HIGHT: A new block cipher suitable for low-resource device D Hong, J Sung, S Hong, J Lim, S Lee, BS Koo, C Lee, D Chang, J Lee, ... International workshop on cryptographic hardware and embedded systems, 46-59, 2006 | 872 | 2006 |
New impossible differential attacks on AES J Lu, O Dunkelman, N Keller, J Kim International Conference on Cryptology in India, 279-293, 2008 | 180 | 2008 |
On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1 J Kim, A Biryukov, B Preneel, S Hong International Conference on Security and Cryptography for Networks, 242-256, 2006 | 142 | 2006 |
Impossible differential cryptanalysis for block cipher structures J Kim, S Hong, J Sung, S Lee, J Lim, S Sung International Conference on Cryptology in India, 82-96, 2003 | 137 | 2003 |
Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1 J Lu, J Kim, N Keller, O Dunkelman Cryptographers’ Track at the RSA Conference, 370-386, 2008 | 126 | 2008 |
Related-key rectangle attacks on reduced AES-192 and AES-256 J Kim, S Hong, B Preneel International Workshop on Fast Software Encryption, 225-241, 2007 | 124 | 2007 |
Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192 S Hong, J Kim, S Lee, B Preneel International Workshop on Fast Software Encryption, 368-383, 2005 | 102 | 2005 |
The related-key rectangle attack–application to SHACAL-1 J Kim, G Kim, S Hong, S Lee, D Hong Australasian Conference on Information Security and Privacy, 123-136, 2004 | 100 | 2004 |
A secure ECC-based RFID mutual authentication protocol for internet of things AA Alamr, F Kausar, J Kim, C Seo The Journal of supercomputing 74 (9), 4281-4294, 2018 | 69 | 2018 |
Impossible differential cryptanalysis using matrix method J Kim, S Hong, J Lim Discrete Mathematics 310 (5), 988-1002, 2010 | 56 | 2010 |
Advanced differential-style cryptanalysis of the NSA's skipjack block cipher J Kim*, RCW Phan** Cryptologia 33 (3), 246-270, 2009 | 50 | 2009 |
Probabilistic trust aware data replica placement strategy for online video streaming applications in vehicular delay tolerant networks N Kumar, J Kim Mathematical and Computer Modelling 58 (1-2), 3-14, 2013 | 43 | 2013 |
Linear and differential cryptanalysis of reduced SMS4 block cipher T Kim, J Kim, S Hong, J Sung Cryptology ePrint Archive, 2008 | 43 | 2008 |
Related-key rectangle attack on 42-round SHACAL-2 J Lu, J Kim, N Keller, O Dunkelman International Conference on Information Security, 85-100, 2006 | 40 | 2006 |
Related-key attacks on reduced rounds of SHACAL-2 J Kim, G Kim, S Lee, J Lim, J Song International Conference on Cryptology in India, 175-190, 2004 | 40 | 2004 |
Impossible differential attack on 30-round SHACAL-2 S Hong, J Kim, G Kim, J Sung, C Lee, S Lee International Conference on Cryptology in India, 97-106, 2003 | 39 | 2003 |
Related-key rectangle attack on the full SHACAL-1 O Dunkelman, N Keller, J Kim International Workshop on Selected Areas in Cryptography, 28-44, 2006 | 38 | 2006 |
ELACCA: Efficient learning automata based cell clustering algorithm for wireless sensor networks N Kumar, J Kim Wireless personal communications 73 (4), 1495-1512, 2013 | 37 | 2013 |
Amplified boomerang attack against reduced-round SHACAL J Kim, D Moon, W Lee, S Hong, S Lee, S Jung International Conference on the Theory and Application of Cryptology and …, 2002 | 35 | 2002 |
Differential-linear type attacks on reduced rounds of SHACAL-2 Y Shin, J Kim, G Kim, S Hong, S Lee Australasian Conference on Information Security and Privacy, 110-122, 2004 | 34 | 2004 |