-
Secure Hash
Function Family" (PDF).
Information Security and
Cryptology -
ICISC 2014.
Lecture Notes in
Computer Science. Vol. 8949. pp. 286–313. doi:10...
- he was in ETRI,
Brown University, and ICU. He was a
program co-chair of
ICISC 2008,
MathCrypt 2013, ANTS-XI,
Asiacrypt 2015,
MathCrypt 2018/2019/2021...
- XTEA". In Lim, JI.; Lee, DH. (eds.).
Information Security and Cryptology.
ICISC 2003.
Lecture Notes in
Computer Science. Vol. 2971. Berlin, Heidelberg:...
- "Differential
Cryptanalysis of TEA and XTEA".
Information Security and
Cryptology -
ICISC 2003.
Lecture Notes in
Computer Science. Vol. 2971. pp. 402–417. doi:10...
- Camellia". In Kim,
Kwangjo (ed.).
Information Security and
Cryptology –
ICISC 2001, 4th
International Conference Seoul, Korea,
December 6–7, 2001, Proceedings...
- Hyang-Sook; Han, Dong-Guk (2014-10-18).
Information Security and
Cryptology --
ICISC 2013: 16th
International Conference, Seoul, Korea,
November 27-29, 2013...
- (2003). "New
Block Cipher: ARIA".
Information Security and
Cryptology -
ICISC 2003.
Lecture Notes in
Computer Science. Vol. 2971.
Springer International...
- Reduced-Round Salsa20 and ChaCha".
Information Security and
Cryptology –
ICISC 2012.
Lecture Notes in
Computer Science. Vol. 7839. pp. 337–351. doi:10...
- Springer. doi:10.1007/11927587_5.
Information Security and
Cryptology –
ICISC 2006. Z. E.
Schnabel (1938) The
Estimation of the
Total Fish Po****tion...
-
Properties of the
Bluetooth Combiner".
Information Security and
Cryptology -
ICISC'99.
Lecture Notes in
Computer Science. 1787: 17–29. doi:10.1007/10719994_2...