Yuseop Lee

According to our database1, Yuseop Lee authored at least 14 papers between 2008 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing.
Int. J. Distributed Sens. Networks, 2014

2013
Security Analysis of HMAC/NMAC by Using Fault Injection.
J. Appl. Math., 2013

Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Improved differential fault analysis on PRESENT-80/128.
Int. J. Comput. Math., 2013

Improved Differential Fault Analysis on ARIA using Small Number of Faults.
IACR Cryptol. ePrint Arch., 2013

2012
Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system.
Multim. Tools Appl., 2012

Differential fault analysis on block cipher SEED.
Math. Comput. Model., 2012

Improved Differential Fault Analysis on Block Cipher SEED-128.
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012

2011
Fault Injection Attack on A5/3.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011

2010
A note on "Improved Fast Correlation Attacks on Stream Ciphers".
IACR Cryptol. ePrint Arch., 2010

DES with any reduced masked rounds is not secure against side-channel attacks.
Comput. Math. Appl., 2010

2009
Update on SEED: SEED-192/256.
Proceedings of the Advances in Information Security and Assurance, 2009

Impossible Collision Based Side-Channel Attacks on HIGHT with Reduced Masked Rounds.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009

2008
Related-Key Chosen IV Attacks on Grain-v1 and Grain-128.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008


  Loading...