Daewan Han

According to our database1, Daewan Han authored at least 19 papers between 2002 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
An Algorithm for Reversible Logic Circuit Synthesis Based on Tensor Decomposition.
CoRR, 2021

Measurement-based Uncomputation Applied to Controlled Modular Multiplication.
CoRR, 2021

2018
Time-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2.
Quantum Inf. Process., 2018

Time-Space Complexity of Quantum Search Algorithms in Symmetric Cryptanalysis.
IACR Cryptol. ePrint Arch., 2018

2015
Practical Effect of the Predictability of Android OpenSSL PRNG.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

2013
Cryptanalysis of INCrypt32 in HID's iCLASS Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Predictability of Android OpenSSL's pseudo random number generator.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2011
Grobner Basis Attacks on Lightweight RFID Authentication Protocols.
J. Inf. Process. Syst., 2011

Low area and high speed SHA-1 implementation.
Proceedings of the International SoC Design Conference, 2011

An Improved Known Plaintext Attack on PKZIP Encryption Algorithm.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2009
Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards.
Comput. Stand. Interfaces, 2009

2007
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003.
Proceedings of the Public Key Cryptography, 2007

2006
Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
An algebraic attack on the improved summation generator with 2-bit memory.
Inf. Process. Lett., 2005

A New Class of Single Cycle T-Functions.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

2004
Vulnerability of a Mobile Payment System Proposed at WISA 2002.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

2003
New Block Cipher: ARIA.
Proceedings of the Information Security and Cryptology, 2003

2002
Key recovery attacks on NTRU without ciphertext validation routine.
IACR Cryptol. ePrint Arch., 2002

Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002


  Loading...