| Bonwook KOO
|
Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent Deukjo HONG Bonwook KOO Dong-Chan KIM | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A
No. 1
pp. 372-380
Type of Manuscript:
PAPER Category: Cryptography and Information Security Keyword: ARIA, Camellia, Serpent, hash function, PGV, preimage, meet-in-the-middle, | | Summary | Full Text:PDF(781.8KB) | |
|
|
|
Security of the Misty Structure Using Involutions as Round Functions Jooyoung LEE Bonwook KOO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/09/01
Vol. E93-A
No. 9
pp. 1612-1619
Type of Manuscript:
PAPER Category: Cryptography and Information Security Keyword: Misty structure, involution, pseudorandomness, | | Summary | Full Text:PDF(996.1KB) | |
|
|