Jongin LIM


Efficient Sequential Architecture of AES CCM for the IEEE 802.16e
Jae Deok JI Seok Won JUNG Jongin LIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D  No. 1  pp. 185-187
Type of Manuscript:  Special Section LETTER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Privacy
Keyword: 
cryptographycommunication system securityintegrated chip designFPGA
 Summary | Full Text:PDF(245.5KB)

Efficient Trapdoor Commitment as Secure as Factoring with Useful Properties
Taek-Young YOUN Young-Ho PARK Jongin LIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/12/01
Vol. E92-D  No. 12  pp. 2520-2523
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
securitytrapdoor commitmentkey exposure freenessstrong trapdoor openinginteger factoring problem
 Summary | Full Text:PDF(89.1KB)

An Efficient Signature Scheme with Fast Online Signing
Taek-Young YOUN Young-Ho PARK Jongin LIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/10/01
Vol. E92-A  No. 10  pp. 2431-2437
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
online/offline signaturetrapdoor hash functionstrong RSA assumptiondivision intractabilitydiscrete logarithm with short exponent problem
 Summary | Full Text:PDF(200.1KB)

Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
Jongsung KIM Changhoon LEE Jaechul SUNG Seokhie HONG Sangjin LEE Jongin LIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/10/01
Vol. E91-A  No. 10  pp. 3047-3058
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
provable securitydifferential cryptanalysislinear cryptanalysisFeistelCLEFIAMISTY
 Summary | Full Text:PDF(320.7KB)

Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
Donghoon CHANG Mridul NANDI Jesang LEE Jaechul SUNG Seokhie HONG Jongin LIM Haeryong PARK Kilsoo CHUN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9  pp. 2607-2614
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
hash functionrandom oracleideal cipher model
 Summary | Full Text:PDF(320.9KB)

Impersonation Attack on a Strong ID-Based Key Distribution
JungYeon HWANG Jongin LIM DongHoon LEE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/08/01
Vol. E91-B  No. 8  pp. 2702-2703
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
ID-based key distributionimpersonation
 Summary | Full Text:PDF(62.6KB)

Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications
Taek-Young YOUN Young-Ho PARK Taekyoung KWON Soonhak KWON Jongin LIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1481-1484
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: Secure Communication
Keyword: 
signaturebatch signingimbalanced communication
 Summary | Full Text:PDF(109.8KB)

Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks
Eunjin LEE Jongsung KIM Deukjo HONG Changhoon LEE Jaechul SUNG Seokhie HONG Jongin LIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/02/01
Vol. E91-A  No. 2  pp. 642-649
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
MISTY 1MISTY 2weak-key classesrelated-key amplified boomerang attackblock ciphers
 Summary | Full Text:PDF(722.7KB)

Side Channel Cryptanalysis on XTR Public Key Cryptosystem
Dong-Guk HAN Tetsuya IZU Jongin LIM Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/05/01
Vol. E88-A  No. 5  pp. 1214-1223
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
XTR public key cryptosystemside channel attacksSPAdata-bit DPAaddress-bit DPAdoubling attackrefined power analysiszero-value attack
 Summary | Full Text:PDF(221.9KB)

Impossible Differential Cryptanalysis of Zodiac
Deukjo HONG Jaechul SUNG Shiho MORIAI Sangjin LEE Jongin LIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 38-43
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Zodiacimpossible differential cryptanalysis
 Summary | Full Text:PDF(956.9KB)