Deterministic key predistribution schemes for distributed sensor networks J Lee, DR Stinson International Workshop on Selected Areas in Cryptography, 294-307, 2004 | 289 | 2004 |
A combinatorial approach to key predistribution for distributed sensor networks J Lee, DR Stinson IEEE WCNC 2005, 1200-1205, 2005 | 247 | 2005 |
On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs J Lee, DR Stinson ACM Transactions on Information and System Security (TISSEC) 11 (2), 1:1-1:35, 2008 | 165 | 2008 |
Minimizing the two-round Even–Mansour cipher S Chen, R Lampe, J Lee, Y Seurin, J Steinberger Journal of Cryptology 31, 1064-1119, 2018 | 131 | 2018 |
Efficient Authenticated Key Exchange Protocols J Lee, JH Park IEICE Transactions on Fundamentals of Electronics, Communications and …, 2011 | 72* | 2011 |
The preimage security of double-block-length compression functions F Armknecht, E Fleischmann, M Krause, J Lee, M Stam, J Steinberger Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 61* | 2011 |
The security of Abreast-DM in the ideal cipher model J Lee, D Kwon IEICE transactions on fundamentals of electronics, communications and …, 2011 | 56 | 2011 |
The collision security of Tandem-DM in the ideal cipher model J Lee, M Stam, J Steinberger Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011 | 51 | 2011 |
MJH: A faster alternative to MDC-2 J Lee, M Stam Cryptographers’ Track at the RSA Conference, 213-236, 2011 | 49 | 2011 |
An Efficient Authenticated Key Exchange Protocol with a Tight Security Reduction. J Lee, CS Park IACR Cryptology ePrint Archive 2008, 345, 2008 | 45 | 2008 |
Transciphering framework for approximate homomorphic encryption J Cho, J Ha, S Kim, BH Lee, J Lee, J Lee, D Moon, H Yoon International Conference on the Theory and Application of Cryptology and …, 2021 | 43* | 2021 |
On lai–massey and quasi-feistel ciphers A Yun, JH Park, J Lee Designs, Codes and Cryptography 58, 45-72, 2011 | 43* | 2011 |
Tight security bounds for double-block hash-then-sum MACs S Kim, BH Lee, J Lee Annual International Conference on the Theory and Applications of …, 2020 | 40 | 2020 |
Provable security of (tweakable) block ciphers based on substitution-permutation networks B Cogliati, Y Dodis, J Katz, J Lee, J Steinberger, A Thiruvengadam, ... Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 36* | 2018 |
: Noisy Ciphers for Approximate Homomorphic Encryption J Ha, S Kim, BH Lee, J Lee, M Son Annual International Conference on the Theory and Applications of …, 2022 | 35* | 2022 |
Common intersection designs J Lee, DR Stinson Journal of Combinatorial Designs 14 (4), 251-269, 2006 | 30 | 2006 |
Masta: an HE-friendly cipher using modular arithmetic J Ha, S Kim, W Choi, J Lee, D Moon, H Yoon, J Cho IEEE Access 8, 194741-194751, 2020 | 26 | 2020 |
: white-box secure block cipher using parallel table look-ups J Kwon, BH Lee, J Lee, D Moon Cryptographers’ Track at the RSA Conference, 106-128, 2020 | 26 | 2020 |
New constructions of MACs from (tweakable) block ciphers B Cogliati, J Lee, Y Seurin IACR Transactions on Symmetric Cryptology, 27-58, 2017 | 26 | 2017 |
The security of multiple encryption in the ideal cipher model Y Dai, J Lee, B Mennink, J Steinberger Annual Cryptology Conference, 20-38, 2014 | 25 | 2014 |