Dukjae Moon

Orcid: 0000-0002-3645-6873

According to our database1, Dukjae Moon authored at least 22 papers between 2002 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
AIM: Symmetric Primitive for Shorter Signatures with Stronger Security.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Improved Circuit-Based PSI via Equality Preserving Compression.
Proceedings of the Selected Areas in Cryptography - 29th International Conference, 2022

2021
Transciphering Framework for Approximate Homomorphic Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Hybrid Framework for Approximate Computation over Encrypted Data.
IACR Cryptol. ePrint Arch., 2020

Masta: An HE-Friendly Cipher Using Modular Arithmetic.
IEEE Access, 2020

FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

2019
Generic Construction of Bounded-Collusion IBE via Table-Based ID-to-Key Map.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks.
Proceedings of the Information Security Practice and Experience, 2018

2017
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

2016
SPF: A New Family of Efficient Format-Preserving Encryption Algorithms.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Hybrid WBC: Secure and Efficient White-Box Encryption Schemes.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks.
Entropy, 2015

New Efficient Padding Methods Secure Against Padding Oracle Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

2012
Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Known-Key Attacks on Generalized Feistel Schemes with SP Round Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2010
A New Primitive For Stream Ciphers Applicable To Pervasive Environments.
Intell. Autom. Soft Comput., 2010

2007
New FORK-256.
IACR Cryptol. ePrint Arch., 2007

2006
A New Dedicated 256-Bit Hash Function: FORK-256.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

2005
Related-Key Differential Attacks on Cobra-H64 and Cobra-H128.
Proceedings of the Cryptography and Coding, 2005

2004
Algebraic Attacks on Summation Generators.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

2002
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

Amplified Boomerang Attack against Reduced-Round SHACAL.
Proceedings of the Advances in Cryptology, 2002


  Loading...