Search results for: Deukjo Hong
Lecture Notes in Computer Science > Information and Communications Security > Cryptanalysis & Cryptographic Techniques > 456-468
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2001 > Block Ciphers > 208-221
Lecture Notes in Computer Science > Information, Security and Cryptology – ICISC 2009 > Cryptanalysis of Hash Function > 332-348
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2005 > Hash Functions > 63-76
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2006 > Low Resources > 46-59
Lecture Notes in Computer Science > Progress in Cryptology - VIETCRYPT 2006 > Cryptanalysis > 286-297
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2004 > Hash Functions > 201-213
Lecture Notes in Computer Science > Fast Software Encryption > Cryptanalysis of Block Ciphers III > 300-311
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2003 > Block/Stream Ciphers > 402-417
Lecture Notes in Computer Science > Information, Security and Cryptology – ICISC 2009 > Cryptanalysis of Hash Function > 315-331
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2010 > Cryptanalysis > 49-67
Lecture Notes in Computer Science > Progress in Cryptology - VIETCRYPT 2006 > Cryptanalysis > 260-270
Multimedia Tools and Applications > 2016 > 75 > 22 > 14525- 14539
Computers and Mathematics with Applications > 2013 > 65 > 9 > 1396-1402
IEEE Transactions on Information Theory > 2012 > 58 > 3 > 1992 - 1995
Information Processing Letters > 2007 > 104 > 5 > 183-185
Journal of Cryptology > 2006 > 19 > 4 > 441-462