Status Report on the Final Round of the NIST Lightweight Cryptography Standardization Process MS Turan, K McKay, D Chang, LE Bassham, J Kang, ND Waller, ... Meltem Sonmez Turan, Kerry McKay, Donghoon Chang, Jinkeon Kang, Noah Waller …, 2023 | 84* | 2023 |
Status report on the second round of the NIST lightweight cryptography standardization process MS Turan, MS Turan, K McKay, D Chang, C Calik, L Bassham, J Kang, ... US Department of Commerce, National Institute of Standards and Technology, 2021 | 61 | 2021 |
Multi-lane detection using instance segmentation and attentive voting D Chang, V Chirakkal, S Goswami, M Hasan, T Jung, J Kang, SC Kee, ... 2019 19th International conference on control, automation and systems (ICCAS …, 2019 | 29 | 2019 |
Arirang D Chang, S Hong, C Kang, J Kang, J Kim, C Lee, J Lee, J Lee, S Lee, ... Submission to SHA-3 Competition, organized by NIST, 2008 | 26* | 2008 |
Related-key attack on the MD-64 block cipher suitable for pervasive computing environments J Kang, K Jeong, SS Yeo, C Lee 2012 26th International Conference on Advanced Information Networking and …, 2012 | 18 | 2012 |
Collision Attacks on AES‐192/256, Crypton‐192/256, mCrypton‐96/128, and Anubis J Kang, K Jeong, J Sung, S Hong, K Lee Journal of Applied Mathematics 2013 (1), 713673, 2013 | 15 | 2013 |
Conditional cube attacks on ascon-128 and ascon-80pq in a nonce-misuse setting D Chang, D Hong, J Kang Cryptology ePrint Archive, 2022 | 12 | 2022 |
RCB: leakage-resilient authenticated encryption via re-keying M Agrawal, TK Bansal, D Chang, AK Chauhan, S Hong, J Kang, ... The Journal of Supercomputing 74, 4173-4198, 2018 | 11 | 2018 |
Distinguishing attack on SDDO-based block cipher BMD-128 J Kang, K Jeong, C Lee, S Hong Ubiquitous Information Technologies and Applications: CUTE 2013, 595-602, 2014 | 11 | 2014 |
Apollo: End-to-end verifiable voting protocol using mixnet and hidden tweaks D Chang, AK Chauhan, MN K, J Kang International Conference on Information Security and Cryptology, 194-209, 2015 | 8 | 2015 |
Lightweight cryptography: Round 2 candidates, 2019 L Bassham, C Calik, D Chang, J Kang, K McKay, MS Turan | 8 | |
Resistance of ASCON family against conditional cube attacks in nonce-misuse setting D Chang, D Hong, J Kang, MS Turan IEEE Access 11, 4501-4516, 2022 | 6 | 2022 |
Integrated cryptographic module providing confidentiality and integrity KY Chang, S Hong, J Lee, J Sung, J Kang US Patent 9,065,631, 2015 | 5 | 2015 |
A New Conditional Cube Attack on Reduced-Round Ascon-128a in a Nonce-misuse Setting D Chang, J Kang, MS Turan Fifth NIST Lightweight Cryptography Workshop, 2022 | 4 | 2022 |
Related-key amplified boomerang attacks on KT-64 and MD-64 suitable for wireless sensor networks J Kang, K Jeong, S Hong, C Lee Sensor Letters 11 (9), 1765-1770, 2013 | 4 | 2013 |
Differential fault analysis on HAS-160 compression function J Kang, K Jeong, J Sung, S Hong Computer Science and its Applications: CSA 2012, 97-105, 2012 | 3 | 2012 |
Lightweight Cryptography L Bassham, D Chang, T Diamond, J Kang, J Kelsey, K McKay, MS Turan, ... Computer Security Resource Center (CSRC).[Online]. Available: https://csrc …, 0 | 3 | |
Proposal of Requirements for an Accordion Mode: Discussion Draft for the NIST Accordion Mode Workshop 2024 YL Chen, M Davidson, M Dworkin, J Kang, J Kelsey, Y Sasaki, ... | 2 | 2024 |
Ethical Hacking S Babbar, R Jain, J Kang Research Gate, 2015 | 2 | 2015 |
HMAC/NMAC-MD4 에 대한 향상된 키 복구 공격 강진건, 이제상, 성재철, 홍석희, 류희수 정보보호학회논문지 19 (2), 63-74, 2009 | 2 | 2009 |