-
Secure Hash
Function Family" (PDF).
Information Security and
Cryptology -
ICISC 2014.
Lecture Notes in
Computer Science. Vol. 8949. pp. 286–313. doi:10...
- Springer. doi:10.1007/11927587_5.
Information Security and
Cryptology –
ICISC 2006. Z. E.
Schnabel (1938) The
Estimation of the
Total Fish Po****tion...
- "Differential
Cryptanalysis of TEA and XTEA".
Information Security and
Cryptology -
ICISC 2003.
Lecture Notes in
Computer Science. Vol. 2971. pp. 402–417. doi:10...
-
served as
program chair and co-chair for
multiple conferences,
including ICISC 2008, ANTS-XI,
Asiacrypt 2015/2016,
MathCrypt 2013/2018/2019/2021, and PQC2021/2022...
- Reduced-Round Salsa20 and ChaCha".
Information Security and
Cryptology –
ICISC 2012.
Lecture Notes in
Computer Science. Vol. 7839. pp. 337–351. doi:10...
- (2003). "New
Block Cipher: ARIA".
Information Security and
Cryptology -
ICISC 2003.
Lecture Notes in
Computer Science. Vol. 2971.
Springer International...
- Camellia". In Kim,
Kwangjo (ed.).
Information Security and
Cryptology –
ICISC 2001, 4th
International Conference Seoul, Korea,
December 6–7, 2001, Proceedings...
- XTEA". In Lim, JI.; Lee, DH. (eds.).
Information Security and Cryptology.
ICISC 2003.
Lecture Notes in
Computer Science. Vol. 2971. Berlin, Heidelberg:...
- Hyang-Sook; Han, Dong-Guk (2014-10-18).
Information Security and
Cryptology --
ICISC 2013: 16th
International Conference, Seoul, Korea,
November 27-29, 2013...
- White-Box AES with Dual Ciphers".
Information Security and
Cryptology -
ICISC 2010.
Lecture Notes in
Computer Science. Vol. 6829. pp. 278–291. doi:10...