Kitae Jeong

According to our database1, Kitae Jeong authored at least 26 papers between 2006 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis.
Peer-to-Peer Netw. Appl., 2015

A telco's perspectives: Open and flexible transport SDN.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015

2014
Security analysis of block cipher Piccolo suitable for wireless sensor networks.
Peer-to-Peer Netw. Appl., 2014

Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing.
Int. J. Distributed Sens. Networks, 2014

2013
Cryptanalysis of block cipher Piccolo suitable for cloud computing.
J. Supercomput., 2013

Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis.
J. Appl. Math., 2013

Security Analysis of HMAC/NMAC by Using Fault Injection.
J. Appl. Math., 2013

Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Improved differential fault analysis on PRESENT-80/128.
Int. J. Comput. Math., 2013

Improved Differential Fault Analysis on ARIA using Small Number of Faults.
IACR Cryptol. ePrint Arch., 2013

Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks.
EURASIP J. Wirel. Commun. Netw., 2013

IT convergence and security.
Electron. Commer. Res., 2013

2012
Differential fault analysis on block cipher SEED.
Math. Comput. Model., 2012

Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED.
IACR Cryptol. ePrint Arch., 2012

Differential Fault Analysis on Block Cipher Piccolo.
IACR Cryptol. ePrint Arch., 2012

Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Fault Injection Attack on A5/3.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

2010
A note on "Improved Fast Correlation Attacks on Stream Ciphers".
IACR Cryptol. ePrint Arch., 2010

2009
Security analysis of the SCO-family using key schedules.
Inf. Sci., 2009

Update on SEED: SEED-192/256.
Proceedings of the Advances in Information Security and Assurance, 2009

Baseline Traffic Modeling for Anomalous Traffic Detection on Network Transit Points.
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009

2008
NAT Issues in the Remote Management of Home Network Devices.
IEEE Netw., 2008

Related-Key Chosen IV Attacks on Grain-v1 and Grain-128.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators.
Proceedings of the Progressin Cryptology, 2006

HIGHT: A New Block Cipher Suitable for Low-Resource Device.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006


  Loading...