Jin Hong

Orcid: 0000-0002-9235-9824

Affiliations:
  • Seoul National University, Department of Mathematical Sciences, South Korea


According to our database1, Jin Hong authored at least 30 papers between 2002 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
Solving discrete logarithm problems faster with the aid of pre-computation.
Discret. Appl. Math., 2019

2016
Comparison of perfect table cryptanalytic tradeoff algorithms.
Des. Codes Cryptogr., 2016

2015
Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks.
IEEE Trans. Inf. Forensics Secur., 2015

High-speed parallel implementations of the rainbow method based on perfect tables in a heterogeneous system.
Softw. Pract. Exp., 2015

2014
Erratum to: A Comparison of Cryptanalytic Tradeoff Algorithms.
J. Cryptol., 2014

Analysis of the Perfect Table Fuzzy Rainbow Tradeoff.
J. Appl. Math., 2014

2013
A Comparison of Cryptanalytic Tradeoff Algorithms.
J. Cryptol., 2013

Analysis of the Rainbow Tradeoff Algorithm Used in Practice.
IACR Cryptol. ePrint Arch., 2013

2012
Accelerating Pollard's Rho Algorithm on Finite Fields.
J. Cryptol., 2012

Young tableaux and crystal B(∞) for the exceptional Lie algebra types.
J. Comb. Theory, Ser. A, 2012

Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff.
IACR Cryptol. ePrint Arch., 2012

High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System.
Proceedings of the Progress in Cryptology, 2012

2011
Analysis of Discrete Logarithm Algorithm using Pre-computation.
IACR Cryptol. ePrint Arch., 2011

Analysis of the Parallel Distinguished Point Tradeoff.
IACR Cryptol. ePrint Arch., 2011

2010
Secure and Efficient Broadcast Authentication in Wireless Sensor Networks.
IEEE Trans. Computers, 2010

The cost of false alarms in Hellman and rainbow tradeoffs.
Des. Codes Cryptogr., 2010

2009
Success probability of the Hellman trade-off.
Inf. Process. Lett., 2009

Subset-Restricted Random Walks for Pollard rho Method on F<sub>p<sup>m</sup></sub>.
Proceedings of the Public Key Cryptography, 2009

2008
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version).
IACR Cryptol. ePrint Arch., 2008

Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs.
Proceedings of the Information Security Practice and Experience, 2008

Speeding Up the Pollard Rho Method on Prime Fields.
Proceedings of the Advances in Cryptology, 2008

2005
Rediscovery of Time Memory Tradeoffs.
IACR Cryptol. ePrint Arch., 2005

TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY.
IACR Cryptol. ePrint Arch., 2005

Period of Streamcipher <i>Edon80</i>.
Proceedings of the Progress in Cryptology, 2005

A New Class of Single Cycle T-Functions.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

New Applications of Time Memory Data Tradeoffs.
Proceedings of the Advances in Cryptology, 2005

2004
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

2003
Algebraic Attacks on Summation Generators.
IACR Cryptol. ePrint Arch., 2003

New Block Cipher: ARIA.
Proceedings of the Information Security and Cryptology, 2003

2002
Key recovery attacks on NTRU without ciphertext validation routine.
IACR Cryptol. ePrint Arch., 2002


  Loading...