Woo-Hwan Kim

Orcid: 0000-0002-6643-8174

According to our database1, Woo-Hwan Kim authored at least 21 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Security weakness of a certificate-based proxy signature scheme for IIoT environments.
Inf. Process. Lett., January, 2024

2020
Rotational-XOR Rectangle Cryptanalysis on Round-Reduced Simon.
Secur. Commun. Networks, 2020

2019
Multiple Linear Cryptanalysis Using Linear Statistics.
IACR Trans. Symmetric Cryptol., 2019

A General Framework for the Related-Key Linear Attack Against Block Ciphers with Linear Key Schedules.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

Revised Version of Block Cipher CHAM.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

Complete Addition Law for Montgomery Curves.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

2018
Compact Implementations of ARX-Based Block Ciphers on IoT Processors.
ACM Trans. Embed. Comput. Syst., 2018

Related-Key Linear Cryptanalysis on SIMON.
IACR Cryptol. ePrint Arch., 2018

2017
The ARIA Algorithm and Its Use with the Secure Real-Time Transport Protocol (SRTP).
RFC, October, 2017

Security of Stateful Order-Preserving Encryption.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2014
Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

LSH: A New Fast Secure Hash Function Family.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

2013
Higher order eTCR hash functions.
Comput. Math. Appl., 2013

2011
Addition of the ARIA Cipher Suites to Transport Layer Security (TLS).
RFC, April, 2011

2010
Metered signatures: How to restrict the signing capability.
J. Commun. Networks, 2010

2009
Preimage Attack on ARIRANG.
IACR Cryptol. ePrint Arch., 2009

Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash.
Proceedings of the Information, Security and Cryptology, 2009

2006
Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme.
Inf. Process. Lett., 2006

2005
TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY.
IACR Cryptol. ePrint Arch., 2005

2004
On the Security of MOR Public Key Cryptosystem.
Proceedings of the Advances in Cryptology, 2004


  Loading...