Author of the publication

New Parallel Domain Extenders for UOWHF.

, , , , and . ASIACRYPT, volume 2894 of Lecture Notes in Computer Science, page 208-227. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model., , , , , and . IACR Cryptol. ePrint Arch., (2004)A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks., , , , , and . IACR Cryptol. ePrint Arch., (2023)Differential Cryptanalysis of TEA and XTEA., , , , , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 402-417. Springer, (2003)Services-Oriented Computing in a Ubiquitous Computing Platform., , , and . ICSOC, volume 4294 of Lecture Notes in Computer Science, page 601-612. Springer, (2006)Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA., , , , and . FSE, volume 2365 of Lecture Notes in Computer Science, page 49-60. Springer, (2002)New Parallel Domain Extenders for UOWHF., , , , and . ASIACRYPT, volume 2894 of Lecture Notes in Computer Science, page 208-227. Springer, (2003)Unlimited Vocabulary Grapheme to Phoneme Conversion for Korean TTS., , , and . COLING-ACL, page 675-679. Morgan Kaufmann Publishers / ACL, (1998)Table-driven Neural Syntactic Analysis of Spoken Korean., , and . COLING, page 911-915. (1994)Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST., , , , and . FSE, volume 3017 of Lecture Notes in Computer Science, page 299-316. Springer, (2004)Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers., , , , , , and . J. Cryptol., 19 (4): 441-462 (2006)