|
- New variant of the self-shrinking generator and its cryptographic properties (Chang, Ku-Young; Lee, Mun-Kyu; Lee, Hangrok; Hong, Dowon) Lecture Notes in Comput. Sci. (2006), Vol 4296, Pages 41–50
- An extension of TYT algorithm for ${rm GF}((2^n)^m)$ using precomputation. (Kim, Howon; Kang, Ju-Sung; Cho, Hyun-Sook) Inform. Process. Lett. (2004), Vol 92, Pages 231--234
- A note on the higher order differential attack of black ciphers with two-block structures. Information security and cryptology---ICISC 2000 (Seoul) (Chee, Seongtaek; Park, Choonsik) Lecture Notes in Comput. Sci., 2015, (2001), Pages 1--13
- Provable security of KASUMI and 3GPP encryption mode $f8$. (Shin, Sang-Uk; Hong, Dowon; Yi, Okyeon) Lecture Notes in Comput. Sci., 2248, (2001), Pages 255--271
- New public-key cryptosystem using braid groups. Advances in cryptology---CRYPTO 2000 (Santa Barbara, CA) (Ko, Ki Hyoung; Lee, Sang Jin; Cheon, Jung Hee; Han, Jae Woo; Park, Choonsik) Lecture Notes in Comput. Sci., 1880, (2000), Pages 166--183
- A note on the weak invariance principle for local times. (Wee, In-Suk) Statist. Probab. Lett. (1997), Vol 32, Pages 147--159
- On the weak invariance principle for ranges of recurrent random walks with infinite variance. (Wee, In-Suk) Bull. Korean Math. Soc. (1997), Vol 34, Pages 295--303
|