Publication

Peer-reviewed International Journal Papers (SCI, SCIE, SSCI)

  1. Changhoon Lee, “Biclique cryptanalysis of PRESENT-80 and PRESENT-128”, The Journal of Supercomputing, Springer US, 28 January 2014, DOI 10.1007/s11227-014-1103-3.
  2. Hang Tu, Neeraj Kumar, Debiao He, Jongsung Kim, Changhoon Lee, “An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks”, The Journal of Supercomputing, Springer.
  3. Soon Seok Kim, Gil Hong Park, Yong Hee Lee, Deok Seok Seo, Yun Yeop Cha,Chang Hoon Lee, “International Standardization Status and Analysis of National Priorities on Health Information Security”, Telecommunication Systems, (To appear).
  4. Sooyoung Park, Hyunji Chung, Changhoon Lee, Sangjin Lee, Kyungho Lee, “Methodology and implementation for tracking the file sharers using BitTorrent”, Multimedia Tools and Applications, 10 December 2013, Springer US.
  5. Mingbiao Li, Naixue Xiong, Bo Yang, Zhonghua Li, Jong Hyuk Park, Changhoon Lee, “Posted Price Model Based on GRS and Its Optimization for Improving Grid Resource Sharing Efficiency”, Telecommunication Systems, 03 August 2013, Springer US.
  6. [Editorial] Changhoon Lee, Jiang Xiaohong, Christian Becker, “Special Issue on Recent Advanced in Ubiquitous Infrastructure Technology”, Telecommunication Systems, 03 August 2013, Springer US.
  7. Kitae Jeong, HyungChul Kang, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jong In Lim “Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis”, Peer-to-Peer Networking and Applications, 11 May 2013, Springer US.
  8. Kyung-Soo Lim, Changhoon Lee, Jong Hyuk Park, Sang-Jin Lee, “Test-driven forensic analysis of satellite automotive navigation systems”Journal of Intelligent Manufacturing, 05 June 2012, Springer : DOI : 10.1007/s10845-012-0653-6
  9. [Editorial] Changhoon Lee, Wenny Rahayu, Uyen Trang Nguyen , "Knowledge management technologies for semantic multimedia services", Multimedia Tools and Applications, October 2013 Springer US.
  10. [Editorial] Changhoon Lee, Hongxue Wang, and Juan Li, “A Special Section on Wireless Sensor Networks Technologies and Applications for Smart Spaces”, Volume 11, Number 9 (September 2013) pp. 1672-1674, Sensor Letter, American Scientific Publishers.
  11. Yuhua Liu, Wenwen Dai, Yanzhen Qu, Cui Xu, Naixue Xiong, Changhoon Lee, and Zheng Wan, “Ring and Clustering Routing strategy based on Data Filed in Sensor Network”, Volume 11, Number 9 (September 2013) pp. 1828-1835, Sensor Letter, American Scientific Publishers.
  12. Jinkeon Kang, Kitae Jeong, Seokhie Hong, Changhoon Lee, “Related-Key Amplified Boomerang Attacks on KT-64 and MD-64 Suitable for Wireless Sensor Networks”, Volume 11, Number 9 (September 2013) pp. 1765-1770, Sensor Letter, American Scientific Publishers.
  13. Yuseop Lee, Kitae Jeong, Changhoon Lee, Jaechul Sung and Seokhie Hong, “Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing”, Volume 2014 , Article ID 389476, 10 pages, 2014, Hindawi.
  14. Jewan Bang, Changhoon Lee, Sangjin Lee, Kyungho Lee, “Damaged backup data recovery method for Windows mobile”, The Journal of Supercomputing, November 2013, Volume 66, Issue 2, pp 875-887, Springer.
  15. Yuseop Lee, Kitae Jeong, Jaechul Sung, Changhoon Lee, Seokhie Hong, and Ku-Young Chang, “Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks”, International Journal of Distributed Sensor Networks, Volume 2013 (2013), Article ID 169638, 9 pages. (http://dx.doi.org/10.1155/2013/169638)
  16. Kitae Jeong, Changhoon Lee and Jongin Lim, “Improved differential fault analysis on lightweight block cipher LBlock for wireless sensor networks”, EURASIP Journal on Wireless Communications and Networking 2013, 2013:151, Published: 3 June 2013. (doi:10.1186/1687-1499-2013-151)
  17. Kyung-Soo Lim, Changhoon Lee, “A Framework for Unified Digital Evidence Management in Security Convergence”, Electronic Commerce Research, September 2013, Volume 13, Issue 3, pp 379-398, Springer US.
  18. Keungi Lee, Changhoon Lee, Sangjin Lee, “On-site investigation methodology for incident response in Windows environments”, Computers & Mathematics with Applications, Volume 65, Issue 9, May 2013, Pages 1413–1420, Elsevier.
  19. Namheun Son, Keungi Lee, SangJun Jeon, Sangjin Lee, Changhoon Lee, “The effective method of database server forensics on the enterprise environment”, Security and Communication Networks, Volume 5, Issue 10, pages 1086–1093, October 2012, John Wiley & Sons, Inc. New York, NY, USA
  20. Sudip Misra, P. Venkata Krishna, Akhil Bhiwal, Amardeep Singh Chawla, Bernd E. Wolfinger, Changhoon Lee, “A Learning Automata-Based Fault-Tolerant Routing Algorithm for Mobile Ad Hoc Networks”, Journal of Supercomputing, October 2012, Volume 62, Issue 1, pp 4-23, Springer.
  21. Hye-Young Kim, Changhoon Lee, “A Key Management Scheme for Security and Energy Efficiency in Sensor Networks”, Journal of Internet Technology, Vol. 13 No. 2, P.223-232 (2012/3), Taiwan Academic Network.
  22. Kyung-Soo Lim, Antonio Savoldi, Changhoon Lee, Sangjin Lee, “On-the-spot digital investigation by means of LDFS: Live Data Forensic System”, Mathematical and Computer Modelling, Volume 55, Issues 1–2, January 2012, Pages 223–240, Elsevier.
  23. Lansheng Han, Cai Fu, Deqing Zou, Changhoon Lee, Wenjing Jia, “Task-based behavior detection of illegal codes”, Mathematical and Computer Modelling, Volume 55, Issues 1–2, January 2012, Pages 80–86, Elsevier.
  24. Taek-Young Youn, Eun-Sook Kang, Changhoon Lee, “Efficient three-party key exchange protocols with round efficiency”, Telecommunication Systems, February 2013, Volume 52, Issue 2, pp 1367-1376, Springer (Cover Date2013-02-01).
  25. JangWoo Park, Dae Heon Park, Changhoon Lee, “Angle and Ranging based localization method for Ad-Hoc Network”, Journal of Supercomputing, May 2013, Volume 64, Issue 2, pp 507-521, Springer.
  26. Hongju Cheng, Naixue Xiong, Laurence T. Yang, Guolong Chen, Xiaofang Zhuang, Changhoon Lee, “Links organization for channel assignment in multi-radio wireless mesh networks”, Multimedia Tools and Applications, July 2013, Volume 65, Issue 2, pp 239-258, Springer US (Cover Date 2013-07-01).
  27. [Editorial] Jong Hyuk Park, Oscar C. Au, Mikael Wiberg, Changhoon Lee, "Recent advances and future directions in multimedia and mobile computing", Multimedia Tools and Applications, March 2012, Volume 57, Issue 2, pp 237-242 , Spinger US.
  28. Taek-Young Youn, Changhoon Lee, Eun-Sook Kang, “Cryptanalysis of improved simple three-party key exchange protocols”, Telecommunication Systems, Springer (To appear).
  29. Changhoon Lee, Jongsung Kim, Jaechul Sung, Yang-Sun Lee, Chang Hoon Lee, “Cryptanalysis of CIKS-128 and CIKS-128h Suitable for Intelligent Multimedia and Ubiquitous Computing Systems”, Computing and Informatics, Vol. 30, No. 3, 2011, SAS.
  30. Yun Seop Yu, Seong Ho Choi, Hyung-Kun Park, Changhoon Lee, Young-Sik Jeong and Sang-Hoon Kim, “A power-, delay- and emergency-efficient protocol of ubiquitous sensor network systems for silver town applications”, Journal of Supercomputing, Vol. 54, No. 1, pp.122-137, 2010, Springer.
  31. Eun-Jun Yoon, Kee-Young Yoo, Sang-Soo Yeo, Changhoon Lee, “Robust Deniable Authentication Protocol”, Wireless Personal Communications, Vol. 55, No. 1, pp.81-90, 2010, Springer.
  32. Changhoon Lee, Sangjin Lee, Jong-Hyuk Park, Sajid Hussain, Jun Hwan Song, “Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device”, Telecommunication Systems, Vol. 44, No. 3, pp.267-279, 2010, Springer.
  33. Muhammad Usama, Muhammad Khurram Khan, Khaled Alghathbar,Changhoon Lee, “Chaos-based secure satellite imagery cryptosystem”, Computers & Mathematics with Applications, Vol. 60, Issue 2, pp.326-337, 2010, Elsevier.
  34. Wen-Zhong Guo, Nai-Xue Xiong, Changhoon Lee, Laurence T. Yang, Guo-Long Chen, Qian Weng, “Task Allocation Algorithm Based on Particle Swarm Optimization in Heterogeneous Computing Environments”, Journal of Internet Technology, Vol. 1, No. 1, pp.343-352, 2010, Taiwan Academic Network.
  35. Jaeik Cho, Changhoon Lee, Sanghyun Cho, Jung Hwan Song, Jongin Lim, Jongsub Moon, “A statistical model for network data analysis: KDD CUP 99′ data evaluation and its comparing with MIT Lincoln Laboratory network data”, Simulation Modelling Practice and Theory, Vol. 18, Issue. 4, pp.431-435, 2010, Elsevier.
  36. Hamid R. Arabnia, Wai-Chi Fang, Changhoon Lee, Yan Zhang, “Context-Aware Middleware and Intelligent Agents for Smart Environments”, IEEE Intelligent Systems, Volume 25, Number 2, March/April 10-11, 2010.
  37. Kitae Jeong, Changhoon Lee, Jongsung Kim, Seokhie Hong, “Security analysis of the SCO-family using key schedules”, Information Sciences, Vol. 179, no. 24, pp.4232-4242, 2009, Elsevier.
  38. Kyung-Soo Lim, Yongseok Choi, Jongsung Kim, Changhoon Lee, Sangjin Lee, “CFES: Comprehensive Framework for Forensic Analysis of Embedded Systems”, Journal of Internet Technology, Vol. 11, no. 1, pp.549-562, 2009, Taiwan Academic Network.
  39. Changhoon Lee, Jongsung Kim, Seokhie Hong, Yang-Sun Lee, “Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments”, Journal of Universal Computer Science, Vol. 15, no. 5, pp.1007-1022, 2009.
  40. Jongsung Kim, Changhoon Lee, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jongin Lim, “Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis”, IEICE Transactions – Fundamentals of Electronics, Communications and Computer Sciences, E91-A/10/3047-3058, Oct., 2008.
  41. Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee, “Security Analysis of the Full-round DDO-64 Block Cipher”, Journal of Systems and Software, Volume 81, Issue 12, December 2008, Pages 2328-2335, Elsevier .
  42. Eunjin Lee, Jongsung Kim, Deukjo Hong, Changhoon Lee, Seokhie Hong, Jaechul Sung, “Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks”, IEICE Transactions – Fundamentals of Electronics, Communications and Computer Sciences, Vol. E91-A No.2, pp.642-649, Feb. 2008.
  43. Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bon-Seok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Jongsung Kim and Seongtaek Chee, “HIGHT : New Block Cipher Suitable for Low-Resource Device”, Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006), Lecture Notes in Computer Science, Vol. 4249, pp. 46-59, Springer-Verlag, 2006.10.10.
  44. Jiqiang Lu, Changhoon Lee, Jongsung Kim, “Related-Key Attacks on Full-round Cobra-F64a and Cobra-F64b”, 5th Conference on Security and Cryptography for Networks (SCN 2006), Lecture Notes in Computer Science, Vol. 4116, pp. 95-110, Springer-Verlag, 2006.09.06.
  45. Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, “Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC variant”, 11th Australasian Conference on Information Security and Privacy (ACISP 2006), Lecture Notes in Computer Science, Vol. 4058, pp. 421-431, Springer-Verlag, 2006.07.03.
  46. Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee, “Provable Security for an RC6-like Structure and a Misty-FO-like Structure against Differential Cryptanalysis and Linear Cryptanalysis”, Applied Cryptography and Information Security (ACIS 2006), Lecture Notes in Computer Science, Vol. 3982, pp. 446-455, Springer-Verlag, 2006.05.11.
  47. Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon, “Related-Key Differential Attacks on Cobra-H64 and Cobra-H128″, Tenth IMA International Conference On Cryptography and Coding (CCC 2005), Lecture Notes in Computer Science, Vol. 3796, pp. 201-219, Springer-Verlag, 2005.12.19.
  48. Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee, “Related Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b”, MYCRYPT 2005, Lecture Notes in Computer Science, Vol. 3715, pp. 245-263, Springer-Verlag, 2005.09.28.
  49. Youngdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee, “Related Key Attacks on DDP based Ciphers: CIKS-128 and CIKS-128H”, INDOCRYPT 2004, Lecture Notes in Computer Science, Vol. 3348, pp. 191-205, Springer-Verlag, 2004.12.20.
  50. Taegun Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong, “Padding Oracle Attacks on Multiple modes of operation”, ICISC 2004, Lecture Notes in Computer Science, Vol. 3506, pp. 343-351, Springer-Verlag, 2004.12.02.
  51. Youngdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee, “Related-Key Differential Cryptanalysis of Full-round SPECTR-H64 and CIKS-1″, ACISP 2004, Lecture Notes in Computer Science, Vol. 3108, pp. 123-136, Springer-Verlag, 2004.7.13.
  52. Seokhie Hong, Jongsung kim, Guil Kim, Jaechul sung, Changhoon Lee, Sangjin Lee, “Impossible Differential Attack on 30-Round SHACAL-2″, INDOCRYPT 2003, Lecture Notes in Computer Science, Vol. 2904, pp. 97-106, Springer-Verlag, 2003.
  53. Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Jongin Lim, and Hyungjin Yang, “A Chosen Linear Attack On Blcok Cipher CIKS-1″, ICICS 2002, Lecture Notes in Computer Science, Vol. 2513, pp 456-468, Springer-Verlag, 2002.

Peer-reviewd International Journal Papers (SCOPUS)

  1. Kitae Jeong, Jaechul Sung, Seokhie Hong and Changhoon Lee, “A New Approach of Differential Fault Analysis on Block Ciphers with S-box”, INFORMATION-An International Interdisciplinary Journal, Vol.16, No.3(A), pp.1915-1928, March, 2013, Published by International Information Institute.
  2. Sekie Amanuel Majore, Changhoon Lee, Taeshik Shon, “XFS File System and File Recovery Tools”, International Journal of Smart Home, Vol. 7, No. 1, pp. 193-197, January, 2013.
  3. Sania Yaqoob, Changhoon Lee, Taeshik Shon, “A Study on Tachograph based Security Network”, International Journal of Smart Home, Vol. 7, No. 1, pp. 231-238, January, 2013.

International Conference Papers

  1. [scopus] Jinkeon Kang, KitaeJeong, Changhoon Lee, Seokhie Hong, “Distinguishing attack on SDDO-based block cipher BMD-128”, Ubiquitous Information Technologies and Applications, Lecture Notes in Electrical Engineering Volume 280,  2014, pp 595-602.
  2. [scopus] Jaeung Namgung, Il young Hong, Jungheum Park, Changhoon Lee, Sangjin Lee, “A research for partition restoration techniques”, Future Information Technology (FutureTech 2013), Lecture Notes in Electrical Engineering Volume 276, 2014, pp 315-322, 10.1007/978-3-642-40861-8_45, Print ISBN978-3-642-40860-1
  3. [scopus] Kyung-Soo Lim, Changhoon Lee, “Applying Forensic Approach to Live Investigation  using XeBag”, Computer Science and its Applications, Lecture Notes in Electrical Engineering, Volume 203, 2012, pp 389-397
  4. [scopus] Jeehee Lee, Hyunji Chung, Changhoon Lee, Sangjin Lee, “Methodology for Digital Forensic Investigation of iCloud”, Information Technology Convergence, Secure and Trust Computing, and Data Management, Lecture Notes in Electrical Engineering, Volume 180, 2012, pp 197-206 
  5. [scopus] Jong-Hyun Choi, Keun-gi Lee, Jungheum Park, Changhoon Lee, Sangjin Lee, “Analysis Framework to Detect Artifacts of Portable Web Browser”, Information Technology Convergence, Secure and Trust Computing, and Data Management, Lecture Notes in Electrical Engineering, Volume 180, 2012, pp 207-214, Springer Verlag. ISSN 1876-1100
  6. [scopus] Sooyoung Park, Hyunji Chung, Changhoon Lee, Sangjin Lee, “Methodology for Digital Investigation of Illegal Sharing Using BitTorrent”, Information Technology Convergence, Secure and Trust Computing, and Data Management, Lecture Notes in Electrical Engineering, Volume 180, 2012, pp 187-195.
  7. [scopus] Kitae Jeong, Changhoon Lee, “Differential Fault Analysis on Block Cipher LED-64”, Future Information Technology, Application, and Service, Lecture Notes in Electrical Engineering, Volume 164, 2012, pp 747-755. 
  8. Yuseop Lee, Jongsung Kim, Seokhie Hong, Changhoon Lee, “Improved Differential Fault Analysis on Block Cipher SEED-128 ” Publication Year: 2012 , Page(s): 675 - 680 , 2012 15th International Conference on Network-Based Information Systems (NBiS), September 26-September 28, 2012.
  9. Jinkeon Kang, Kitae Jeong, Sang-Soo Yeo, Changhoon Lee “Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments”, Publication Year: 2012 , Page(s): 726 - 731,  IEEE 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), 2012 , Fukuoka, Japan, March 26-29, 2012. IEEE 2012, ISBN 978-1-4673-0714-7
  10. [scopus] Namheun Son, Keun-gi Lee, SangJun Jeon, Sangjin Lee, Changhoon Lee, "The Method of Database Server Detection and Investigation in the Enterprise Environment", The 8th FTRA International Conference on Secure and Trust Computing, data management, and Applications (STA 2011), CCIS Proceedings Vol. 186, pp.164-171, June, 2011
  11. Sungsu Lim, Jungheum Park, Kyung-soo Lim, Changhoon Lee, Sangjin Lee, “Forensic Artifacts Left By Virtual Disk Encryption Tools”, The Fourth International Workshop on Forensics for Future Generation Communication environments (F2GC-10), IEEE, pp.1-6, Oct., 2010.
  12. Hangbae Chang, Hyukjun Kwon, Changhoon Lee, Jonggu Kang, “The weighted Industrial Security Management System for SMBs”, The 5th International Conference on Future Information Technology (FutureTech 2010), IEEE, pp.1-5, Oct., 2010.
  13. [scopus] Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park, Yeonjung Kang, "Update on SEED: SEED-192/256", Third International Conference and Workshops on Advances in Information Security and Assurance, (ISA 2009), Lecture Notes in Computer Science 5576, Springer, June 25-27, 2009.
  14. Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee, Hwa-Min Lee, “Security Analysis of CIKS-128 and CIKS-128H using Key Schedule Weaknesses”, CSA 2008, IEEE CS, to appear, 2008.
  15. Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim, “Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128″, ACISP 2007, Lecture Notes in Computer Science, Vol. 4586, 143-157, Springer-Verlag, 2007.07.02.
  16. Eunjin Lee, Deukjo Hong, Changhoon Lee, Jaechul Sung, Changhun Kang, “Weak Key Classes of MISTY for Related-Key Attacks”, The 2nd International Joint Workshop on Information Security and It’s Applications(IJWISA 2007), pp. 214-223, CIST, 2007.
  17. Jaechul Sung, Jongsung Kim, Changhoon Lee, Seokhie Hong, “Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds”, Western European Workshop on Research in Cryptology (WEWoRC 2005), Proceedings of WEWoRC 2005, Lecture Notes in Informatics (LNI 74), pp. 64-75, July 5-7, 2005.

Books & Proceedings

  1. Changhoon Lee, Jean-Marc Seigneur, James J. Park, Roland R. Wagner, “Secure and Trust Computing, Data Management, and Applications”, STA 2011 Workshops: IWCS 2011 and STAVE 2011, Loutraki, Greece, June 28-30, 2011. Proceedings, Communications in Computer and Information Science, Volume 187, 2011.
  2. James J. Park, Laurence T. Yang, Changhoon Lee, “Future Information Technology”, 6th International Conference, FutureTech 2011, Loutraki, Greece, June 28-30, 2011, Proceedings, Part II, Communications in Computer and Information Science, Volume 185, 2011.
  3. Roland R. Wagner, Changhoon Lee, Jean-marc Seigneur, James J. Park, Secure and Trust Computing, Data Management, and Applications: STA 2011 Workshops: IWCS 2011 and STAVE 2011, Loutraki, Greece, June 28-30, 2011. Proceedings.
  4. Changhoon Lee, Kitae Jeong, “Introuduction to Cryptographic Mathematics”, FTRA Publisher, (이창훈, 정기태, “암호수학개론”, FTRA Publisher, ISBN : 978-89-965097-6-9 2011년 10월 31일.)
  5. Changhoon Lee, Justin Zhan, Guilin Wang, Tai-hoon Kim, Jong Hyuk Park, "Advances in Information Security and Its Application", Third International Conference, ISA 2009, Seoul, Korea, June 25-27, 2009, Proceedings, Communications in Computer and Information Science, Volume 36, 2009.
  6. Jong Hyuk Park, Hsiao-Hwa Chen, Mohammed Atiquzzaman, Changhoon Lee and Sang-Soo Yeo, “Advances in Information Security and Assurance”, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, Lecture Notes in Computer Science, Volume 5576, 2009.
  7. Tai-hoon Kim, Wai-Chi Fang, Changhoon Lee, Kirk P. Arnett, “Advances in Software Engineering”, International Conference, ASEA 2008, and Its Special Sessions, Sanya, Hainan Island, China, December 13-15, 2008, Communications in Computer and Information Science, Volume 30, 2009.

Peer-reviewed Domestic Journal Papers (KCI)

  1. 이창훈, “대칭구조 SPN 블록 암호 알고리즘에 대한 차분 오류 공격”, 한국항행학회 논문지, Vol. 17, No. 5, pp. 568-573, 2013년 10월.
  2. 이창훈, “블록 암호 XSB에 대한 안전성 분석”, 한국정보처리학회 논문지 (컴퓨터 및 통신시스템), Vol. 2, No. 7, pp. 311-316, 2013년 07월.
  3. 이창훈, “클라우드 환경을 고려한 디지털 포렌식 프레임워크”, 한국항행학회 논문지, Vol. 17, No. 1, pp. 63-68, 2013년 02월.
  4. 정기태, 이창훈, “경량 블록 암호 LBlock에 대한 차분 오류 공격”, 한국항행학회 논문지, Vol. 16, No. 5, 2012년 10월.
  5. 임경수, 이창훈, 이상진, “디지털 증거 선별 조사의 효율성을 위한 Digital Evidence Container 설계 및 구현”, 2012년 7월 전자공학회 논문지 제 49 권 CI 편 제 4 호 31, Journal of The Institute of Electronics Engineers of Korea Vol. 49-CI, NO. 4, July 2012
  6. 강진건, 정기태, 이창훈, “블록 암호 KT-64에 대한 안전성 분석”, 한국정보처리학회논문지 C, Vol. 19-C, No. 1, 2012년 2월
  7. 이창훈, “개인정보보호법 기반 디지털 포렌식 수사 모델 연구”, 한국항행학회논문지, Vol. 15, No. 6, pp. 1212-1219, 2011년 12월.
  8. 이근기, 이창훈, 이상진, “아이패드 조사를 위한 디지털 포렌식 기법”, 한국항행학회논문지, 15 권, 5 호, pp 887~892, 2011.10
  9. 이창훈, “무선 센서 네트워크 환경에 적합한 블록 암호 MD-64에 대한 안전성 분석,” 한국항행학회 논문지, 2011
  10. 이창훈, 웹 공격 분석 및 공격 데이터베이스 생성을 위한 효과적인 표현 방법에 관한 연구”, 한국항행학회 논문지, Vol. 14, No. 5, pp. 725-736, 2010
  11. 이창훈, “블록 암호SCOS-3의 연관키 차분 공격에 대한 안전성 분석”, 한국항행학회 논문지, Vol. 13, No. 6, pp. 977-983, 2009.
  12. 김태현, 김종성, 홍석희, 성재철, 이창훈, “축소된 SMS4 블록 암호에 대한 향상된 안전성 분석”, 한국정보보호학회 논문지, Vol. 19, No. 3, pp. 3-10, 2009.
  13. 이창훈, 이유섭, 성재철, “유비쿼터스 환경에 적합한 블록암호 mCrypton에 대한 안전성 분석”, 멀티미디어학회 논문지, Vol. 12, No. 5, pp. 644-652, 2009.
  14. 김종성, 홍석희, 이창훈, “AES의 연관키 랙탱글 공격에 대한 안전성 분석”, 한국정보보호학회 논문지, Vol. 19, No. 2, pp. 39-49, 2009.
  15. 이창훈, 김태훈, 정기태, “게임 데이터 파일 암호화에 적용 가능한 SCO-3에 대한 안전성 분석”, 한국정보기술학회논문지, Vol. 7, No. 1, pp. 205-213, 2009.
  16. 이창훈, 이제상, 조성언, 김태훈, 김수균, “온라인 게임 상의 사용자 인증에 적용 가능한 셀룰러 오토마타 기반 해쉬함수에 대한 충돌쌍 공격”, 한국해양정보통신학회논문지, v.13, no.2, pp.299-308, 2009.
  17. 류한성, 이제상, 이창훈, 홍석희, “셀룰러 오토마타 기반 해쉬 함수에 대한 충돌쌍 공격”, 한국멀티미디어학회 논문지, 게재, 2008
  18. 정기태, 이창훈, 김종성, 홍석희, “블록암호 SCO-1에 대한 안전성 분석”, 한국정보보호학회 논문지, Vol. 18, No. 4, pp. 27-35, 2008.
  19. 정기태, 이창훈, 홍석희, 이상진, 은희천, “새로운 인증-암호화 모드 NAE에 대한 위조 공격”, 한국정보보호학회 논문지, 제17권, 제1호, pp. 103-107, 2007.
  20. 이태건, 김종성, 이창훈, 이상진, 성재철, “다중 운영모드에 대한 패딩오라클 공격”, 한국정보보호학회 논문지, 제16권, 제1호, pp. 79-85, 2006.
  21. 성재철, 김종성, 이창훈, “가변 라운드 수를 갖는 블록 암호에 대한 차분 연관 암호 공격”, 한국정보보호학회 논문지, 제15권, 제1호, pp. 77-86, 2005.
  22. 이창훈, 김종성, 이상진, “PMAC과 TMAC 변이 알고리즘에 대한 안전성 고찰”, 한국정보보호학회 논문지, 제14권, 제4호, pp. 91-96, 2004.
  23. 이제상, 이창훈, 이상진, “5 라운드 KASUMI에 대한 포화공격”, 한국정보보호학회 논문지, 제14권, 제3호, pp. 117-124, 2004.
  24. 홍석희, 김종성, 김구일, 이창훈, 성재철, 이상진, “30 라운드 SHACAL-2의 불능 차분 공격”, 한국정보보호학회 논문지, 제14권, 제3호, pp. 107-116, 2004.
  25. 이창훈, 홍득조, 이성재, 이상진, 임종인, 양형진, “블록 암호 CIKS-1에 대한 선택 평문 선형 공격”, 한국정보보호학회 논문지, 제13권, 제1호, pp. 47-58, 2003.

Domestic Conference Papers

  1. 이근기, 손남흔, 이상진, 이창훈, “네트워크 구성도 획득을 위한 데이터베이스 탐지 기법에 관한 연구”, 2011년도 한국정보기술융합학회 하계학술대회, 2011. 07.
  2. 강진건, 이창훈, “Collision 특성을 이용하는 공격에 대한 AES-192/256 의 안전성 연구”, 2011년도 한국정보기술융합학회 하계학술대회, 2011. 07.
  3. 이창훈, 임경수, 이상진, “Digital Evidence Bag 개발에 관한 연구”, 2011년도 한국정보기술융합학회 동계학술대회, 2011. 02.
  4. 임경수, 이창훈, 이상진, “현장 중심의 포렌식 조사 방법론 연구”, 2010년도 한국정보기술융합학회 하계학술대회, 2010. 07.
  5. 이제상, 이창훈, “SHA-3 동향 연구”, 한국정보기술융합학회 창립학술대회, 2010. 02.
  6. 이제상, 이창훈, 홍석희, “셀룰러 오토마타 기반 블록 암호에 대한 구별공격”, 한국멀티미디어학회 춘계학술대회, 제 11권, 제 1호, p.24, 2008. 05. 23-24.
  7. 이창훈, 정기태, 홍석희, “Switchable Controlled Operation을 사용하는 블록암호에 대한 구별공격”, 제 2회 정보보증워크샵, 과학공학연구지원센터, 제 1권, 제 2호, p.59-68, 2008. 08. 24-26.
  8. 이제상, 이창훈, 홍석희, “셀룰러 오토마타 기반 블록 암호에 대한 구별공격” 한국멀티미디어학회 춘계학술발표대회 논문집, 제 11권, 제 1호, p.24, 2008. 05. 23-24.
  9. 류한성, 이제상, 이창훈, 성재철, 홍석희, “가역 셀룰러 오토마타 기반 블록 암호에 대한 취약점 분석” 한국방송공학회 동계학술대회, pp. 59-61, 2008. 02. 22.
  10. 강진건, 최준근, 정기태, 이창훈, 홍석희, “Interlacing과 Decomposition을 적용한 블록 암호에 대한 분석”, 한국방송공학회 동계학술대회, pp. 85-87, 2008. 02. 22.
  11. 류한성, 이제상, 이창훈, 성재철, 홍석희, “셀룰러 오토마타 기반 블록 암호에 대한 부분키 복구 공격”, KoreaCrypt’07, 디지털포렌식학회, pp. 7-14, 2008. 01. 15.
  12. 이제상, 이창훈, 성재철, 홍석희, “동적 키를 사용하는 블록암호에 대한 구별 공격”, 2007년도 정보보호학술발표회 논문집, 한국정보보호학회 영남지부, pp. 203-206, 2007. 02. 23.
  13. 이은진, 홍득조, 이창훈, 홍석희, 성재철, 이상진, “MISTY1의 확장된 연관키 부메랑 공격을 위한 취약키 클래스”, 한국정보보호학회 동계학술회의 (CISC’06), 16권, 2호, pp. 55-59, 2006. 12.
  14. 이제상, 이창훈, 홍석희, 성재철, 이상진, “블록 암호 ABCD에 대한 포화 공격”, CISC’06, 한국정보보호학회 하계학술회의 (CISC’06), 16권, 1호, pp. 511-514, 2006. 6.
  15. 정기태, 이창훈, 성재철, 홍석희, 이상진, “새로운 인증-암호화 모드 NAE에 대한 위조 공격”, 한국정보보호학회 하계학술회의 (CISC’06), 16권, 1호, pp. 497-500, 2006. 6.
  16. 이제상, 이창훈, 홍석희, 성재철, 이상진, “블록 암호 NewDES에 대한 포화 공격”, 한국정보보호학회 하계학술회의 (CISC’05), 15권, 1호, pp. 451-454, 2005. 6.
  17. 김태웅, 이태건, 이창훈, 김종성, 성재철, 이상진, “블록 암호 SEED의 운영모드에 대한 패딩 오라클 공격”, 한국정보보호학회 하계학술회의 (CISC’04), 14권, 1호, pp. 346-351, 2004. 6.
  18. 이제상, 이창훈, 고영대, 이상진, “블록 암호 CIKS-1의 키스케줄에 대한 안전성 분석”, 한국정보보호학회 하계학술회의 (CISC’04), 14권, 1호, pp. 497-501, 2004. 6.
  19. 이창훈, 김종성, 이상진, “PMAC과 CBC-MAC 변이에 대한 대한 위조공격”, JCCI 2004, The 14th Joint Conference on Communications & Information, 2004. 4.
  20. 이제상, 이태건, 이창훈, 이원일, 홍석희, 이상진, “블록암호 KASUMI에 대한 포화 공격”, 한국정보보호학회 동계학술회의(CISC’03), 13권, 2호, pp.615-619, 2003. 12.
  21. 김종성, 이창훈, 성재철, 홍석희, 이상진, “5라운드 RC6 유사구조에 대한 DC 및 LC의 안전성 증명”, 정보보호학술발표논문집, 한국통신정보보호학회 충청지부, pp. 72-91, 2002. 7.

Domestic Books

  1. 이창훈, 정기태, “암호수학개론”, FTRA, ISBN : 978-89-965097-6-9 2011-10-31.

Domestic Patents

  1. 홍득조, 성재철, 홍석희, 임종인, 이상진, 이창훈, 장동훈, 이제상, 정기태, 김종성, 김현, 지성택, 구본석, “암호화 방법”, 10-2007-0009901, 2007-01-31.
  2. 이창훈, 이상진, 몰도비얀 니콜레이 안드리비치, 몰도비얀 알렉산드라 안드리비치, “데이터 의존 연산을 사용하는 암호화 방법”, 10-2008-0001717, 2008-01-07.