BCG LAB

๐Ÿ”ธ ๊ตญ์ œ ๋…ผ๋ฌธ

[47] Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sรถnmez Turan. Resistance of ASCON Family against Conditional Cube Attacks in Nonce-Misuse Setting. IEEE Access, Vol.?, pp.?-? (2023) (SCIE)

[46] Dongjae Lee, Deukjo Hong, Jaechul Sung, Seonggyeom Kim, Seokhie Hong. Improved Ciphertext-Only Attack on GMR-1. IEEE Access, Vol.10, pp.1979-1989 (2022) (SCIE)

[45] Sunyeop Kim, Jeseong Kim, Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong. Integral Cryptanalysis of Lightweight Block Cipher PIPO. IEEE Access, Vol.10, pp.110195-110204 (2022) (SCIE)

[44] Seonggyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong. Accelerating the Best Trail Search on AES-Like Ciphers. IACR Transactions on Symmetric Cryptology. Vol.2022, No.2, pp.201-252 (2022) (๊ตญ์ œ๋…ผ๋ฌธ์ง€)

[43] Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong. A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application. IEEE Access, Vol.9, 150592-150607 (2021) (SCIE)

[42] Deukjo Hong. Known-Key Distinguishing and Partial-Collision Attacks on GFN-2 with SP F-Function. Security and Communication Networks, Vol. 2020, pp. 8864102:1-8864102:8 (SCIE)

[41] Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong. PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations. ICISC 2020, LNCS 12593, pp.99-122 (๊ตญ์ œํ•™์ˆ ๋Œ€ํšŒ)

[40] Seong Gyeom Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong. New Approach to Constructing Noise Source Based on Race Conditions. IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, Vol. E102-A, No. 9, pp. 1272-1284, 2019 (SCIE)

[39] Deukjo Hong, Dong-Chan Kim, Daesung Kwon. Improving MDC-4 to Be More Secure. IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, Vol. E102-A, No. 1, pp. 278-289, 2019 (SCIE)

[38] Ga-Yeon Ryu, Deukjo Hong. Forensic Analysis of Drones using BusyBox and Linux. ISITC 2017 (๊ตญ์ œํ•™์ˆ ๋Œ€ํšŒ)

[37] HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong. Known-Key Attack on SM4 Block Cipher. IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, Vol. E100-A, No. 12, pp. 2985-2990, 2017 (SCIE)

[36] Deukjo Hong, Bonwook Koo, Changho Seo. Differential Property of Present-like Structure. Discrete Applied Mathematics, Available online 23 September 2016. Vol. 241, pp. 13-24, May 2018 (SCI)

[35] Deukjo Hong, Dong-Chan Kim, Daesung Kwon, Jongsung Kim. Improved Preimage Attacks on Hash Modes of 8-Round AES-256. Multimedia Tools and Applications, Volume 75, No. 22, pp. 14525-14539, November 2016 (SCIE)

[34] Dong-Chan Kim, Deukjo Hong, Jung-Keun Lee, Woo-Hwan Kim, Daesung Kwon. LSH: A New Secure Fast Hash Function Family. ICISC 2014, LNCS 8949, pp. 286-313, 2014 (๊ตญ์ œํ•™์ˆ ๋Œ€ํšŒ)

[33] Deukjo Hong, Daesung Kwon. Cryptanalysis of Double-Block-Length Hash Modes MDC-4 and MJH. IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, Vol. E97-A, No. 8, 1747-1753, 2014 (SCIE)

[32] Deukjo Hong, Jung-Keun Lee, Dong-Chan Kim, Daesung Kwon, Kwon Ho Ryu, Dong-Geon Lee. LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors. WISA 2013, LNCS 8267, pp. 3-27, 2013 (๊ตญ์ œํ•™์ˆ ๋Œ€ํšŒ)

[31] Dukjae Moon, Deukjo Hong, Bonwook Koo, Seokhie Hong. Security Evaluation of Double-Block-Length Hash Modes with Preimage Attacks on PGV Schemes. Journal of Internet Technology, Vol. 14 No. 3, pp. 497- 508, May 2013 (SCIE)

[30] Deukjo Hong, Dong-Chan Kim, Woo-Hwan Kim, Jongsung Kim. Higher Order eTCR Hash Functions. Computers and Mathematics with Applications, Vol. 65, Issue 9, May 2013, pp. 1396-1402 (SCI)

[29] HyungChul Kang, Deukjo Hong, Dukjae Moon, Daesung Kwon, Jaechul Sung, Seokhie Hong. Known-Key Attacks on Generalized Feistel Schemes with SP Round Function. IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, Vol. E95-A, No. 9, pp. 1550-1560, 2012 (SCIE)

[28] Yu Sasaki, Sareh Emami, Deukjo Hong, Ashish Kumar. Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia. ACISP 2012, LNCS 7372, pp. 87-100 (๊ตญ์ œํ•™์ˆ ๋Œ€ํšŒ)

[27] Dukjae Moon, Deukjo Hong, Daesung Kwon, Seokhie Hong. Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function. IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, Vol. E95-A, No. 8, pp. 1379-1389, 2012 (SCIE)

[26] Jooyoung Lee, Deukjo Hong. Collision Resistance of the JH Hash Function. IEEE Transactions on Information Theory, Vol. 58, No. 3, pp. 1992-1995, 2012 (SCI)

[25] Deukjo Hong, Bonwook Koo, Dong-Chan Kim. Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent, IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, Vol. E95-A, No. 1, pp. 372-380, Jan. 2012 (SCIE)

[24] Deukjo Hong, Bonwook Koo, Daesung Kwon. Biclique Attack on the Full HIGHT. ICISC 2011, LNCS 7259, pp. 365-374 (๊ตญ์ œํ•™์ˆ ๋Œ€ํšŒ)

[23] Bonwook Koo, Deukjo Hong, Daesung Kwon. Related-key Attack on the Full HIGHT. ICISC 2010, LNCS 6829, pp. 49-67 (๊ตญ์ œํ•™์ˆ ๋Œ€ํšŒ)

[22] Deukjo Hong, Bonwook Koo, Yu Sasaki. Improved Preimage Attack for 68-Step HAS-160. ICISC 2009, LNCS 5984, pp. 332-348 (๊ตญ์ œํ•™์ˆ ๋Œ€ํšŒ)

[21] Deukjo Hong, Bonwook Koo, Woo-Hwan Kim, Daesung Kwon. Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash. ICISC 2009, LNCS 5984, pp. 315-331 (๊ตญ์ œํ•™์ˆ ๋Œ€ํšŒ)

[20] Eunjin Lee, Joungsung Kim, Deukjo Hong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim. Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang attacks. IEICE Transactions on Fundamentals of Electronics, Communications, and Computer Sciences, Vol. E91-A, No. 2, pp. 642-649, February 2008 (SCIE)

[19] Jaechul Sung, Deukjo Hong, Seokhie Hong. Cryptanalysis of an Involutional Block Cipher using Cellular Automata. Information Processing Letters, Vol. 104, pp. 183โ€“185, 2007 (SCIE)

[18] Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jaesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee. HIGHT: A New Block Cipher Suitable for Low-Resource Device. CHES 2006, LNCS 4249, pp. 46-59 (SCIE)

[17] Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi. Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. Journal of Cryptology, Volume 19, Number 4, pp. 441-462, October, 2006 (SCI)

[16] Eunjin Lee, Deukjo Hong, Donghoon Chang, Seokhie Hong, Jongin Lim. Weak Key Class of XTEA for a Related-Key Rectangle Attack. VietCrypt 2006, LNCS 4341, pp. 286-297 (SCIE)

[15] Kitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jaeheon Kim, Deukjo Hong. Improved Fast Correlation Attack on the Shrinking and Self-Shrinking generators. VietCrypt 2006, LNCS 4341, pp. 260-270 (SCIE)

[14] Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jesang Lee, Dukjae Moon, Sungtaek Chee. A New Dedicated 256-bit Hash Function: Fork-256. FSE 2006, LNCS 4047, pp. 195-209 (SCIE)

[13] Jesang Lee, Donghoon Chang, Hyun Kim, Eunjin Lee, Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee. A New 256-bit Hash Function DHA-256โ€“Enhancing the Security of SHA-256. Cryptographic Hash Workshop by NIST (๊ตญ์ œํ•™์ˆ ๋Œ€ํšŒ)ย ย ย ย ย ย ย 

[12] Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon. A New Dedicated 256-bit Hash Function: Fork-256. Cryptographic Hash Workshop by NIST (๊ตญ์ œํ•™์ˆ ๋Œ€ํšŒ)

[11] Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee. How to Construct Universal One-way Hash Functions of Order r. Indocrypt 2005, LNCS 3797, pp. 63-76 (SCIE)

[10] Jun Choi, Deukjo Hong, Seokhie Hong, Sangjin Lee. Linear Attack Using Multiple Linear Approximations. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E88-A, No.1, Jan. 2005, pp. 2-8 (SCIE)

[9] Deukjo Hong, Bart Preneel, Sangjin Lee. Higher Order Universal One-Way Hash Functions. ASIACRYPT 2004, LNCS 3329, pp.201-213 (Held in Jeju Island, Korea, Dec.5-9, 2004. Published at Dec.,2004) (SCIE)

[8] Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee. Differential Cryptanalysis of TEA and XTEA. ICISC 2003, LNCS 2971, pp. 402-417 (Held in Seoul, Korea, Nov. 27-28, 2003. Published at Nov., 2003.) (SCIE)ย 

[7] Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, Jongin Lim. Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property. MMM-ACNS 2003, LNCS 2776, pp. 298-307 (held in St. Petersburg, Russia, Sep. 21-23, 2003. published at Sep., 2003) (SCIE)

[6] Jaechul Sung, Deukjo Hong, Sangjin Lee. Key Recovery Attacks on RMAC, TMAC, and IACBC. ACISP 2003, LNCS 2727, pp.265-273 (SCIE)

[5] Young-Ho Park, Deukjo Hong, Hichun Eun. On the Linear Complexity of Some Generalized Cyclotomic Sequences. International Journal of Algebra and Computation, Vol.14, No.4, August2004, pp.431-438 (SCI)

[4] Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyung-Jin Yang, Jongin Lim. A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. ICICS 2002, LNCS 2513, pp. 456-468 (held in Singapore, Dec. 9-12, 2002. published at Dec., 2002.) (SCIE)

[3] Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim. Impossible Differential Cryptanalysis of Zodiac. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E85-A, No.1, Jan. 2002, pp.38-43 (SCIE)

[2] Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi. Known-IV Attacks on Triple Modes of Operation of Block Ciphers. ASIACRYPT 2001, LNCS 2248, pp. 208-221 (in Gold Coast, Australia, Dec. 9-13, 2001. published Dec., 2001.) (SCIE)

[1] Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim. Impossible Differential Cryptanalysis of Zodiac. FSE 2001, LNCS 2355, pp.300-311 (in Yokohama, Japan, Apr. 2-4, 2001. published Mar.,2002.) (SCIE)

๐Ÿ”ธ ๊ตญ๋‚ด ๋…ผ๋ฌธ

[19] ๊น€์ œ์„ฑ, ๊น€์„ฑ๊ฒธ, ๊น€์„ ์—ฝ, ํ™๋“์กฐ, ์„ฑ์žฌ์ฒ , ํ™์„ํฌ. ๊ฒฝ๋Ÿ‰ ๋ธ”๋ก ์•”ํ˜ธ PIPO์˜ MILP-Aided ๋””๋น„์ „ ํ”„๋กœํผํ‹ฐ ๋ถ„์„ ๋ฐ ์ธํ…Œ๊ทธ๋ž„ ๊ณต๊ฒฉ. ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, v.31, no.5, pp.875-888, 2021๋…„ 10์›”

[18] ํ™๋“์กฐ. SP F-ํ•จ์ˆ˜๋ฅผ ๊ฐ–๋Š” 4-๋ธŒ๋žœ์น˜ GFN-2 ๊ตฌ์กฐ์— ๋Œ€ํ•œ ๊ธฐ์ง€ํ‚ค ๊ณต๊ฒฉ. ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, v.30, no.5, 795-803, 2020๋…„ 10์›”

[17] ๊น€๋™ํ›ˆ, ๊น€์„ฑ๊ฒธ, ํ™๋“์กฐ, ์„ฑ์žฌ์ฒ , ํ™์„ํฌ. ๋”ฅ๋Ÿฌ๋‹ ๊ธฐ๋ฐ˜ S-Box ์„ค๊ณ„์ •๋ณด ๋ถ„์„ ๋ฐฉ๋ฒ• ์—ฐ๊ตฌ. ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, v.30, no.3, pp.337-347, 2020๋…„ 6์›”

[16] ์ •๊ฑด์ƒ, ๊น€์„ฑ๊ฒธ, ํ™๋“์กฐ, ์„ฑ์žฌ์ฒ , ํ™์„ํฌ. ๋น„ํŠธ ์ˆœ์—ด ๊ธฐ๋ฐ˜ ๋ธ”๋ก์•”ํ˜ธ์˜ ๋น„์„ ํ˜• ๋ถˆ๋ณ€ ๊ณต๊ฒฉ ์ €ํ•ญ์„ฑ ์—ฐ๊ตฌ. ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, v.30, no.3, pp.325-336, 2020๋…„ 6์›”

[15] ์ด์ƒํ˜‘, ๊น€์„ฑ๊ฒธ, ํ™๋“์กฐ, ์„ฑ์žฌ์ฒ , ํ™์„ํฌ. BOGI ์ „๋žต์œผ๋กœ ์„ค๊ณ„๋œ ๋ธ”๋ก ์•”ํ˜ธ์˜ ์ฐจ๋ถ„ ๊ณต๊ฒฉ์— ๋Œ€ํ•œ ์•ˆ์ „์„ฑ ๋ถ„์„. ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, Vol. 29, No. 6, 2019๋…„ 12์›”, pp. 1259-1270

[14] ์กฐ์€์ง€, ๊น€์„ฑ๊ฒธ, ํ™๋“์กฐ, ์„ฑ์žฌ์ฒ , ํ™์„ํฌ. GPGPU ๊ธฐ์ˆ ์„ ํ™œ์šฉํ•œ ์ฐจ๋ถ„ ํ™•๋ฅ ์˜ ํ†ต๊ณ„์  ๋ถ„์„. ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, 29๊ถŒ, 3ํ˜ธ, 2019๋…„ 6์›”, pp. 477-489

[13] ๊น€ํ˜„์šฐ, ๊น€์„ฑ๊ฒธ, ํ™๋“์กฐ, ์„ฑ์žฌ์ฒ , ํ™์„ํฌ. DLCT๋ฅผ ํ™œ์šฉํ•œ ํ–ฅ์ƒ๋œ ์ฐจ๋ถ„์„ ํ˜• ๋ถ„์„. ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, 28๊ถŒ, 6ํ˜ธ, pp. 1379-1392, 2018๋…„ 12์›”

[12] ๊น€ํƒœ์›…, ํ™๋“์กฐ. Software Implementation of Lightweight Block Cipher CHAM for Fast Encryption. ํ•œ๊ตญ์ปดํ“จํ„ฐ์ •๋ณดํ•™ํšŒ๋…ผ๋ฌธ์ง€, 23๊ถŒ, 10ํ˜ธ, 2018๋…„ 10์›”, pp. 111-117

[11] ๋ฐ•์—ฐ์ง€, ์ดํ˜ธ์ฐฝ, ํ™๋“์กฐ, ํ™์„ํฌ. ํšจ์œจ์ ์ธ MILP-Espresso ๊ธฐ๋ฐ˜ ์ฐจ๋ถ„ ํŠน์„ฑ ์ž๋™ ํƒ์ƒ‰ ๋ฐฉ๋ฒ•. ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, 28๊ถŒ, 3ํ˜ธ, 2018๋…„ 6์›”, pp. 533-543

[10] ๋ฅ˜๊ฐ€์—ฐ, ํ™๋“์กฐ. Key Recovery Attacks on HMAC with Reduced-Round AES (์ถ•์†Œ๋œ ๋ผ์šด๋“œ์˜ AES ๊ธฐ๋ฐ˜ HMAC์— ๋Œ€ํ•œ ํ‚ค ๋ณต๊ตฌ ๊ณต๊ฒฉ). ํ•œ๊ตญ์ปดํ“จํ„ฐ์ •๋ณดํ•™ํšŒ๋…ผ๋ฌธ์ง€, 23๊ถŒ, 1ํ˜ธ, 2018๋…„ 1์›”, pp. 57-66

[9] ์ดํ˜ธ์ฐฝ, ๊น€์„œ์ง„, ๊ฐ•ํ˜•์ฒ , ํ™๋“์กฐ, ์„ฑ์žฌ์ฒ , ํ™์„ํฌ. SAT ์†”๋ฒ„๋ฅผ ์ด์šฉํ•œ ARX ๊ตฌ์กฐ ์•”ํ˜ธ์˜ ๋””ํผ๋ Œ์…œ ํ™•๋ฅ  ๊ทผ์‚ฌ๊ฐ’ ๊ณ„์‚ฐ. ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, 28๊ถŒ, 1ํ˜ธ 2018๋…„ 2์›”, pp. 15-24

[8] ๊น€์„ฑ๊ฒธ, ์ด์Šน์ค€, ๊ฐ•ํ˜•์ฒ , ํ™๋“์กฐ, ์„ฑ์žฌ์ฒ , ํ™์„ํฌ. ๋ฉ€ํ‹ฐ์ฝ”์–ด ํ™˜๊ฒฝ์—์„œ ํšจ์œจ์ ์ธ ์—”ํŠธ๋กœํ”ผ ์›์˜ ์„ค๊ณ„ ๊ธฐ๋ฒ•. ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, 28๊ถŒ, 1ํ˜ธ 2018๋…„ 2์›”, pp. 61-71

[7] ์ด์šฉ์„ฑ, ๊ฐ•ํ˜•์ฒ , ํ™๋“์กฐ, ์„ฑ์žฌ์ฒ , ํ™์„ํฌ. ๋น„๋ฐ€ S-box๋ฅผ ์‚ฌ์šฉํ•œ GFN์— ๋Œ€ํ•œ ์•ˆ์ „์„ฑ ๋ถ„์„. ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, 27๊ถŒ, 3ํ˜ธ 2017๋…„ 6์›”, pp. 467-476

[6] ์ดํ˜ธ์ฐฝ, ๊ฐ•ํ˜•์ฒ , ํ™๋“์กฐ, ์„ฑ์žฌ์ฒ , ํ™์„ํฌ. MILP๋ฅผ ์ด์šฉํ•œ ARX ๊ธฐ๋ฐ˜ ๋ธ”๋ก ์•”ํ˜ธ์˜ ๋ถˆ๋Šฅ ์ฐจ๋ถ„ ํŠน์„ฑ ํƒ์ƒ‰. ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, 27๊ถŒ, 3ํ˜ธ 2017๋…„ 6์›”, pp. 427-437

[5] ๊น€์„œ์ง„, ๊ฐ•ํ˜•์ฒ , ํ™๋“์กฐ, ์„ฑ์žฌ์ฒ , ํ™์„ํฌ. ARX ๊ตฌ์กฐ๋ฅผ ๊ฐ€์ง€๋Š” ๋ธ”๋ก ์•”ํ˜ธ์— ๋Œ€ํ•œ ํšจ์œจ์ ์ธ ์ฐจ๋ถ„ ๊ฒฝ๋กœ ์ž๋™ ํƒ์ƒ‰ ์•Œ๊ณ ๋ฆฌ์ฆ˜. ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, 26๊ถŒ, 6ํ˜ธ 2016๋…„ 12์›”, pp. 1421-1430

[4] ํ™๋“์กฐ, ๊ตฌ๋ณธ์šฑ, ๊น€์šฐํ™˜, ๊ถŒ๋Œ€์„ฑ. ARIRANG, HAS-160, PKC98-Hash์˜ ์ถ•์†Œ๋œ ๋‹จ๊ณ„๋“ค์— ๋Œ€ํ•œ ์—ญ์ƒ๊ณต๊ฒฉ. ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, 20๊ถŒ, 2ํ˜ธ, 2010๋…„ 4์›”, pp. 3-14

[3] ํ™๋“์กฐ, ๊ตฌ๋ณธ์šฑ, ๊ถŒ๋Œ€์„ฑ. ํ•ด์‰ฌํ•จ์ˆ˜ ARIRANG์˜ ์ถ•์†Œ๋œ ๋‹จ๊ณ„์— ๋Œ€ํ•œ ์—ญ์ƒ๊ณต๊ฒฉ. ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, 19๊ถŒ, 5ํ˜ธ, 2009๋…„ 10์›”, pp. 143-149

[2] ํ™๋“์กฐ, ์„ฑ์žฌ์ฒ , ํ™์„ํฌ, ์ด์ƒ์ง„. ๋ธ”๋ก ์•”ํ˜ธ์— ๋Œ€ํ•œ ์ƒˆ๋กœ์šด ๋‹ค์ค‘์„ ํ˜•๊ณต๊ฒฉ๋ฒ•. ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, 17๊ถŒ, 6ํ˜ธ, 2007๋…„ 12์›”, pp. 11-18

[1] ์ตœ์ค€, ํ™๋“์กฐ, ์ด์ƒ์ง„, ํ™์„ํฌ, ์ž„์ข…์ธ. ๋ธ”๋ก ์•”ํ˜ธ์— ๋Œ€ํ•œ ํšจ์œจ์ ์ธ ์„ ํ˜• ๊ณต๊ฒฉ ๋ฐฉ๋ฒ•. ์ •๋ณด๋ณดํ˜ธํ•™ํšŒ๋…ผ๋ฌธ์ง€, 12๊ถŒ, 6ํ˜ธ, 2002๋…„ 12์›”, pp. 59-69