A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase
Lee, Yongseong, Kang, Jinkeon, Chang, Donghoon, Hong, Seokhie
Published in IET information security (01.01.2023)
Published in IET information security (01.01.2023)
Get full text
Journal Article
HIGHT: A New Block Cipher Suitable for Low-Resource Device
Hong, Deukjo, Sung, Jaechul, Hong, Seokhie, Lim, Jongin, Lee, Sangjin, Koo, Bon-Seok, Lee, Changhoon, Chang, Donghoon, Lee, Jesang, Jeong, Kitae, Kim, Hyun, Kim, Jongsung, Chee, Seongtaek
Published in Cryptographic Hardware and Embedded Systems - CHES 2006 (2006)
Published in Cryptographic Hardware and Embedded Systems - CHES 2006 (2006)
Get full text
Book Chapter
Conference Proceeding
PPAE: Practical Parazoa Authenticated Encryption Family
Chang, Donghoon, R., Sumesh Manjunath, Sanadhya, Somitra Kumar
Published in Provable Security (2015)
Published in Provable Security (2015)
Get full text
Book Chapter
Experimental Study on Local Plastic Collapse in a Plate Weakened by Two Collinear Cracks
Mohabuth, Munawwar, Chang, Donghoon, Khanna, Aditya
Published in MATEC Web of Conferences (01.01.2015)
Published in MATEC Web of Conferences (01.01.2015)
Get full text
Journal Article
Conference Proceeding
BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level
Chang, Donghoon, Garg, Surabhi, Ghosh, Mohona, Hasan, Munawar
Published in Information sciences (06.02.2021)
Published in Information sciences (06.02.2021)
Get full text
Journal Article
RC4-Hash: A New Hash Function Based on RC4
Chang, Donghoon, Gupta, Kishan Chand, Nandi, Mridul
Published in Lecture notes in computer science (2006)
Published in Lecture notes in computer science (2006)
Get full text
Book Chapter
Conference Proceeding
Multi-lane Detection Using Instance Segmentation and Attentive Voting
Chang, Donghoon, Chirakkal, Vinjohn, Goswami, Shubham, Hasan, Munawar, Jung, Taekwon, Kang, Jinkeon, Kee, Seok-Cheol, Lee, Dongkyu, Singh, Ajit Pratap
Published in 2019 19th International Conference on Control, Automation and Systems (ICCAS) (01.10.2019)
Published in 2019 19th International Conference on Control, Automation and Systems (ICCAS) (01.10.2019)
Get full text
Conference Proceeding
Generation of Secure and Reliable Honeywords, Preventing False Detection
Akshima, Chang, Donghoon, Goel, Aarushi, Mishra, Sweta, Sanadhya, Somitra Kumar
Published in IEEE transactions on dependable and secure computing (01.09.2019)
Published in IEEE transactions on dependable and secure computing (01.09.2019)
Get full text
Journal Article
Cryptanalytic time–memory trade-off for password hashing schemes
Chang, Donghoon, Jati, Arpan, Mishra, Sweta, Sanadhya, Somitra Kumar
Published in International journal of information security (01.04.2019)
Published in International journal of information security (01.04.2019)
Get full text
Journal Article