Search results for: Jaechul Sung
Lecture Notes in Computer Science > Information Security and Privacy > Hashing and Message Authentication > 421-431
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2001 > Block Ciphers > 208-221
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2000 > Symmetric-Key Schemes I > 274-288
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Information Security and Hiding (ISH 2005) Workshop > 567-576
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Applied Cryptography and Information Security (ACIS 2006) > 446-455
Lecture Notes in Computer Science > Advances in Information Security and Assurance > Cryptographic Algorithms > 1-10
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2005 > Hash Functions > 63-76
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2006 > Low Resources > 46-59
Lecture Notes in Computer Science > Fast Software Encryption > Cryptanalysis of Block Ciphers III > 300-311
Lecture Notes in Computer Science > Advances in Information Security and Assurance > Cryptographic Algorithms > 11-20
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2004 > Provable Security and Primitives > 343-351
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2004 > Modes of Operation > 328-342
Lecture Notes in Computer Science > Progress in Cryptology – Mycrypt 2005 > Block Cipher Cryptanalysis > 244-262