TCS / Research / Publications / Joo Cho
Helsinki University of Technology, 
     Laboratory for Theoretical Computer Science

Publications by Joo Cho

to appear

13Joo Yeon Cho. Linear cryptanalysis of reduced-round PRESENT. In Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Springer, to appear.
PDF (152 kB)
Info
12Joo Yeon Cho and Miia Hermelin. Improved linear cryptanalysis of SOSEMANUK. In The 12th International Conference on Information Security and Cryptology 2009, ICISC '09, Seoul, Korea, Lecture Notes in Computer Science, to appear.
PDF (217 kB)
Info

2009

11Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg. Multidimensional Extension of Matsui's Algorithm 2. In Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, volume 5665 of Lecture Notes in Computer Science, pages 209–227. Springer, 2009.
Info

2008

10Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg. Multidimensional linear cryptanalysis of reduced round Serpent. In Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, volume 5107 of Lecture Notes in Computer Science, pages 203–215. Springer, July 2008.
Info
9Joo Yeon Cho. An improved estimate of the correlation of distinguisher for Dragon. In SASC 2008 - The State of the Art of Stream Ciphers, Lausanne, Switzerland, February 13-14, 2008, pages 11–20, February 2008.
PDF (142 kB)
Info
8Joo Yeon Cho, Miia Hermelin, and Kaisa Nyberg. A new technique for multidimensional linear cryptanalysis with applications on reduced round Serpent. In The 11th International Conference on Information Security and Cryptology 2008, ICISC '08, Seoul, Korea, volume 5461 of Lecture Notes in Computer Science, pages 383 – 398, 2008.
PDF (307 kB)
Info

2007

7Joo Yeon Cho and Josef Pieprzyk. An improved distinguisher for Dragon. In Coding Theory and Cryptology, Proceedings of the First International Workshop Wuyi Mountain, Fujian, China, volume 4 of Coding Theory and Cryptology, pages 249–265. World Scientific, June 2007.
PDF (196 kB)
Info
6Joo Yeon Cho and Josef Pieprzyk. Multiple modular additions and crossword puzzle attack on NLSv2. In Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, volume 4779 of Lecture Notes in Computer Science, pages 230–248. Springer, 2007.
PDF (238 kB)
Info
5Joo Yeon Cho. New Results on Cryptanalysis of Stream Ciphers. Doctoral dissertation, Macquarie University, Division of Information and Communication Sciences, Department of Computing, Sydney, Australia, 2007.
Info

2006

4Joo Yeon Cho and Josef Pieprzyk. Crossword puzzle attack on NLS. In Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, volume 4356 of Lecture Notes in Computer Science, pages 249–265. Springer, August 2006.
PDF (181 kB)
Info
3Joo Yeon Cho and Josef Pieprzyk. Distinguishing attack on SOBER-128 with linear masking.. In Information Security and Privacy - ACISP 2006, volume 4058 of Lecture Notes in Computer Science, pages 29–39, Melbourne, Australia, June 2006.
PDF (195 kB)
Info
2Joo Yeon Cho and Josef Pieprzyk. Linear distinguishing attack on NLS. In SASC 2006 workshop - Stream Ciphers Revisited, Leuven, Belgium, February 2006.
Info

2004

1Joo Yeon Cho and Josef Pieprzyk. Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. In Fast Software Encryption - FSE 2004, volume 3017 of Lecture Notes in Computer Science, pages 49 – 64. Springer-Verlag, July 2004.
PDF (205 kB)
Info

[TCS main] [Contact Info] [Personnel] [Research] [Publications] [Software] [Studies] [News Archive] [Links]
Latest update: 19 January 2010.