Hong, Seokhie
141  results:
Search for persons X
?
1

Differential Factors Revisited: A Sufficient Condition for ..:

KIM, Seonkyu ; SHIN, Myoungsu ; SHIN, Hanbeom...
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  , 2024
 
?
2

Fault Attack on SQIsign:

, In: Post-Quantum Cryptography; Lecture Notes in Computer Science,
Lee, Jeonghwan ; Heo, Donghoe ; Kim, Hyeonhak... - p. 54-76 , 2024
 
?
3

Accurate False-positive Probability of Multiset-based Demir..:

LEE, Dong Jae ; HONG, Deukjo ; SUNG, Jaechul.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  , 2024
 
?
8

Design and Security Analysis of Cryptosystems:

Kim, Suhri ; Hong, Seokhie
Applied Sciences.  13 (2023)  3 - p. 1427 , 2023
 
?
 
?
 
?
 
?
15

A Preimage Attack on Reduced Gimli-Hash:

, In: Information Security and Cryptology – ICISC 2021; Lecture Notes in Computer Science,
Lee, Yongseong ; Kang, Jinkeon ; Chang, Donghoon. - p. 217-237 , 2022
 
1-15