-9\_19}, timestamp = {Fri, 09 Apr 2021 18:52:22 +0200}, biburl = {https://dblp.org/rec/conf/cisc/AgrawalCGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ChangJMS14, author = {Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya}, editor = {Dongdai Lin and Moti Yung and Jianying Zhou}, title = {Rig: {A} Simple, Secure and Flexible Design for Password Hashing}, booktitle = {Information Security and Cryptology - 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8957}, pages = {361--381}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-16745-9\_20}, doi = {10.1007/978-3-319-16745-9\_20}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ChangJMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/BogdanovCGS14, author = {Andrey Bogdanov and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya}, editor = {Jooyoung Lee and Jongsung Kim}, title = {Bicliques with Minimal Data and Time Complexity for {AES}}, booktitle = {Information Security and Cryptology - {ICISC} 2014 - 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8949}, pages = {160--174}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15943-0\_10}, doi = {10.1007/978-3-319-15943-0\_10}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/BogdanovCGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/passwords/ChangJMS14, author = {Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya}, editor = {Stig Fr. Mj{\o}lsnes}, title = {Cryptographic Module Based Approach for Password Hashing Schemes}, booktitle = {Technology and Practice of Passwords - International Conference on Passwords, PASSWORDS'14, Trondheim, Norway, December 8-10, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9393}, pages = {39--57}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-24192-0\_3}, doi = {10.1007/978-3-319-24192-0\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/passwords/ChangJMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BogdanovCGS14, author = {Andrey Bogdanov and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya}, title = {Bicliques with Minimal Data and Time Complexity for {AES} (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {932}, year = {2014}, url = {http://eprint.iacr.org/2014/932}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BogdanovCGS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ChangKS13, author = {Donghoon Chang and Abhishek Kumar and Somitra Kumar Sanadhya}, editor = {Goutam Paul and Serge Vaudenay}, title = {Security Analysis of {GFN:} 8-Round Distinguisher for 4-Branch Type-2 {GFN}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2013 - 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8250}, pages = {136--148}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03515-4\_9}, doi = {10.1007/978-3-319-03515-4\_9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/ChangKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Chang12, author = {Donghoon Chang}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {Sufficient Conditions on Padding Schemes of Sponge Construction and Sponge-Based Authenticated-Encryption Scheme}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {545--563}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_31}, doi = {10.1007/978-3-642-34931-7\_31}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Chang12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangY12, author = {Donghoon Chang and Moti Yung}, title = {Adaptive Preimage Resistance Analysis Revisited: {\textbackslash}{\textbackslash} Requirements, Subtleties and Implications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {209}, year = {2012}, url = {http://eprint.iacr.org/2012/209}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ChangNY11, author = {Donghoon Chang and Mridul Nandi and Moti Yung}, editor = {Antoine Joux}, title = {On the Security of Hash Functions Employing Blockcipher Postprocessing}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {146--166}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_9}, doi = {10.1007/978-3-642-21702-9\_9}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/ChangNY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangNY11, author = {Donghoon Chang and Mridul Nandi and Moti Yung}, title = {Indifferentiability of the Hash Algorithm {BLAKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {623}, year = {2011}, url = {http://eprint.iacr.org/2011/623}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangNY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangNY10, author = {Donghoon Chang and Mridul Nandi and Moti Yung}, title = {On the Security of Hash Functions Employing Blockcipher Postprocessing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {629}, year = {2010}, url = {http://eprint.iacr.org/2010/629}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangNY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ChangNLSHLPC08, author = {Donghoon Chang and Mridul Nandi and Jesang Lee and Jaechul Sung and Seokhie Hong and Jongin Lim and Haeryong Park and Kilsoo Chun}, title = {Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {9}, pages = {2607--2614}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.9.2607}, doi = {10.1093/IETFEC/E91-A.9.2607}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/ChangNLSHLPC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LeeCKSH08, author = {Eunjin Lee and Donghoon Chang and Jongsung Kim and Jaechul Sung and Seokhie Hong}, editor = {Kaisa Nyberg}, title = {Second Preimage Attack on 3-Pass {HAVAL} and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass {HAVAL}}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {189--206}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_12}, doi = {10.1007/978-3-540-71039-4\_12}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/LeeCKSH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ChangN08, author = {Donghoon Chang and Mridul Nandi}, editor = {Kaisa Nyberg}, title = {Improved Indifferentiability Security Analysis of chopMD Hash Function}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {429--443}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_27}, doi = {10.1007/978-3-540-71039-4\_27}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/ChangN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangSHL08, author = {Donghoon Chang and Jaechul Sung and Seokhie Hong and Sangjin Lee}, title = {Improved Cryptanalysis of {APOP-MD4} and {NMAC-MD4} using New Differential Paths}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2008}, url = {http://eprint.iacr.org/2008/048}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangSHL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangN08, author = {Donghoon Chang and Mridul Nandi}, title = {A Short Proof of the {PRP/PRF} Switching Lemma}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {78}, year = {2008}, url = {http://eprint.iacr.org/2008/078}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangSHL08a, author = {Donghoon Chang and Jaechul Sung and Seokhie Hong and Sangjin Lee}, title = {Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {407}, year = {2008}, url = {http://eprint.iacr.org/2008/407}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangSHL08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangHSL08, author = {Donghoon Chang and Seokhie Hong and Jaechul Sung and Sangjin Lee}, title = {Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {460}, year = {2008}, url = {http://eprint.iacr.org/2008/460}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangHSL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChangYSHL07, author = {Donghoon Chang and Moti Yung and Jaechul Sung and Seokhie Hong and Sangjin Lee}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Preimage Attack on the Parallel FFT-Hashing Function}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {59--67}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_5}, doi = {10.1007/978-3-540-73458-1\_5}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChangYSHL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HongCSLHLMC07, author = {Deukjo Hong and Donghoon Chang and Jaechul Sung and Sangjin Lee and Seokhie Hong and Jesang Lee and Dukjae Moon and Sungtaek Chee}, title = {New {FORK-256}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2007}, url = {http://eprint.iacr.org/2007/185}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HongCSLHLMC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangNLSH07, author = {Donghoon Chang and Mridul Nandi and Jesang Lee and Jaechul Sung and Seokhie Hong}, title = {Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {416}, year = {2007}, url = {http://eprint.iacr.org/2007/416}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangNLSH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChangLNY06, author = {Donghoon Chang and Sangjin Lee and Mridul Nandi and Moti Yung}, editor = {Xuejia Lai and Kefei Chen}, title = {Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {283--298}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_19}, doi = {10.1007/11935230\_19}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChangLNY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HongSHLLKLCLJKKC06, author = {Deukjo Hong and Jaechul Sung and Seokhie Hong and Jongin Lim and Sangjin Lee and Bonseok Koo and Changhoon Lee and Donghoon Chang and Jesang Lee and Kitae Jeong and Hyun Kim and Jongsung Kim and Seongtaek Chee}, editor = {Louis Goubin and Mitsuru Matsui}, title = {{HIGHT:} {A} New Block Cipher Suitable for Low-Resource Device}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {46--59}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_4}, doi = {10.1007/11894063\_4}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/HongSHLLKLCLJKKC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HongCSLHLMC06, author = {Deukjo Hong and Donghoon Chang and Jaechul Sung and Sangjin Lee and Seokhie Hong and Jaesang Lee and Dukjae Moon and Sungtaek Chee}, editor = {Matthew J. B. Robshaw}, title = {A New Dedicated 256-Bit Hash Function: {FORK-256}}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {195--209}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_13}, doi = {10.1007/11799313\_13}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/HongCSLHLMC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ChangGN06, author = {Donghoon Chang and Kishan Chand Gupta and Mridul Nandi}, editor = {Rana Barua and Tanja Lange}, title = {RC4-Hash: {A} New Hash Function Based on {RC4}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4329}, pages = {80--94}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11941378\_7}, doi = {10.1007/11941378\_7}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/ChangGN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vietcrypt/LeeHCHL06, author = {Eunjin Lee and Deukjo Hong and Donghoon Chang and Seokhie Hong and Jongin Lim}, editor = {Phong Q. Nguyen}, title = {A Weak Key Class of {XTEA} for a Related-Key Rectangle Attack}, booktitle = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4341}, pages = {286--297}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11958239\_19}, doi = {10.1007/11958239\_19}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vietcrypt/LeeHCHL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chang06, author = {Donghoon Chang}, title = {Preimage Attack on Hashing with Polynomials proposed at ICISC'06}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {411}, year = {2006}, url = {http://eprint.iacr.org/2006/411}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chang06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chang06a, author = {Donghoon Chang}, title = {Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {412}, year = {2006}, url = {http://eprint.iacr.org/2006/412}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chang06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chang06b, author = {Donghoon Chang}, title = {Preimage Attack on Parallel FFT-Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {413}, year = {2006}, url = {http://eprint.iacr.org/2006/413}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chang06b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangN06, author = {Donghoon Chang and Mridul Nandi}, title = {General Distinguishing Attacks on {NMAC} and {HMAC} with Birthday Attack Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {441}, year = {2006}, url = {http://eprint.iacr.org/2006/441}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangN06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chang06c, author = {Donghoon Chang}, title = {Preimage Attacks On Provably Secure {FFT} Hashing proposed at Second Hash Workshop in 2006}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {460}, year = {2006}, url = {http://eprint.iacr.org/2006/460}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chang06c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChangY06, author = {Donghoon Chang and Moti Yung}, title = {Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2006}, url = {http://eprint.iacr.org/2006/467}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChangY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chang06d, author = {Donghoon Chang}, title = {Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher {IDEA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {478}, year = {2006}, url = {http://eprint.iacr.org/2006/478}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chang06d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chang06e, author = {Donghoon Chang}, title = {A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {481}, year = {2006}, url = {http://eprint.iacr.org/2006/481}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chang06e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LeeNSCLS05, author = {Wonil Lee and Mridul Nandi and Palash Sarkar and Donghoon Chang and Sangjin Lee and Kouichi Sakurai}, title = {PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {39--48}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_39\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LeeNSCLS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LeeCLSN05, author = {Wonil Lee and Donghoon Chang and Sangjin Lee and Soo Hak Sung and Mridul Nandi}, title = {Construction of {UOWHF:} Two New Parallel Methods}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {49--58}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_49\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LeeCLSN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YunSPCHC05, author = {Aaram Yun and Soo Hak Sung and Sangwoo Park and Donghoon Chang and Seokhie Hong and Hong{-}Su Cho}, editor = {Dongho Won and Seungjoo Kim}, title = {Finding Collision on 45-Step {HAS-160}}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {146--155}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_13}, doi = {10.1007/11734727\_13}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YunSPCHC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LeeNSCLS04, author = {Wonil Lee and Mridul Nandi and Palash Sarkar and Donghoon Chang and Sangjin Lee and Kouichi Sakurai}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Pseudorandomness of SPN-Type Transformations}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {212--223}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_19}, doi = {10.1007/978-3-540-27800-9\_19}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/LeeNSCLS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ChangLHSLS04, author = {Donghoon Chang and Wonil Lee and Seokhie Hong and Jaechul Sung and Sangjin Lee and Soo Hak Sung}, editor = {Anne Canteaut and Kapalee Viswanathan}, title = {Impossibility of Construction of {OWHF} and {UOWHF} from {PGV} Model Based on Block Cipher Secure Against {ACPCA}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3348}, pages = {328--342}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30556-9\_26}, doi = {10.1007/978-3-540-30556-9\_26}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/ChangLHSLS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeeNSCLS04, author = {Wonil Lee and Mridul Nandi and Palash Sarkar and Donghoon Chang and Sangjin Lee and Kouichi Sakurai}, title = {A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {69}, year = {2004}, url = {http://eprint.iacr.org/2004/069}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeeNSCLS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LeeCLSN03, author = {Wonil Lee and Donghoon Chang and Sangjin Lee and Soo Hak Sung and Mridul Nandi}, editor = {Chi{-}Sung Laih}, title = {New Parallel Domain Extenders for {UOWHF}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {208--227}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_13}, doi = {10.1007/978-3-540-40061-5\_13}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/LeeCLSN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/HongHKCLL03, author = {Seokhie Hong and Deukjo Hong and Youngdai Ko and Donghoon Chang and Wonil Lee and Sangjin Lee}, editor = {Jong In Lim and Dong Hoon Lee}, title = {Differential Cryptanalysis of {TEA} and {XTEA}}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {402--417}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_30}, doi = {10.1007/978-3-540-24691-6\_30}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/HongHKCLL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ChangSSLL02, author = {Donghoon Chang and Jaechul Sung and Soo Hak Sung and Sangjin Lee and Jongin Lim}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {160--174}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_12}, doi = {10.1007/3-540-36492-7\_12}, timestamp = {Sat, 26 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/ChangSSLL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.