Seokhie HONG


Known-Key Attack on SM4 Block Cipher
HyungChul KANG Deukjo HONG Jaechul SUNG Seokhie HONG 
Publication:   
Publication Date: 2017/12/01
Vol. E100-A  No. 12  pp. 2985-2990
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
SM4 block cipherknown-key distinguishercollision attack
 Summary | Full Text:PDF(2.2MB)

Known-Key Attacks on Generalized Feistel Schemes with SP Round Function
HyungChul KANG Deukjo HONG Dukjae MOON Daesung KWON Jaechul SUNG Seokhie HONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/09/01
Vol. E95-A  No. 9  pp. 1550-1560
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
generalized Feistel schemesrebound attackknown-key distinguishercollision attackhashing mode
 Summary | Full Text:PDF(1.7MB)

Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function
Dukjae MOON Deukjo HONG Daesung KWON Seokhie HONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/08/01
Vol. E95-A  No. 8  pp. 1379-1389
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
preimage attackhash modeFeistel schemeMisty schemeblock cipher
 Summary | Full Text:PDF(1.7MB)

Acceleration of Differential Power Analysis through the Parallel Use of GPU and CPU
Sung Jae LEE Seog Chung SEO Dong-Guk HAN Seokhie HONG Sangjin LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/09/01
Vol. E93-A  No. 9  pp. 1688-1692
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
differential power analysis (DPA)graphic processing unit (GPU)compute unified device architecture (CUDA)
 Summary | Full Text:PDF(535.9KB)

TinyECCK16: An Efficient Field Multiplication Algorithm on 16-bit Environment and Its Application to Tmote Sky Sensor Motes
Seog Chung SEO Dong-Guk HAN Seokhie HONG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 918-928
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Implementation Issues
Keyword: 
wireless sensor networkelliptic curve cryptosystemefficient implementation
 Summary | Full Text:PDF(676.4KB)

Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
Jongsung KIM Changhoon LEE Jaechul SUNG Seokhie HONG Sangjin LEE Jongin LIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/10/01
Vol. E91-A  No. 10  pp. 3047-3058
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
provable securitydifferential cryptanalysislinear cryptanalysisFeistelCLEFIAMISTY
 Summary | Full Text:PDF(320.7KB)

Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
Donghoon CHANG Mridul NANDI Jesang LEE Jaechul SUNG Seokhie HONG Jongin LIM Haeryong PARK Kilsoo CHUN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9  pp. 2607-2614
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
hash functionrandom oracleideal cipher model
 Summary | Full Text:PDF(320.9KB)

TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote
Seog Chung SEO Dong-Guk HAN Hyung Chan KIM Seokhie HONG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1338-1347
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Implementation
Keyword: 
wireless sensor networkElliptic Curve CryptosystemTinyOSKoblitz curve
 Summary | Full Text:PDF(525.8KB)

Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks
Eunjin LEE Jongsung KIM Deukjo HONG Changhoon LEE Jaechul SUNG Seokhie HONG Jongin LIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/02/01
Vol. E91-A  No. 2  pp. 642-649
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
MISTY 1MISTY 2weak-key classesrelated-key amplified boomerang attackblock ciphers
 Summary | Full Text:PDF(722.7KB)

Linear Attack Using Multiple Linear Approximations
Jun CHOI Deukjo HONG Seokhie HONG Sangjin LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 2-8
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
block cipherlinear cryptanalysismultiple linear cryptanalsis
 Summary | Full Text:PDF(183.3KB)