Search results for: Donghoon Chang
Journal of Hardware and Systems Security > 2019 > 3 > 1 > 3-11
International Journal of Information Security > 2019 > 18 > 2 > 163-180
Journal of Hardware and Systems Security > 2017 > 1 > 3 > 252-268
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2006 > Construction of Hash Function > 283-298
The Journal of Supercomputing > 2018 > 74 > 9 > 4173-4198
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2006 > Hash Functions > 80-94
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2006 > Low Resources > 46-59
Lecture Notes in Computer Science > Progress in Cryptology - VIETCRYPT 2006 > Cryptanalysis > 286-297
Lecture Notes in Computer Science > Fast Software Encryption > Hash Function Cryptanalysis (II) > 429-443
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2004 > Modes of Operation > 328-342
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2003 > Block/Stream Ciphers > 402-417
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2003 > Hash Functions > 208-227
Lecture Notes in Computer Science > Fast Software Encryption > Hash Function Cryptanalysis (I) > 189-206
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2005 > Provable Security and Primitives > 146-155
International Journal of Fracture > 2012 > 176 > 1 > 39-47