Jinkeon Kang

Orcid: 0000-0003-2142-8236

According to our database1, Jinkeon Kang authored at least 10 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A preimage attack on reduced GIMLI-HASH with unbalanced squeezing phase.
IET Inf. Secur., January, 2023

Resistance of Ascon Family Against Conditional Cube Attacks in Nonce-Misuse Setting.
IEEE Access, 2023

2022
Conditional Cube Attacks on Ascon-128 and Ascon-80pq in a Nonce-misuse Setting.
IACR Cryptol. ePrint Arch., 2022

2021
A Preimage Attack on Reduced Gimli-Hash.
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021

2020
Multi-lane Detection Using Instance Segmentation and Attentive Voting.
CoRR, 2020

2018
RCB: leakage-resilient authenticated encryption via re-keying.
J. Supercomput., 2018

Deterministic Authenticated Encryption Scheme for Memory Constrained Devices.
Cryptogr., 2018

2015
Apollo: End-to-End Verifiable Voting Protocol Using Mixnet and Hidden Tweaks.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

2013
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis.
J. Appl. Math., 2013

2012
Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012


  Loading...