Cryptographers' World
 

Jin Hong



8 papers in database with 129 citations 

H-number: 5

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Minkyu Kim,  Jung Hee Cheon,  Jin Hong,  Subset-Restricted Random Walks for Pollard rho Method on F, pp. 54 - 67, PKC 2009.

[Electronic Edition][No citation]

2. Jung Hee Cheon,  Jin Hong,  Minkyu Kim,  Speeding Up the Pollard Rho Method on Prime Fields, pp. 471 - 488, ASIACRYPT 2008.

[Electronic Edition][Cited 8 times ]

3. Jin Hong,  Palash Sarkar,  New Applications of Time Memory Data Tradeoffs, pp. 353 - 372, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 39 times ]

4. Jin Hong,  Period of Streamcipher Edon80 , pp. 23 - 34, INDOCRYPT 2005.

[Electronic Edition][Cited 3 times ]

5. Jin Hong,  Woo-Hwan Kim,  TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY, pp. 169 - 182, INDOCRYPT 2005.

[Electronic Edition][Cited 10 times ]

6. Jin Hong,  Dong Hoon Lee,  Yongjin Yeom,  Daewan Han,  A New Class of Single Cycle T-Functions, pp. 68 - 82, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 24 times ]

7. Dong Hoon Lee,  Jae Heon Kim,  Jin Hong,  Jae Woo Han,  Dukjae Moon,  Algebraic Attacks on Summation Generators, pp. 34 - 48, FSE 2004.

[Electronic Edition][Cited 43 times ]

8. Jin Hong,  Dong Hoon Lee,  Seongtaek Chee,  Palash Sarkar,  Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines, pp. 193 - 209, FSE 2004.

[Electronic Edition][Cited 2 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...