발행물

전체 논문

51

21

Cryptanalysis of the Paeng-Jung-Ha cryptosystem from PKC 2003
Han D., Yeom Y., Kim M.-H.
Lecture Notes in Computer Science, 2007

22

Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005
Kwon D., Han D., Lee J., Yeom Y.
Lecture Notes in Computer Science, 2006

23

순환 법 격자에 대한 추정 후 축소 기법
염용진, 0, 0
정보보호학회논문지, 200504

24

스트림 암호의 발전 방향
염용진, 0, 0
정보과학회지 - 직접입력, 200501

25

A new class of single cycle T-functions
Hong, J, Lee, DH, Yeom, YJ, Han, DW
FAST SOFTWARE ENCRYPTION, 2005

26

IT839전략과 정보보호
염용진, 0, 0, 0
정보보호학회지 - 직접입력, 200410

27

New block cipher: ARIA
Kwon, D, Kim, J, Park, S, Sung, SH, Sohn, Y, Song, JH, Yeom, Y, Yoon, EJ, Lee, S, Lee, J, Chee, S, Han, D, Hong, J
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004

28

On the security of CAMELLIA against the square attack
Yeom, Y, Park, S, Kim, I
FAST SOFTWARE ENCRYPTION (REVISED PAPERS), 2002

29

A frequency-domain parallel method for the numerical approximation of parabolic problems
Lee C.-O., Lee J., Sheen D., Yeom Y.
Computer Methods in Applied Mechanics and Engineering, 199901

30

Stieltjes Moment Problem for Gel'fand-Shilov Spaces
염용진
Fractional Calculus & Applied Analysis, 199901