Dukjae Moon

Orcid: 0000-0002-3645-6873

According to our database1, Dukjae Moon authored at least 22 papers between 2002 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
AIM: Symmetric Primitive for Shorter Signatures with Stronger Security.
IACR Cryptol. ePrint Arch., 2022

2021
Improved Circuit-based PSI via Equality Preserving Compression.
IACR Cryptol. ePrint Arch., 2021

Transciphering Framework for Approximate Homomorphic Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups.
IACR Cryptol. ePrint Arch., 2020

Hybrid Framework for Approximate Computation over Encrypted Data.
IACR Cryptol. ePrint Arch., 2020

Masta: An HE-Friendly Cipher Using Modular Arithmetic.
IEEE Access, 2020

2019
Generic Construction of Bounded-Collusion IBE via Table-Based ID-to-Key Map.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks.
Proceedings of the Information Security Practice and Experience, 2018

2017
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

2016
Hybrid WBC: Secure and Efficient White-Box Encryption Schemes.
IACR Cryptol. ePrint Arch., 2016

SPF: A New Family of Efficient Format-Preserving Encryption Algorithms.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks.
Entropy, 2015

New Efficient Padding Methods Secure Against Padding Oracle Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

2012
Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Known-Key Attacks on Generalized Feistel Schemes with SP Round Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2010
A New Primitive For Stream Ciphers Applicable To Pervasive Environments.
Intell. Autom. Soft Comput., 2010

2007
New FORK-256.
IACR Cryptol. ePrint Arch., 2007

2006
A New Dedicated 256-Bit Hash Function: FORK-256.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

2005
Related-Key Differential Attacks on Cobra-H64 and Cobra-H128.
Proceedings of the Cryptography and Coding, 2005

2003
Algebraic Attacks on Summation Generators.
IACR Cryptol. ePrint Arch., 2003

2002
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

Amplified Boomerang Attack against Reduced-Round SHACAL.
Proceedings of the Advances in Cryptology, 2002


  Loading...