Dong Hoon Lee

Affiliations:
  • Electronics and Telecommunications Research Institute (ETRI), Network and Communicatons Security Division, Daejeon, Korea
  • Korea Advanced Institute of Science and Technology (KAIST), Department of Mathematics, Daejeon, South Korea (PhD)


According to our database1, Dong Hoon Lee authored at least 20 papers between 2002 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2015
Practical Effect of the Predictability of Android OpenSSL PRNG.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

2013
Cryptanalysis of INCrypt32 in HID's iCLASS Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Predictability of Android OpenSSL's pseudo random number generator.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2011
Word-based FCSRs with fast software implementations.
J. Commun. Networks, 2011

An Improved Known Plaintext Attack on PKZIP Encryption Algorithm.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2008
Algebraic degree of the inverse of linearized polynomials.
J. Symb. Comput., 2008

Security Analysis of a Variant of Self-Shrinking Generator.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks.
Proceedings of the Advances in Cryptology, 2008

2007
On the Security of Status Certificate-Based Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006.
IACR Cryptol. ePrint Arch., 2007

2006
Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations.
IEEE Trans. Computers, 2006

Quadratic Equations from APN Power Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Three-Party Password Authenticated Key Agreement Resistant to Server Compromise.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

2005
A New Class of Single Cycle T-Functions.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

2004
Vulnerability of a Mobile Payment System Proposed at WISA 2002.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

Resistance of S-Boxes against Algebraic Attacks.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

Cryptanalysis of a Divisor Class Group Based Public-Key Cryptosystem.
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004

2003
Algebraic Attacks on Summation Generators.
IACR Cryptol. ePrint Arch., 2003

2002
Diffie-Hellman Problems and Bilinear Maps.
IACR Cryptol. ePrint Arch., 2002


  Loading...