default search action
Jin Hong 0001
Person information
- affiliation: Seoul National University, Department of Mathematical Sciences, South Korea
- unicode name: 홍진
Other persons with the same name
- Jin Hong — disambiguation page
- Jin Hong 0002 — Beijing Institute of Technology
- Jin Hong 0003 — Georgia Institute of Technology
- Jin Hong 0004 — University of Science and Technology of China, Hefei, Anhui, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j12]Jin Hong, Hyeonmi Lee:
Solving discrete logarithm problems faster with the aid of pre-computation. Discret. Appl. Math. 267: 93-119 (2019) - 2016
- [j11]Ga Won Lee, Jin Hong:
Comparison of perfect table cryptanalytic tradeoff algorithms. Des. Codes Cryptogr. 80(3): 473-523 (2016) - 2015
- [j10]Jung Woo Kim, Jungjoo Seo, Jin Hong, Kunsoo Park, Sung-Ryul Kim:
High-speed parallel implementations of the rainbow method based on perfect tables in a heterogeneous system. Softw. Pract. Exp. 45(6): 837-855 (2015) - [j9]Taekyoung Kwon, Jin Hong:
Analysis and Improvement of a PIN-Entry Method Resilient to Shoulder-Surfing and Recording Attacks. IEEE Trans. Inf. Forensics Secur. 10(2): 278-292 (2015) - 2014
- [j8]Byoung-Il Kim, Jin Hong:
Analysis of the Perfect Table Fuzzy Rainbow Tradeoff. J. Appl. Math. 2014: 765394:1-765394:19 (2014) - [j7]Jin Hong, Sunghwan Moon:
Erratum to: A Comparison of Cryptanalytic Tradeoff Algorithms. J. Cryptol. 27(1): 181 (2014) - 2013
- [j6]Jin Hong, Sunghwan Moon:
A Comparison of Cryptanalytic Tradeoff Algorithms. J. Cryptol. 26(4): 559-637 (2013) - [c14]Byoung-Il Kim, Jin Hong:
Analysis of the Non-perfect Table Fuzzy Rainbow Tradeoff. ACISP 2013: 347-362 - [i12]Jung Woo Kim, Jin Hong, Kunsoo Park:
Analysis of the Rainbow Tradeoff Algorithm Used in Practice. IACR Cryptol. ePrint Arch. 2013: 591 (2013) - 2012
- [j5]Jin Hong, Hyeonmi Lee:
Young tableaux and crystal B(∞) for the exceptional Lie algebra types. J. Comb. Theory A 119(2): 397-419 (2012) - [j4]Jung Hee Cheon, Jin Hong, Minkyu Kim:
Accelerating Pollard's Rho Algorithm on Finite Fields. J. Cryptol. 25(2): 195-242 (2012) - [c13]Jung Woo Kim, Jungjoo Seo, Jin Hong, Kunsoo Park, Sung-Ryul Kim:
High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System. INDOCRYPT 2012: 303-316 - [i11]Ga Won Lee, Jin Hong:
A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms. IACR Cryptol. ePrint Arch. 2012: 540 (2012) - [i10]Byoung-Il Kim, Jin Hong:
Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff. IACR Cryptol. ePrint Arch. 2012: 612 (2012) - 2011
- [c12]Jin Hong, Ga Won Lee, Daegun Ma:
Analysis of the Parallel Distinguished Point Tradeoff. INDOCRYPT 2011: 161-180 - [i9]Hyung Tae Lee, Jung Hee Cheon, Jin Hong:
Analysis of Discrete Logarithm Algorithm using Pre-computation. IACR Cryptol. ePrint Arch. 2011: 187 (2011) - [i8]Jin Hong, Ga Won Lee, Daegun Ma:
Analysis of the Parallel Distinguished Point Tradeoff. IACR Cryptol. ePrint Arch. 2011: 387 (2011) - 2010
- [j3]Jin Hong:
The cost of false alarms in Hellman and rainbow tradeoffs. Des. Codes Cryptogr. 57(3): 293-327 (2010) - [j2]Taekyoung Kwon, Jin Hong:
Secure and Efficient Broadcast Authentication in Wireless Sensor Networks. IEEE Trans. Computers 59(8): 1120-1133 (2010) - [i7]Jin Hong, Sunghwan Moon:
A Comparison of Cryptanalytic Tradeoff Algorithms. IACR Cryptol. ePrint Arch. 2010: 176 (2010)
2000 – 2009
- 2009
- [j1]Daegun Ma, Jin Hong:
Success probability of the Hellman trade-off. Inf. Process. Lett. 109(7): 347-351 (2009) - [c11]Minkyu Kim, Jung Hee Cheon, Jin Hong:
Subset-Restricted Random Walks for Pollard rho Method on Fpm. Public Key Cryptography 2009: 54-67 - 2008
- [c10]Jung Hee Cheon, Jin Hong, Minkyu Kim:
Speeding Up the Pollard Rho Method on Prime Fields. ASIACRYPT 2008: 471-488 - [c9]Jin Hong, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma:
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-Offs. ISPEC 2008: 131-145 - [i6]Jin Hong, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma:
Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version). IACR Cryptol. ePrint Arch. 2008: 54 (2008) - [i5]Jin Hong:
The Cost of False Alarms in Hellman and Rainbow Tradeoffs. IACR Cryptol. ePrint Arch. 2008: 362 (2008) - 2005
- [c8]Jin Hong, Palash Sarkar:
New Applications of Time Memory Data Tradeoffs. ASIACRYPT 2005: 353-372 - [c7]Jin Hong, Dong Hoon Lee, Yongjin Yeom, Daewan Han:
A New Class of Single Cycle T-Functions. FSE 2005: 68-82 - [c6]Jin Hong:
Period of Streamcipher Edon80. INDOCRYPT 2005: 23-34 - [c5]Jin Hong, Woo-Hwan Kim:
TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY. INDOCRYPT 2005: 169-182 - [i4]Jin Hong, Palash Sarkar:
Rediscovery of Time Memory Tradeoffs. IACR Cryptol. ePrint Arch. 2005: 90 (2005) - [i3]Jin Hong, Woo-Hwan Kim:
TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY. IACR Cryptol. ePrint Arch. 2005: 257 (2005) - 2004
- [c4]Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, Dukjae Moon:
Algebraic Attacks on Summation Generators. FSE 2004: 34-48 - [c3]Jin Hong, Dong Hoon Lee, Seongtaek Chee, Palash Sarkar:
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines. FSE 2004: 193-209 - 2003
- [c2]Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon:
Key Recovery Attacks on NTRU without Ciphertext Validation Routine. ACISP 2003: 274-284 - [c1]Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong:
New Block Cipher: ARIA. ICISC 2003: 432-445 - [i2]Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, Dukjae Moon:
Algebraic Attacks on Summation Generators. IACR Cryptol. ePrint Arch. 2003: 229 (2003) - 2002
- [i1]Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon:
Key recovery attacks on NTRU without ciphertext validation routine. IACR Cryptol. ePrint Arch. 2002: 188 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint