Soo Hak Sung

According to our database1, Soo Hak Sung authored at least 22 papers between 1996 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
A self-normalized invariance principle for a <i>ϕ</i>-mixing sequence.
Period. Math. Hung., 2013

Convergence in r-mean of weighted sums of NQD random variables.
Appl. Math. Lett., 2013

2011
On the strong law of large numbers for weighted sums of random variables.
Comput. Math. Appl., 2011

2006
Collision Search Attack for 53-Step HAS-160.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

2005
Construction of UOWHF: Two New Parallel Methods.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Finding Collision on 45-Step HAS-160.
Proceedings of the Information Security and Cryptology, 2005

2004
Boolean Functions with Five Controllable Cryptographic Properties.
Des. Codes Cryptogr., 2004

Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA.
Proceedings of the Progress in Cryptology, 2004

New Method for Bounding the Maximum Differential Probability for SPNs and ARIA.
Proceedings of the Information Security and Cryptology, 2004

2003
Differential and linear cryptanalysis for 2-round SPNs.
Inf. Process. Lett., 2003

New Block Cipher: ARIA.
Proceedings of the Information Security and Cryptology, 2003

Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

New Parallel Domain Extenders for UOWHF.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98.
Proceedings of the Selected Areas in Cryptography, 2002

On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis.
Proceedings of the Advances in Cryptology, 2002

On the Security of Reduced Versions of 3-Pass HAVAL.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Improving the nonlinearity of certain balanced Boolean functions with good local and global avalanche characteristics.
Inf. Process. Lett., 2001

1999
Global Avalanche Characteristics and Propagation Criterion of Balanced Boolean Functions.
Inf. Process. Lett., 1999

1998
Global Avalanche Characteristics and Nonlinearity of Balanced Boolean Functions.
Inf. Process. Lett., 1998

How to construct balanced Boolean functions with good global avalanche characteristics.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998

1997
Improving Bounds for the Number of Correlation Immune Boolean Functions.
Inf. Process. Lett., 1997

1996
On the Correlation Immune Functions and Their Nonlinearity.
Proceedings of the Advances in Cryptology, 1996


  Loading...