- 2007-07-02.{{cite conference}}: CS1 maint:
multiple names:
authors list (link)
Seokhie Hong;
Jongsung Kim; Guil Kim;
Jaechul Sung;
Changhoon Lee;
Sangjin Lee...
- Laboratory,
University of
Cambridge (Technical report). Ko, Youngdai; Hong,
Seokhie; Lee, Wonil; Lee, Sangjin; Kang, Ju-Sung (2004). "Related Key Differential...
- doi:10.1007/3-540-36231-2_4. ISBN 9783540002635.
Youngdai Ko;
Deukjo Hong;
Seokhie Hong;
Sangjin Lee &
Jongin Lim (2003). "Linear
Cryptanalysis on SPECTR-H64...
- same HMAC output. In 2006,
Jongsung Kim, Alex Biryukov, Bart Preneel, and
Seokhie Hong
showed how to
distinguish HMAC with
reduced versions of MD5 and SHA-1...
- Phil Rogaway's page on PMAC
Changhoon Lee,
Jongsung Kim,
Jaechul Sung,
Seokhie Hong,
Sangjin Lee. "Forgery and Key
Recovery Attacks on PMAC and Mitc****'s...
- 2008-06-14.
Retrieved 2007-07-06.
Jongsung Kim;
Dukjae Moon;
Wonil Lee;
Seokhie Hong;
Sangjin Lee;
Seokwon Jung (December 2002). "Amplified
Boomerang Attack...
-
cipher in Bi-directional
Metadata Delivery Protection Lee, Seonhee; Hong,
Seokhie; Lee, Sangjin; Lim, Jongin; Yoon,
Seonhee (2001). "Truncated differential...
- pp. 49–60. doi:10.1007/3-540-45661-9_4. ISBN 978-3-540-44009-3. Hong,
Seokhie; Hong, Deukjo; Ko, Youngdai; Chang, Donghoon; Lee, Wonil; Lee, Sangjin...
- 2010-03-06.[better source needed]
Jongsung Kim; Alex Biryukov; Bart Preneel;
Seokhie Hong. "On the
Security of HMAC and NMAC
Based on HAVAL, MD4, MD5, SHA-0...
- Dmitry; Nikolic,
Ivica (2010). "Rotational
Cryptanalysis of ARX". In Hong,
Seokhie; Iwata,
Tetsu (eds.). Fast
Software Encryption, 17th
International Workshop...