Sangjin Lee

According to our database1, Sangjin Lee authored at least 195 papers between 1994 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Cosmos+ OpenSSD: Rapid Prototype for Flash Storage Systems.
ACM Trans. Storage, 2020

Networking and Storage: The Next Computing Elements in Exascale Systems?
IEEE Data Eng. Bull., 2020

Extrapolative-Interpolative Cycle-Consistency Learning for Video Frame Extrapolation.
CoRR, 2020

Forensic Analysis of Residual Information in Adobe PDF Files.
CoRR, 2020

Forensic analysis of the Windows telemetry for diagnostics.
CoRR, 2020

Low-Overhead Compressibility Prediction for High-Performance Lossless Data Compression.
IEEE Access, 2020

It Takes Two: Instrumenting the Interaction between In-Memory Databases and Solid-State Drives.
Proceedings of the CIDR 2020, 2020

2019
Extended Object Tracking via Positive and Negative Information Fusion.
IEEE Trans. Signal Process., 2019

Forensic signature for tracking storage devices: Analysis of UEFI firmware image, disk signature and windows artifacts.
Digit. Investig., 2019

High-Speed Searching Target Data Traces Based on Statistical Sampling for Digital Forensics.
IEEE Access, 2019

Design of FPGA-Based LZ77 Compressor With Runtime Configurable Compression Ratio and Throughput.
IEEE Access, 2019

2018
Mobile forensic reference set (MFReS) and mobile forensic investigation for android devices.
J. Supercomput., 2018

Abnormal Behavior Detection to Identify Infected Systems Using the<i> APChain</i> Algorithm and Behavioral Profiling.
Secur. Commun. Networks, 2018

Embeddability of right-angled Artin groups on complements of trees.
Int. J. Algebra Comput., 2018

Intelligent Virtual Assistant knows Your Life.
CoRR, 2018

2017
A Study on Stability of the Interacting Multiple Model Algorithm.
IEEE Trans. Autom. Control., 2017

Noncrossing partitions for periodic braids.
J. Comb. Theory, Ser. A, 2017

Study on the tracking revision history of MS Word files for forensic investigation.
Digit. Investig., 2017

Digital Forensic Approaches for Amazon Alexa Ecosystem.
CoRR, 2017

"Alexa, Can I Trust You?".
Computer, 2017

2016
An enhanced security framework for reliable Android operating system.
Secur. Commun. Networks, 2016

A study of user relationships in smartphone forensics.
Multim. Tools Appl., 2016

Towards Syntactic Approximate Matching - A Pre-Processing Experiment.
J. Digit. Forensics Secur. Law, 2016

Data-Driven Modeling and Analysis Framework for Cockpit Human-Machine Interaction Issues.
J. Aerosp. Inf. Syst., 2016

Formal Verification for Mode Confusion in the Flight Deck Using Intent-Based Abstraction.
J. Aerosp. Inf. Syst., 2016

A methodology for quantitative assessment of the features and capabilities of software frameworks for model composition.
Int. J. Model. Simul. Sci. Comput., 2016

Forensic investigation framework for the document store NoSQL DBMS: MongoDB as a case study.
Digit. Investig., 2016

2015
Markov Chain Approximation Algorithm for Event-Based State Estimation.
IEEE Trans. Control. Syst. Technol., 2015

Methodology and implementation for tracking the file sharers using BitTorrent.
Multim. Tools Appl., 2015

Investigation Methodology of a Virtual Desktop Infrastructure for IoT.
J. Appl. Math., 2015

Intent Inference-Based Flight-Deck Human-Automation Mode-Confusion Detection.
J. Aerosp. Inf. Syst., 2015

Analysis of the HIKVISION DVR File System.
Proceedings of the Digital Forensics and Cyber Crime - 7th International Conference, 2015

2014
An on-site digital investigation methodology for data leak case.
Secur. Commun. Networks, 2014

Test-driven forensic analysis of satellite automotive navigation systems.
J. Intell. Manuf., 2014

Practical Electromagnetic Disturbance Analysis on Commercial Contactless Smartcards.
Int. J. Distributed Sens. Networks, 2014

Data fragment forensics for embedded DVR systems.
Digit. Investig., 2014

Structure and application of IconCache.db files for digital forensics.
Digit. Investig., 2014

AddSIM: a new Korean engagement simulation environment using high resolution models.
Proceedings of the 2014 Winter Simulation Conference, 2014

2013
Damaged backup data recovery method for Windows mobile.
J. Supercomput., 2013

Topic based photo set retrieval using user annotated tags.
Multim. Tools Appl., 2013

A new triage model conforming to the needs of selective search and seizure of electronic evidence.
Digit. Investig., 2013

On-site investigation methodology for incident response in Windows environments.
Comput. Math. Appl., 2013

Event-based state estimation algorithm using Markov chain approximation.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013

2012
The effective method of database server forensics on the enterprise environment.
Secur. Commun. Networks, 2012

A recovery method of deleted record for SQLite database.
Pers. Ubiquitous Comput., 2012

A study on multimedia file carving method.
Multim. Tools Appl., 2012

A research on the investigation method of digital forensics for a VMware Workstation's virtual machine.
Math. Comput. Model., 2012

On-the-spot digital investigation by means of LDFS: Live Data Forensic System.
Math. Comput. Model., 2012

Detection of Zombie PCs Based on Email Spam Analysis.
KSII Trans. Internet Inf. Syst., 2012

Forensic analysis techniques for fragmented flash memory pages in smartphones.
Digit. Investig., 2012

Digital forensic investigation of cloud storage services.
Digit. Investig., 2012

Bursty event detection from text streams for disaster management.
Proceedings of the 21st World Wide Web Conference, 2012

A Study for Classification of Web Browser Log and Timeline Visualization.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Methodology for Digital Investigation of Illegal Sharing Using BitTorrent.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Methodology for Digital Forensic Investigation of iCloud.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Analysis Framework to Detect Artifacts of Portable Web Browser.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

Event-triggered filtering with application to target tracking in binary sensor networks.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

2011
Online Video Recommendation through Tag-Cloud Aggregation.
IEEE Multim., 2011

Analysis of changes in file time attributes with file manipulation.
Digit. Investig., 2011

The Method of Database Server Detection and Investigation in the Enterprise Environment.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

2010
Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device.
Telecommun. Syst., 2010

Acceleration of Differential Power Analysis through the Parallel Use of GPU and CPU.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

A New Primitive For Stream Ciphers Applicable To Pervasive Environments.
Intell. Autom. Soft Comput., 2010

A proposal for automating investigations in live forensics.
Comput. Stand. Interfaces, 2010

DES with any reduced masked rounds is not secure against side-channel attacks.
Comput. Math. Appl., 2010

Image Enhancement for Reducing LCD Backlight Power Based on Human Visual Characteristics.
Proceedings of the International Conference on Digital Image Computing: Techniques and Applications, 2010

2009
An efficient signed digit montgomery multiplication for RSA.
J. Syst. Archit., 2009

U-HMS: hybrid system for secure intelligent multimedia data services in Ubi-Home.
J. Intell. Manuf., 2009

Soft-output ML detector for spatial modulation OFDM systems.
IEICE Electron. Express, 2009

Data concealment and detection in Microsoft Office 2007 files.
Digit. Investig., 2009

Forensic investigation of Microsoft PowerPoint files.
Digit. Investig., 2009

Estimate-based goodness-of-fit test for large sparse multinomial distributions.
Comput. Stat. Data Anal., 2009

Successive MAP Detection with Soft Interference Cancellation for Iterative Receivers in Hierarchical M-ary QAM Systems.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

A Scoring Function for Retrieving Photo Sets with Broad Topic Coverage.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

A Stepwise Methodology for Tracing Computer Usage.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Analysis of Time Information for Digital Investigation.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Research about extracting and analyzing accounting data of company to detect financial fraud.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

2008
Performance Enhancement of Differential Power Analysis Attacks With Signal Companding Methods.
IEEE Signal Process. Lett., 2008

Security analysis of the full-round DDO-64 block cipher.
J. Syst. Softw., 2008

Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions.
IACR Cryptol. ePrint Arch., 2008

Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths.
IACR Cryptol. ePrint Arch., 2008

Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension.
IACR Cryptol. ePrint Arch., 2008

Extraction of Residual Information in the Microsoft PowerPoint file from the Viewpoint of Digital Forensics considering PerCom Environment.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

Recovery of Damaged Compressed Files for Digital Forensic Purposes.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Design and Implementation of a Tool for System Restore Point Analysis.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Methodologies for Detecting Covert Database.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Design and Implementation of a Tool to Detect Accounting Frauds.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Methodology for Forensic Analysis of Embedded Systems.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

USB PassOn: Secure USB Thumb Drive Forensic Toolkit.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008

The design of framework for detecting an insider's leak of confidential information.
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008

2007
Synchronization and Channel Estimation in Cyclic Postfix Based OFDM System.
IEICE Trans. Commun., 2007

New FORK-256.
IACR Cryptol. ePrint Arch., 2007

Password Recovery Using an Evidence Collection Tool and Countermeasures.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Generalised Category Attack - Improving Histogram-Based Attack on JPEG LSB Embedding.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Windows Pagefile Collection and Analysis for a Live Forensics Context.
Proceedings of the Future Generation Communication and Networking, 2007

Discovering Methodology and Scenario to Detect Covert Database System.
Proceedings of the Future Generation Communication and Networking, 2007

A Field Guide to Hidden Accounting Information Detection.
Proceedings of the Future Generation Communication and Networking, 2007

Design and Implementation of the UsMSS : User-centric secure Multimedia Service System in Intelligent Home.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Preimage Attack on the Parallel FFT-Hashing Function.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.
J. Cryptol., 2006

DRBAC Model Using a WSNM for Services in <i>i</i>-Home.
IEICE Trans. Inf. Syst., 2006

Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators.
Proceedings of the Progressin Cryptology, 2006

A DRBAC Model Based on Context for Smart and Secure Services in Intelligent Ubiquitous Home.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

<i>ui</i>H-PMAC Model Suitable for Ubi-Home Gateway in Ubiquitous Intelligent Environment.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Attack on JPEG2000 Steganography Using LRCA.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

Category Attack for LSB Steganalysis of JPEG Images.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

User Centric Intelligent IPMPS in Ubi-Home.
Proceedings of the Computational Science and Its Applications, 2006

A Flexible DRM System Considering Ubiquitous Environment.
Proceedings of the Computational Science and Its Applications, 2006

Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis.
Proceedings of the Computational Science and Its Applications, 2006

A New Dedicated 256-Bit Hash Function: FORK-256.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

<i>C-i</i>UMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

HIGHT: A New Block Cipher Suitable for Low-Resource Device.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding.
Proceedings of the Advances in Cryptology, 2006

Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Construction of UOWHF: Two New Parallel Methods.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Linear Attack Using Multiple Linear Approximations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

On the Security of Encryption Modes of MD4, MD5 and HAVAL.
IACR Cryptol. ePrint Arch., 2005

Digital evidence collection process in integrity and memory information gathering.
Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 2005

A Watermarking Method Using Quantization and Statistical Characteristics of Wavelet Transform.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b.
Proceedings of the Progress in Cryptology, 2005

Intelligent Multimedia Service System Based on Context Awareness in Smart Home.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

How to Construct Universal One-Way Hash Functions of Order <i>r</i>.
Proceedings of the Progress in Cryptology, 2005

Related-Key Differential Attacks on Cobra-H64 and Cobra-H128.
Proceedings of the Cryptography and Coding, 2005

New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography.
Proceedings of the Information Hiding, 7th International Workshop, 2005

Color Cube Analysis for Detection of LSB Steganography in RGB Color Images.
Proceedings of the Computational Science and Its Applications, 2005

Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE.
Proceedings of the Computational Science and Its Applications, 2005

Design and Implementation of the IMS-IPMP System in Convergence Home-Network Environment.
Proceedings of the Digital Libraries: Implementing Strategies and Sharing Experiences, 2005

Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Applying LR Cube Analysis to JSteg Detection.
Proceedings of the Communications and Multimedia Security, 2005

User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model.
IACR Cryptol. ePrint Arch., 2004

Steganographic Scheme Using a Block Cipher.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

On Security Notions of Steganographic Systems.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H.
Proceedings of the Progress in Cryptology, 2004

Related-Key Attacks on Reduced Rounds of SHACAL-2.
Proceedings of the Progress in Cryptology, 2004

Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA.
Proceedings of the Progress in Cryptology, 2004

On the Pseudorandomness of a Modification of KASUMI Type Permutations.
Proceedings of the Information Security and Cryptology, 2004

Padding Oracle Attacks on Multiple Modes of Operation.
Proceedings of the Information Security and Cryptology, 2004

On Security Notions for Steganalysis.
Proceedings of the Information Security and Cryptology, 2004

Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

Higher Order Universal One-Way Hash Functions.
Proceedings of the Advances in Cryptology, 2004

Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

Pseudorandomness of SPN-Type Transformations.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

The Related-Key Rectangle Attack - Application to SHACAL-1.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
Differential and linear cryptanalysis for 2-round SPNs.
Inf. Process. Lett., 2003

Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property.
Proceedings of the Computer Network Security, 2003

A Secure Steganographic Scheme against Statistical Analyses.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

High Quality Perceptual Steganographic Techniques.
Proceedings of the Digital Watermarking, Second International Workshop, 2003

Designated Verification of Non-invertible Watermark.
Proceedings of the Information Security, 6th International Conference, 2003

Covert Channel Detection in the ICMP Payload Using Support Vector Machine.
Proceedings of the Computer and Information Sciences, 2003

Impossible Differential Cryptanalysis for Block Cipher Structures.
Proceedings of the Progress in Cryptology, 2003

Impossible Differential Attack on 30-Round SHACAL-2.
Proceedings of the Progress in Cryptology, 2003

New Block Cipher: ARIA.
Proceedings of the Information Security and Cryptology, 2003

Truncated Differential Attacks on 8-Round CRYPTON.
Proceedings of the Information Security and Cryptology, 2003

Differential Cryptanalysis of TEA and XTEA.
Proceedings of the Information Security and Cryptology, 2003

Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

New Parallel Domain Extenders for UOWHF.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

Key Recovery Attacks on the RMAC, TMAC, and IACBC.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Provable security for 13 round Skipjack-like structure.
Inf. Process. Lett., 2002

Practical off-line authentication.
Proceedings of the Security and Watermarking of Multimedia Contents IV, 2002

Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98.
Proceedings of the Selected Areas in Cryptography, 2002

An Improved Method of Multiplication on Certain Elliptic Curves.
Proceedings of the Public Key Cryptography, 2002

A Chosen Plaintext Linear Attack on Block Cipher CIKS-1.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

Saturation Attacks on Reduced Round Skipjack.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

Amplified Boomerang Attack against Reduced-Round SHACAL.
Proceedings of the Advances in Cryptology, 2002

A Practical Approach Defeating Blackmailing.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Off-Line Authentication Using Watermarks.
Proceedings of the Information Security and Cryptology, 2001

Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation.
Proceedings of the Information Security and Cryptology, 2001

Truncated Differential Cryptanalysis of Camellia.
Proceedings of the Information Security and Cryptology, 2001

Impossible Differential Cryptanalysis of Zodiac.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

Pseudorandomness from Braid Groups.
Proceedings of the Advances in Cryptology, 2001

Known-IV Attacks on Triple Modes of Operation of Block Ciphers.
Proceedings of the Advances in Cryptology, 2001

An Efficient Implementation of Braid Groups.
Proceedings of the Advances in Cryptology, 2001

2000
A lower bound on the linear span of an FCSR.
IEEE Trans. Inf. Theory, 2000

New Block Cipher DONUT Using Pairwise Perfect Decorrelation.
Proceedings of the Progress in Cryptology, 2000

Difference Distribution Attack on DONUT and Improved DONUT.
Proceedings of the Information Security and Cryptology, 2000

Provable Security against Differential and Linear Cryptanalysis for the SPN Structure.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

New Public-Key Cryptosystem Using Braid Groups.
Proceedings of the Advances in Cryptology, 2000

Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis.
Proceedings of the Advances in Cryptology, 2000

A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis.
Proceedings of the Information Security and Cryptology, 1999

1998
A New Hash Function Based on MDx-Family and Its Application to MAC.
Proceedings of the Public Key Cryptography, 1998

1997
Improving Bounds for the Number of Correlation Immune Boolean Functions.
Inf. Process. Lett., 1997

1996
On the Design of a Stream Cipher and a Hash Function Suitable to Smart Card Applications.
Proceedings of the Second Smart Card Research and Advanced Application Conference, 1996

Conditional Correlation Attack on Nonlinear Filter Generators.
Proceedings of the Advances in Cryptology, 1996

On the Correlation Immune Functions and Their Nonlinearity.
Proceedings of the Advances in Cryptology, 1996

1995
On the Security of the Gollmann Cascades.
Proceedings of the Advances in Cryptology, 1995

1994
Semi-bent Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994


  Loading...