My Papers

Please refer the following web site for recent work.
http://www.tcs.hut.fi/Publications/author-jcho.shtml
Algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering
Joo Yeon Cho and Josef Pieprzyk, FSE 2004, LNCS Vol. 3017. pp. 49-64 , Feb/2004 [pdf]
An algebraic equation over a round function of CAST-128
Joo Yeon Cho. 28, Aug, 2004.
Linear Distinguishing Attack on NLS was presented at SASC 2006 workshop .
Joo Yeon Cho and Josef Pieprzyk, 3, Feb, 2006. Leuven, Belgium
Distinguishing Attack on SOBER-128 with linear masking
Joo Yeon Cho and Josef Pieprzyk, ACISP 2006 . 3-5, July, 2006. Melbourne, Australia [pdf]
Crossword Puzzle Attack on NLS was presented at SAC 2006,
Joo Yeon Cho and Josef Pieprzyk, 17-18, August, 2006, Montreal, Canada [pdf]
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2
Joo Yeon Cho and Josef Pieprzyk, presented at ISC 2007, 9-12, October, 2007, Valparaiso, Chile [pdf]
An Improved Distinguisher for Dragon
Joo Yeon Cho and Josef Pieprzyk, International Workshop on Coding and Cryptology, Fujian, China [pdf]
An Improved Estimate of the Correlation of Distinguisher for Dragon
Joo Yeon Cho, SASC2008, Lausanne, Switzerland [pdf]
Multidimensional Linear Cryptanalysis of Reduced Round Serpent
Miia Hermelin, Joo Yeon Cho and Kaisa Nyberg
ACISP2008, Wollongong, Australia [pdf]
A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent
Joo Yeon Cho, Miia Hermelin and Kaisa Nyberg
ICISC 2008, Seoul, Korea
Multidimensional Extension of Matsui's Algorithm 2
Miia Hermelin, Joo Yeon Cho and Kaisa Nyberg
Fast Software Encryption 2009, Leuven, Belgium