Bonwook KOO


Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent
Deukjo HONG Bonwook KOO Dong-Chan KIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 372-380
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
ARIACamelliaSerpenthash functionPGVpreimagemeet-in-the-middle
 Summary | Full Text:PDF(781.8KB)

Related-Key Boomerang Attack on Block Cipher SQUARE
Bonwook KOO Yongjin YEOM Junghwan SONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 3-9
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
block ciphercryptanalysisrelated-key boomerang attackSQUARE
 Summary | Full Text:PDF(3MB)

Security of the Misty Structure Using Involutions as Round Functions
Jooyoung LEE Bonwook KOO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/09/01
Vol. E93-A  No. 9  pp. 1612-1619
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
Misty structureinvolutionpseudorandomness
 Summary | Full Text:PDF(996.1KB)