Jongsung Kim

Orcid: 0000-0002-6258-297X

According to our database1, Jongsung Kim authored at least 127 papers between 1997 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Preimage Attacks on Reduced-Round Ascon-Xof.
IACR Cryptol. ePrint Arch., 2024

A Method for Decrypting Data Infected with Rhysida Ransomware.
CoRR, 2024

2023
Forensic analysis for multi-platform Cisco Webex.
Forensic Sci. Int. Digit. Investig., December, 2023

Enhancing the Related-Key Security of PIPO Through New Key Schedules.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

2022
Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions.
Quantum Inf. Process., 2022

A method for decrypting data infected with Hive ransomware.
J. Inf. Secur. Appl., 2022

A reused key attack on an encrypted mobile app database: Case study on KakaoTalk and ProtonMail.
J. Inf. Secur. Appl., 2022

Quantum Rebound Attacks on Reduced-Round ARIA-Based Hash Functions.
IACR Cryptol. ePrint Arch., 2022

Forensic analysis of note and journal applications.
Digit. Investig., 2022

A study on data acquisition based on the Huawei smartphone backup protocol.
Digit. Investig., 2022

Methods for recovering deleted data from the Realm database: Case study on Minitalk and Xabber.
Digit. Investig., 2022

Differential uniformity and linearity of S-boxes by multiplicative complexity.
Cryptogr. Commun., 2022

Speeding Up LAT: Generating a Linear Approximation Table Using a Bitsliced Implementation.
IEEE Access, 2022

See-In-The-Middle Attacks on Blockciphers ARIA and DEFAULT.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

2021
Corrigendum to "Decrypting password-based encrypted backup data for Huawei smartphones" [Digital Investigation 28 (2019) 200890].
Digit. Investig., 2021

A study on LG content lock and data acquisition from apps based on content lock function.
Digit. Investig., 2021

Forensic analysis of instant messaging apps: Decrypting Wickr and private text messaging data.
Digit. Investig., 2021

Methods for decrypting the data encrypted by the latest Samsung smartphone backup programs in Windows and macOS.
Digit. Investig., 2021

Corrigendum to "Data acquisition methods using backup data decryption of sony smartphones" [Foren. Sci. Int: Digital Investigation 31 (2019) 200890].
Digit. Investig., 2021

Generating Cryptographic S-Boxes Using the Reinforcement Learning.
IEEE Access, 2021

A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application.
IEEE Access, 2021

Improved See-In-The-Middle Attacks on AES.
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021

2020
Weaknesses of some lightweight blockciphers suitable for IoT systems and their applications in hash modes.
Peer-to-Peer Netw. Appl., 2020

Forensic analysis for IoT fitness trackers and its application.
Peer-to-Peer Netw. Appl., 2020

Research on Note-Taking Apps with Security Features.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system.
Digit. Investig., 2020

A study on the decryption methods of telegram X and BBM-Enterprise databases in mobile and PC.
Digit. Investig., 2020

Special Issue on Soft Computing for Network and System Security of Internet of Everything.
Appl. Soft Comput., 2020

PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020

2019
Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security.
Multim. Tools Appl., 2019

Decrypting password-based encrypted backup data for Huawei smartphones.
Digit. Investig., 2019

Data acquisition methods using backup data decryption of Sony smartphones.
Digit. Investig., 2019

2018
A secure ECC-based RFID mutual authentication protocol for internet of things.
J. Supercomput., 2018

How to decrypt PIN-Based encrypted backup data of Samsung smartphones.
Digit. Investig., 2018

Cryptography and Future Security.
Discret. Appl. Math., 2018

2017
Special Issue: Advanced Technologies and Applications for Future Wireless and Mobile Communication Systems.
Wirel. Pers. Commun., 2017

2016
Miniaturized and Wireless Optical Neurotransmitter Sensor for Real-Time Monitoring of Dopamine in the Brain.
Sensors, 2016

Improved preimage attacks on hash modes of 8-round AES-256.
Multim. Tools Appl., 2016

Introduction to the special section on pervasive device and communications technologies for beyond IoT and CPS.
Comput. Electr. Eng., 2016

2015
A granular approach for user-centric network analysis to identify digital evidence.
Peer-to-Peer Netw. Appl., 2015

A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments.
Multim. Tools Appl., 2015

Smart vision system for soccer training.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

Articulated human motion tracking using a SOG-PF algorithm.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

New Efficient Padding Methods Secure Against Padding Oracle Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

2014
An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks.
J. Supercomput., 2014

Soil Phosphorus and Nitrogen Predictions Across Spatial Escalating Scales in an Aquatic Ecosystem Using Remote Sensing Images.
IEEE Trans. Geosci. Remote. Sens., 2014

The higher-order meet-in-the-middle attack and its application to the Camellia block cipher.
Theor. Comput. Sci., 2014

Study on two privacy-oriented protocols for information communication systems.
J. Intell. Manuf., 2014

IT convergence security.
J. Intell. Manuf., 2014

Advanced Convergence Technologies and Practices for Wireless Ad Hoc and Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Holistic environmental soil-landscape modeling of soil organic carbon.
Environ. Model. Softw., 2014

Correlating messages from multiple IM networks to identify digital forensic artifacts.
Electron. Commer. Res., 2014

Recent advanced applications and services for intelligent ubiquitous environments.
Electron. Commer. Res., 2014

Advanced Computer Technologies and Applications in Grid and Cloud Computing.
Comput. J., 2014

Motion capture with high-speed RGB-D cameras.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014

Robust Surface Pattern Matching for Ball Spin Estimation with Multi-exposed Images Under Varying Illumination Conditions.
Proceedings of the 22nd International Conference on Pattern Recognition, 2014

2013
ELACCA: Efficient Learning Automata Based Cell Clustering Algorithm for Wireless Sensor Networks.
Wirel. Pers. Commun., 2013

Advanced Information Technologies in Future Computing Environments.
Wirel. Pers. Commun., 2013

Social network and high performance in smart communications.
J. Supercomput., 2013

Special issue on wireless multimedia networks and security services.
Telecommun. Syst., 2013

Special issue on embedded systems for interactive multimedia services (ES-IMS).
ACM Trans. Embed. Comput. Syst., 2013

Advanced security technologies and applications for ubiquitous computing.
Pers. Ubiquitous Comput., 2013

On the security of the block cipher GOST suitable for the protection in U-business services.
Pers. Ubiquitous Comput., 2013

Probabilistic trust aware data replica placement strategy for online video streaming applications in vehicular delay tolerant networks.
Math. Comput. Model., 2013

Advanced computer mathematics based cryptography and security technologies.
Int. J. Comput. Math., 2013

The effects of relationship benefit on relationship quality and store loyalty from convergence environments - NPS analysis and moderating effects.
Electron. Commer. Res., 2013

Higher order eTCR hash functions.
Comput. Math. Appl., 2013

A robust vision system for outdoor swing analysis.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

2012
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis.
IEEE Trans. Inf. Theory, 2012

Modeling and simulation techniques for future Internet ubiquitous world.
Simul., 2012

Study on the security of the extended version for the ISO/IEC international standardized block cipher SEED.
Secur. Commun. Networks, 2012

Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system.
Multim. Tools Appl., 2012

Advanced theory and practice for cryptography and future security.
Math. Comput. Model., 2012

Cryptanalysis of reduced versions of the Camellia block cipher.
IET Inf. Secur., 2012

Improved Differential Fault Analysis on Block Cipher SEED-128.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

Performance Analysis of Zone Based Routing by Varying Radius of Zone Using Ant Colony in MANET.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

2011
Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents.
Wirel. Pers. Commun., 2011

Routing in WDM based wireless mesh networks with capacity estimation.
Int. J. Internet Protoc. Technol., 2011

Notions and relations for RKA-secure permutation and function families.
Des. Codes Cryptogr., 2011

Cryptanalysis of CIKS-128 and CIKS-128H Suitable for Intelligent Multimedia and Ubiquitous Computing Systems.
Comput. Informatics, 2011

Weak Keys of the Block Cipher SEED-192 for Related-Key Differential Attacks.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

2010
Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems.
Telecommun. Syst., 2010

Related-Key Boomerang and Rectangle Attacks.
IACR Cryptol. ePrint Arch., 2010

Impossible differential cryptanalysis using matrix method.
Discret. Math., 2010

DES with any reduced masked rounds is not secure against side-channel attacks.
Comput. Math. Appl., 2010

Side-Channel Attack Using Meet-in-the-Middle Technique.
Comput. J., 2010

2009
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments.
J. Univers. Comput. Sci., 2009

Security analysis of the SCO-family using key schedules.
Inf. Sci., 2009

Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher.
Cryptologia, 2009

A Cryptanalytic View of the NSA's Skipjack Block Cipher Design.
Proceedings of the Advances in Information Security and Assurance, 2009

A Stepwise Methodology for Tracing Computer Usage.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Analysis of Time Information for Digital Investigation.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Impossible Collision Based Side-Channel Attacks on HIGHT with Reduced Masked Rounds.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009

2008
Security analysis of the full-round DDO-64 block cipher.
J. Syst. Softw., 2008

Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

New Impossible Differential Attacks on AES.
IACR Cryptol. ePrint Arch., 2008

Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher.
IACR Cryptol. ePrint Arch., 2008

Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1.
Proceedings of the Topics in Cryptology, 2008

2007
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

2006
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1.
IACR Cryptol. ePrint Arch., 2006

Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms.
IACR Cryptol. ePrint Arch., 2006

Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract).
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

Related-Key Rectangle Attack on the Full SHACAL-1.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

Related-Key Rectangle Attack on 42-Round SHACAL-2.
Proceedings of the Information Security, 9th International Conference, 2006

Differential and Rectangle Attacks on Reduced-Round SHACAL-1.
Proceedings of the Progress in Cryptology, 2006

Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis.
Proceedings of the Computational Science and Its Applications, 2006

HIGHT: A New Block Cipher Suitable for Low-Resource Device.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
On the Security of Encryption Modes of MD4, MD5 and HAVAL.
IACR Cryptol. ePrint Arch., 2005

Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds.
Proceedings of the WEWoRC 2005, 2005

Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b.
Proceedings of the Progress in Cryptology, 2005

Related-Key Differential Attacks on Cobra-H64 and Cobra-H128.
Proceedings of the Cryptography and Coding, 2005

Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE.
Proceedings of the Computational Science and Its Applications, 2005

Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

2004
Related-Key Attacks on Reduced Rounds of SHACAL-2.
Proceedings of the Progress in Cryptology, 2004

Padding Oracle Attacks on Multiple Modes of Operation.
Proceedings of the Information Security and Cryptology, 2004

Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

The Related-Key Rectangle Attack - Application to SHACAL-1.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Impossible Differential Cryptanalysis for Block Cipher Structures.
Proceedings of the Progress in Cryptology, 2003

Impossible Differential Attack on 30-Round SHACAL-2.
Proceedings of the Progress in Cryptology, 2003

Truncated Differential Attacks on 8-Round CRYPTON.
Proceedings of the Information Security and Cryptology, 2003

2002
Amplified Boomerang Attack against Reduced-Round SHACAL.
Proceedings of the Advances in Cryptology, 2002

1997
A total ordering protocol using a dynamic token-passing scheme.
Distributed Syst. Eng., 1997


  Loading...