Bonwook Koo

Orcid: 0000-0001-5311-8115

According to our database1, Bonwook Koo authored at least 20 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Comments on "Certificateless Short Aggregate Signature Scheme for Mobile Devices".
IEEE Access, 2024

2020
Rotational-XOR Rectangle Cryptanalysis on Round-Reduced Simon.
Secur. Commun. Networks, 2020

2019
A General Framework for the Related-Key Linear Attack Against Block Ciphers with Linear Key Schedules.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

Revised Version of Block Cipher CHAM.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

2018
Related-Key Linear Cryptanalysis on SIMON.
IACR Cryptol. ePrint Arch., 2018

Differential property of Present-like structure.
Discret. Appl. Math., 2018

2017
CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

2014
Converting random bits into random numbers.
J. Supercomput., 2014

Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

2012
Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2011
Related-Key Boomerang Attack on Block Cipher SQUARE.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Biclique Attack on the Full HIGHT.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2010
Security of the Misty Structure Using Involutions as Round Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Related-Key Attack on the Full HIGHT.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

2009
Preimage Attack on ARIRANG.
IACR Cryptol. ePrint Arch., 2009

Improved Preimage Attack for 68-Step HAS-160.
Proceedings of the Information, Security and Cryptology, 2009

Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash.
Proceedings of the Information, Security and Cryptology, 2009

2008
Improved Impossible Differential Attacks on Large-Block Rijndael.
Proceedings of the Information Security, 11th International Conference, 2008

2006
On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

2003
Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer.
Proceedings of the Information Security Applications, 4th International Workshop, 2003


  Loading...