◈ 수학자
◈ 국내외수학과
◈ 수학연구소
◈ Math Job
◈ 정보제공자
◈ 저명수학자
◈ 수학상
홈 > 수학계사람들 > 국내수학자
   이상진 (Lee, Sang-Jin 부교수) 건국대학교 이과대학 수학과
Total: 57
  • Path lifting properties and embedding between RAAGs. (Lee, Eon-Kyung) J. Algebra  (2016), Vol 448Pages 575-594 

  • Braid groups of imprimitive complex reflection groups. J. Algebra  (2015), Vol 427Pages 387–425 

  • Unknotting number and genus of 3-braid knots. (Lee, Eon-Kyung) J. Knot Theory Ramifications (2013), Vol 22Pages 18 

  • Periodic elements in Garside groups (Lee, Eon-Kyung) J. Pure Appl. Algebra (2011), Vol 215Pages 2295–2314 

  • Dual presentation and linear basis of the Temperley-Lieb algebras. (Lee, Eon-Kyung) J. Korean Math. Soc. (2010), Vol 47Pages 445-454 

  • Uniqueness of roots up to conjugacy for some affine and finite type Artin groups. (Lee, Eon-Kyung) Math. Z. (2010), Vol 265Pages 571-587 

  • Injectivity on the set of conjugacy classes of some monomorphisms between Artin groups. (Lee, Eon-Kyung) J. Algebra (2010), Vol 323Pages 1879-1907 

  • DES with any reduced masked rounds is not secure against side-channel attacks (Kim, Jongsung; Lee, Yuseop) Comput. Math. Appl. (2010), Vol 60Pages 347-354 

  • Estimate-based goodness-of-fit test for large sparse multinomial distributions (Kim, Sung-Ho; Choi, Hyemi) Comput. Statist. Data Anal. (2009), Vol 53Pages 1122-1131 

  • A Garside-theoretic approach to the reducibility problem in braid groups. (Lee, Eon-Kyung) J. Algebra (2008), Vol 320Pages 783--820 

  • Some power of an element in a Garside group is conjugate to a periodically geodesic element. (Lee, Eon-Kyung)  Bull. Lond. Math. Soc. (2008), Vol 40Pages 593--603 

  • Abelian subgroups of Garside groups (Lee Eon-Kyung) Comm. Algebra (2008), Vol 36Pages 1121--1139 

  • Garside groups are strongly translation discrete J. Algebra (2007), Vol 309Pages 594--609 

  • Translation numbers in a Garside group are rational with uniformly bounded denominators (Lee Eon-Kyung) J. Pure Appl. Algebra (2007), Vol 211Pages 732--743 

  • On the pseudorandomness of a modification of KASUMI type permutations. Information security and cryptology---ICISC 2004, 313--329 (Lee, Wonil; Sakurai, Kouichi; Hong, Seokhie) Lecture Notes in Comput. Sci. (2006), Vol 3506

  • Known-IV, known-in-advance-IV, and replayed-and-known-IV attacks on multiple modes of operation of block ciphers. (Hong, Deukjo; Hong, Seokhie; Lee, Wonil ; Lim, Jongin; Sung, Jaechul; Yi, Okyeon) J. Cryptology (2006), Vol 19Pages 441--462 

  • Indifferentiable security analysis of popular hash functions with prefix-free padding. Advances in cryptology---ASIACRYPT 2006 (Chang, Donghoon; Nandi, Mridul; Yung, Moti) Lecture Notes in Comput. Sci. (2006), Vol 4284

  • Padding oracle attacks on multiple modes of operation. Information security and cryptology---ICISC 2004, 343--351 (Lee, Taekeon; Kim, Jongsung; Lee, Changhoon; Sung, Jaechul; Hong, Dowon) Lecture Notes in Comput. Sci. (2005), Vol 3506

  • On security notions for steganalysis (extended abstract). Information security and cryptology---ICISC 2004, 440--454 (Chang, Kisik; Deng, Robert H.; Feng, Bao;Kim, Hyungjun; Lim, Jongin) Lecture Notes in Comput. Sci. (2005), Vol 3506

  • Related-key differential attacks on Cobra-H64 and Cobra-H128. Cryptography and coding, 201--219 (Lee, Changhoon; Kim, Jongsung; Sung, Jaechul; Hong, Seokhie; Moon, Dukjae) Lecture Notes in Comput. Sci. (2005), Vol 3796

  • On the security of encryption modes of MD4, MD5 and HAVAL (extended abstract). Information and communications security (Kim, Jongsung; Biryukov, Alex; Preneel, Bart) Lecture Notes in Comput. Sci. (2005), Vol 3783

  • How to construct universal one-way hash functions of order $r$. Progress in cryptology---INDOCRYPT 2005, 63--76 (Hong, Deukjo; Sung, Jaechul; Hong, Seokhie) Lecture Notes in Comput. Sci. (2005), Vol 3797

  • The kernel of ${rm Burau}(4)otimes Zsb p$ is all pseudo-Anosov (Song Won Taek) Pacific J. Math. (2005), Vol 219Pages 303--310 

  • On the pseudorandomness of a modification of KASUMI type permutations (Lee, Wonil; Sakurai, Kouichi; Hong, Seokhie) Lecture Notes in Comput. Sci. (2005), Vol 3506Pages 313–329 

  • Truncated differential attacks on 8-round CRYPTON. Information security and cryptology---ICISC 2003 (Kim, Jongsung; Hong, Seokhie; Song, J. H.; Yang, Hyungjin) Lecture Notes in Comput. Sci. (2004), Vol 2971

  • Differential cryptanalysis of TEA and XTEA. Information security and cryptology---ICISC 2003, 402--417 ( Hong, Seokhie; Hong, Deukjo; Ko, Youngdai; Chang, Donghoon; Lee, Wonil) Lecture Notes in Comput. Sci. (2004), Vol 2971

  • Higher order universal one-way hash functions. Advances in cryptology---ASIACRYPT 2004, 201--213 (Hong, Deukjo; Preneel, Bart) Lecture Notes in Comput. Sci. (2004), Vol 3329

  • Related-key attacks on reduced rounds of SHACAL-2. Progress in cryptology---INDOCRYPT 2004, 175--190 (Kim, Jongsung; Kim, Guil;Lim, Jongin; Song, Junghwan) Lecture Notes in Comput. Sci. (2004), Vol 3348

  • New block cipher: ARIA. Information security and cryptology---ICISC 2003, 432--445 (Kwon, Daesung; Kim, Jaesung; Park, Sangwoo; Sung, Soo Hak; Sohn, Yaekwon; Song, J. H.; Yeom, Yongjin; Yoon, E-Joong; Lee, Jaewon; Chee, Seongtaek; Han, Daewan; Hong, Jin) Lecture Notes in Comput. Sci. (2004), Vol 2971

  • Related-key attacks on DDP based ciphers: CIKS-128 and CIKS-128H. Progress in cryptology---INDOCRYPT 2004, 191--205 (Ko, Youngdai; Lee, Changhoon; Hong, Seokhie; Sung, Jaechul) Lecture Notes in Comput. Sci. (2004), Vol 3348

  • Impossibility of construction of OWHF and UOWHF from PGV model based on block cipher secure against ACPCA. Progress in cryptology---INDOCRYPT 2004, 328--342 ( Chang, Donghoon; Lee, Wonil; Hong, Seokhie; Sung, Jaechul; Sung, Soohak) Lecture Notes in Comput. Sci. (2004), Vol 3348

  • Differential and linear cryptanalysis for 2-round SPNs (Chun, Kilsoo; Kim, Seungjoo;Sung, Soo Hak; Yoon, Seonhee)  Inform. Process. Lett. (2003), Vol 87Pages 277--282 

  • Full-round differential attack on the original version of the hash function proposed at PKC'98. Selected areas in cryptography, 160--174 (Chang, Donghoon; Sung, Jaechul; Sung, Soohak;Lim, Jongin) Lecture Notes in Comput. Sci. (2003), Vol 2595

  • Impossible differential cryptanalysis for block cipher structures. Progress in cryptology---INDOCRYPT 2003, 82--96 (Kim, Jongsung; Hong, Seokhie; Sung, Jaechul;Lim, Jongin; Sung, Soohak) Lecture Notes in Comput. Sci. (2003), Vol 2904

  • Impossible differential attack on 30-round SHACAL-2. Progress in cryptology---INDOCRYPT 2003, 97--106 (Hong, Seokhie; Kim, Jongsung; Kim, Guil; Sung, Jaechul; Lee, Changhoon) Lecture Notes in Comput. Sci. (2003), Vol 2904

  • New parallel domain extenders for UOWHF. Advances in cryptology---ASIACRYPT 2003, 208--227 (Lee, Wonil; Chang, Donghoon;Sung, Soohak; Nandi, Mridul) Lecture Notes in Comput. Sci. (2003), Vol 2894

  • Provable security for 13 round Skipjack-like structure. (Hong, Seokhie; Sung, Jaechul; Lim, Jongin; Kim, Jongsu) Inform. Process. Lett. (2002), Vol 82Pages 243--246 

  • Truncated differential cryptanalysis of Camellia. Information security and cryptology---ICISC 2001 (Seoul), 32--38 (Lee, Seonhee; Hong, Seokhie;Lim, Jongin; Yoon, Seonhee) Lecture Notes in Comput. Sci. (2002), Vol 2288

  • Concrete security analysis of CTR-OFB and CTR-CFB modes of operation. Information security and cryptology---ICISC 2001 (Seoul), 103--113 (Sung, Jaechul;Lim, Jongin; Lee, Wonil; Yi, Okyeon) Lecture Notes in Comput. Sci. (2002), Vol 2288

  • Amplified boomerang attack against reduced-round SHACAL. Advances in cryptology---ASIACRYPT 2002, 243--253 (Kim, Jongsung; Moon, Dukjae; Lee, Wonil; Hong, Seokhie; Jung, Seokwon) Lecture Notes in Comput. Sci. (2002), Vol 2501

  • Potential weaknesses of the commutator key agreement protocol based on braid groups (Lee Eonkyung) Lecture Notes in Comput. Sci., 2332 (2002), Pages 14--28 

  • Known-IV attacks on triple modes of operation of block ciphers. Advances in cryptology---ASIACRYPT 2001 (Gold Coast), 208--221 (Hong, Deukjo; Sung, Jaechul; Hong, Seokhie; Lee, Wonil;Lim, Jongin; Yi, Okyeon)  Lecture Notes in Comput. Sci. (2001), Vol 2248

  • The infimum, supremum, and geodesic length of a braid conjugacy class (Birman Joan S., Ko Ki Hyoung) Adv. Math. (2001), Vol 164Pages 41--56 

  • Difference distribution attack on DONUT and improved DONUT (Cheon Dong Hyeon, Hong Seok Hie, Lee Sung Jae, Park Kyung Hwan, Yoon Seon Hee) Lecture Notes in Comput. Sci., 2015 (2001), Vol 2015Pages 37--48 

  • Pseudorandomness from braid groups (Lee Eonkyung, Hahn Sang Geun) Lecture Notes in Comput. Sci., 2139 (2001), Vol 2139Pages 486--502 

  • An efficient implementation of braid groups (Cha Jae Choon, Ko Ki Hyoung, Han Jae Woo, Cheon Jung Hee) Lecture Notes in Comput. Sci., 2248 (2001), Pages 144--156 

  • A lower bound on the linear span of an FCSR (Seo, Changho; Sung, Yeoulouk; Han, Keunhee; Kim, Sangchoon) IEEE Trans. Inform. Theory (2000), Vol 46Pages 691--693 

  • New public-key cryptosystem using braid groups. Advances in cryptology---CRYPTO 2000 (Santa Barbara, CA), 166--183 ( Ko, Ki Hyoung; Cheon, Jung Hee; Han, Jae Woo; Kang, Ju-sung; Park, Choonsik)  Lecture Notes in Comput. Sci. (2000), Vol 1880

  • Provable security for the Skipjack-like structure against differential cryptanalysis and linear cryptanalysis. Advances in cryptology---ASIACRYPT 2000 (Kyoto), 274--288 (Lee, Sangjin; Lim, Jongin; Hong, Seokhie; Park, Sangjoon) Lecture Notes in Comput. Sci. (2000), Vol 1976

  • Flypes of closed $3$-braids in the standard contact space (Ko Ki Hyoung, Cheon Jung Hee, Han Jae Woo, Kang Ju-sung, Park Choonsik)  J. Korean Math. Soc. (1999), Vol 36Pages 51--71 

  • A new approach to the word and conjugacy problems in the braid groups (Birman Joan, Ko Ki Hyoung) Adv. Math. (1998), Vol 139Pages 322--353 

  • Improving bounds for the number of correlation immune Boolean functions. (Park, Sung Mo;Sung, Soo Hak; Kim, Kwangjo) Inform. Process. Lett. (1997), Vol 61Pages 209--212 

  • Band-generator presentation for the $4$-braid group (Kang Eun Sook, Ko Ki Hyoung) Topology Appl. (1997), Vol 78Pages 39--60 

  • Genera of some closed $4$-braids (Ko Ki Hyoung) Topology Appl. (1997), Vol 78Pages 61--77 

  • On the correlation immune functions and their nonlinearity. Advances in cryptology---ASIACRYPT '96 (Kyongju), 232--243 (Chee, Seongtaek; Lee, Daiki; Sung, Soo Hak) Lecture Notes in Comput. Sci. (1996), Vol 1163

  • Semi-bent functions. Advances in cryptology---ASIACRYPT '94 (Wollongong, 1994), 107--118 (Chee, Seongtaek; Kim, Kwangjo) Lecture Notes in Comput. Sci. (1995), Vol 917

  • On the security of the Gollmann cascades. Advances in cryptology---CRYPTO '95 (Santa Barbara, CA, 1995), 148--156 (Park, Sang-Joon;Goh, Seung-Cheol) Lecture Notes in Comput. Sci. (1995), Vol 963

 
개인정보보호정책 l 이메일주소집단수집금지 l 뷰어다운로드
qr코드