Follow
Jooyoung Lee
Jooyoung Lee
School of Computing, KAIST
Verified email at kaist.ac.kr - Homepage
Title
Cited by
Cited by
Year
Deterministic key predistribution schemes for distributed sensor networks
J Lee, DR Stinson
International Workshop on Selected Areas in Cryptography, 294-307, 2004
2892004
A combinatorial approach to key predistribution for distributed sensor networks
J Lee, DR Stinson
IEEE WCNC 2005, 1200-1205, 2005
2472005
On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs
J Lee, DR Stinson
ACM Transactions on Information and System Security (TISSEC) 11 (2), 1:1-1:35, 2008
1642008
Minimizing the two-round Even–Mansour cipher
S Chen, R Lampe, J Lee, Y Seurin, J Steinberger
Journal of Cryptology 31, 1064-1119, 2018
1302018
Efficient Authenticated Key Exchange Protocols
J Lee, JH Park
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2011
72*2011
The preimage security of double-block-length compression functions
F Armknecht, E Fleischmann, M Krause, J Lee, M Stam, J Steinberger
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
61*2011
The security of Abreast-DM in the ideal cipher model
J Lee, D Kwon
IEICE transactions on fundamentals of electronics, communications and …, 2011
562011
The collision security of Tandem-DM in the ideal cipher model
J Lee, M Stam, J Steinberger
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
512011
MJH: A faster alternative to MDC-2
J Lee, M Stam
Cryptographers’ Track at the RSA Conference, 213-236, 2011
492011
An Efficient Authenticated Key Exchange Protocol with a Tight Security Reduction.
J Lee, CS Park
IACR Cryptology ePrint Archive 2008, 345, 2008
452008
Transciphering framework for approximate homomorphic encryption
J Cho, J Ha, S Kim, BH Lee, J Lee, J Lee, D Moon, H Yoon
International Conference on the Theory and Application of Cryptology and …, 2021
43*2021
On lai–massey and quasi-feistel ciphers
A Yun, JH Park, J Lee
Designs, Codes and Cryptography 58, 45-72, 2011
43*2011
Tight security bounds for double-block hash-then-sum MACs
S Kim, BH Lee, J Lee
Annual International Conference on the Theory and Applications of …, 2020
402020
Provable security of (tweakable) block ciphers based on substitution-permutation networks
B Cogliati, Y Dodis, J Katz, J Lee, J Steinberger, A Thiruvengadam, ...
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
36*2018
: Noisy Ciphers for Approximate Homomorphic Encryption
J Ha, S Kim, BH Lee, J Lee, M Son
Annual International Conference on the Theory and Applications of …, 2022
35*2022
Common intersection designs
J Lee, DR Stinson
Journal of Combinatorial Designs 14 (4), 251-269, 2006
302006
Masta: an HE-friendly cipher using modular arithmetic
J Ha, S Kim, W Choi, J Lee, D Moon, H Yoon, J Cho
IEEE Access 8, 194741-194751, 2020
262020
: white-box secure block cipher using parallel table look-ups
J Kwon, BH Lee, J Lee, D Moon
Cryptographers’ Track at the RSA Conference, 106-128, 2020
262020
New constructions of MACs from (tweakable) block ciphers
B Cogliati, J Lee, Y Seurin
IACR Transactions on Symmetric Cryptology, 27-58, 2017
262017
The security of multiple encryption in the ideal cipher model
Y Dai, J Lee, B Mennink, J Steinberger
Annual Cryptology Conference, 20-38, 2014
252014
The system can't perform the operation now. Try again later.
Articles 1–20