to appear |
13 | Joo Yeon Cho. Linear cryptanalysis of reduced-round PRESENT. In Topics in Cryptology - CT-RSA 2010, The Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Springer, to appear. |
|
12 | Joo Yeon Cho and Miia Hermelin. Improved linear cryptanalysis of SOSEMANUK. In The 12th International Conference on Information Security and Cryptology 2009, ICISC '09, Seoul, Korea, Lecture Notes in Computer Science, to appear. |
|
2009 |
11 | Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg. Multidimensional Extension of Matsui's Algorithm 2. In Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, volume 5665 of Lecture Notes in Computer Science, pages 209–227. Springer, 2009. |
|
2008 |
10 | Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg. Multidimensional linear cryptanalysis of reduced round Serpent. In Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, volume 5107 of Lecture Notes in Computer Science, pages 203–215. Springer, July 2008. |
|
9 | Joo Yeon Cho. An improved estimate of the correlation of distinguisher for Dragon. In SASC 2008 - The State of the Art of Stream Ciphers, Lausanne, Switzerland, February 13-14, 2008, pages 11–20, February 2008. |
|
8 | Joo Yeon Cho, Miia Hermelin, and Kaisa Nyberg. A new technique for multidimensional linear cryptanalysis with applications on reduced round Serpent. In The 11th International Conference on Information Security and Cryptology 2008, ICISC '08, Seoul, Korea, volume 5461 of Lecture Notes in Computer Science, pages 383 – 398, 2008. |
|
2007 |
7 | Joo Yeon Cho and Josef Pieprzyk. An improved distinguisher for Dragon. In Coding Theory and Cryptology, Proceedings of the First International Workshop Wuyi Mountain, Fujian, China, volume 4 of Coding Theory and Cryptology, pages 249–265. World Scientific, June 2007. |
|
6 | Joo Yeon Cho and Josef Pieprzyk. Multiple modular additions and crossword puzzle attack on NLSv2. In Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, volume 4779 of Lecture Notes in Computer Science, pages 230–248. Springer, 2007. |
|
5 | Joo Yeon Cho. New Results on Cryptanalysis of Stream Ciphers. Doctoral dissertation, Macquarie University, Division of Information and Communication Sciences, Department of Computing, Sydney, Australia, 2007. |
|
2006 |
4 | Joo Yeon Cho and Josef Pieprzyk. Crossword puzzle attack on NLS. In Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, volume 4356 of Lecture Notes in Computer Science, pages 249–265. Springer, August 2006. |
|
3 | Joo Yeon Cho and Josef Pieprzyk. Distinguishing attack on SOBER-128 with linear masking.. In Information Security and Privacy - ACISP 2006, volume 4058 of Lecture Notes in Computer Science, pages 29–39, Melbourne, Australia, June 2006. |
|
2 | Joo Yeon Cho and Josef Pieprzyk. Linear distinguishing attack on NLS. In SASC 2006 workshop - Stream Ciphers Revisited, Leuven, Belgium, February 2006. |
|
2004 |
1 | Joo Yeon Cho and Josef Pieprzyk. Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. In Fast Software Encryption - FSE 2004, volume 3017 of Lecture Notes in Computer Science, pages 49 – 64. Springer-Verlag, July 2004. |
|