Ji, Zhengfeng; Qiao, Youming; Song, Fang; Yun, Aaram General linear group action on tensors: a candidate for post-quantum cryptography. (English) Zbl 1447.94047 Hofheinz, Dennis (ed.) et al., Theory of cryptography. 17th international conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11891, 251-281 (2019). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{Z. Ji} et al., Lect. Notes Comput. Sci. 11891, 251--281 (2019; Zbl 1447.94047) Full Text: DOI arXiv
Song, Fang; Yun, Aaram Quantum security of NMAC and related constructions. PRF domain extension against quantum attacks. (English) Zbl 1410.94107 Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10402, 283-309 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Song} and \textit{A. Yun}, Lect. Notes Comput. Sci. 10402, 283--309 (2017; Zbl 1410.94107) Full Text: DOI
Kwon, Soonhak (ed.); Yun, Aaram (ed.) Information security and cryptology – ICISC 2015. 18th international conference, Seoul, South Korea, November 25–27, 2015. Revised selected papers. (English) Zbl 1333.68013 Lecture Notes in Computer Science 9558. Cham: Springer (ISBN 978-3-319-30839-5/pbk; 978-3-319-30840-1/ebook). xiii, 374 p. (2016). MSC: 68-06 94-06 68P25 94A60 00B25 PDFBibTeX XMLCite \textit{S. Kwon} (ed.) and \textit{A. Yun} (ed.), Information security and cryptology -- ICISC 2015. 18th international conference, Seoul, South Korea, November 25--27, 2015. Revised selected papers. Cham: Springer (2016; Zbl 1333.68013) Full Text: DOI
Cheon, Jung Hee; Kim, Jinsu; Lee, Moon Sung; Yun, Aaram CRT-based fully homomorphic encryption over the integers. (English) Zbl 1387.94076 Inf. Sci. 310, 149-162 (2015). MSC: 94A60 94A15 14G50 PDFBibTeX XMLCite \textit{J. H. Cheon} et al., Inf. Sci. 310, 149--162 (2015; Zbl 1387.94076) Full Text: DOI
Yun, Aaram Generic hardness of the multiple discrete logarithm problem. (English) Zbl 1371.94661 Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-46802-9/pbk; 978-3-662-46803-6/ebook). Lecture Notes in Computer Science 9057, 817-836 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Yun}, Lect. Notes Comput. Sci. 9057, 817--836 (2015; Zbl 1371.94661) Full Text: DOI
Joo, Chihong; Yun, Aaram Homomorphic authenticated encryption secure against chosen-ciphertext attack. (English) Zbl 1317.94114 Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 173-192 (2014). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{C. Joo} and \textit{A. Yun}, Lect. Notes Comput. Sci. 8874, 173--192 (2014; Zbl 1317.94114) Full Text: DOI
Cheon, Jung Hee; Coron, Jean-Sébastien; Kim, Jinsu; Lee, Moon Sung; Lepoint, Tancrède; Tibouchi, Mehdi; Yun, Aaram Batch fully homomorphic encryption over the integers. (English) Zbl 1306.94040 Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 315-335 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{J. H. Cheon} et al., Lect. Notes Comput. Sci. 7881, 315--335 (2013; Zbl 1306.94040) Full Text: DOI
Hirose, Shoichi; Park, Je Hong; Yun, Aaram A simple variant of the Merkle-Damgård scheme with a permutation. (English) Zbl 1277.94025 J. Cryptology 25, No. 2, 271-309 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Hirose} et al., J. Cryptology 25, No. 2, 271--309 (2012; Zbl 1277.94025) Full Text: DOI
Yun, Aaram; Park, Je Hong; Lee, Jooyoung On Lai-Massey and quasi-Feistel ciphers. (English) Zbl 1213.94145 Des. Codes Cryptography 58, No. 1, 45-72 (2011). Reviewer: Jaak Henno (Tallinn) MSC: 94A60 PDFBibTeX XMLCite \textit{A. Yun} et al., Des. Codes Cryptography 58, No. 1, 45--72 (2011; Zbl 1213.94145) Full Text: DOI
Yun, Aaram; Cheon, Jung Hee; Kim, Yongdae On homomorphic signatures for network coding. (English) Zbl 1366.94571 IEEE Trans. Comput. 59, No. 9, 1295-1296 (2010). MSC: 94A62 PDFBibTeX XMLCite \textit{A. Yun} et al., IEEE Trans. Comput. 59, No. 9, 1295--1296 (2010; Zbl 1366.94571) Full Text: DOI
Saraswat, Vishal; Yun, Aaram Anonymous signatures revisited. (English) Zbl 1267.94129 Pieprzyk, Josef (ed.) et al., Provable security. Third international conference, ProvSec 2009, Guangzhou, China, November 11–13, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04641-4/pbk). Lecture Notes in Computer Science 5848, 140-153 (2009). MSC: 94A62 PDFBibTeX XMLCite \textit{V. Saraswat} and \textit{A. Yun}, Lect. Notes Comput. Sci. 5848, 140--153 (2009; Zbl 1267.94129) Full Text: DOI
Hirose, Shoichi; Park, Je Hong; Yun, Aaram A simple variant of the Merkle-Damgård scheme with a permutation. (English) Zbl 1153.94389 Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 113-129 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Hirose} et al., Lect. Notes Comput. Sci. 4833, 113--129 (2007; Zbl 1153.94389) Full Text: DOI
Yu, Hongbo; Wang, Xiaoyun; Yun, Aaram; Park, Sangwoo Cryptanalysis of the full HAVAL with 4 and 5 passes. (English) Zbl 1234.94071 Robshaw, Matthew (ed.), Fast software encryption. 13th international workshop, FSE 2006, Graz, Austria, March 15–17, 2006. Revised selected papers. Berlin: Springer (ISBN 3-540-36597-4/pbk). Lecture Notes in Computer Science 4047, 89-110 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Yu} et al., Lect. Notes Comput. Sci. 4047, 89--110 (2006; Zbl 1234.94071) Full Text: DOI
Cho, Hong-Su; Park, Sangwoo; Sung, Soo Hak; Yun, Aaram Collision search attack for 53-step HAS-160. (English) Zbl 1272.94023 Rhee, Min Surp (ed.) et al., Information security and cryptology – ICISC 2006. 9th international conference, Busan, Korea, November 30–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49112-5/pbk). Lecture Notes in Computer Science 4296, 286-295 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{H.-S. Cho} et al., Lect. Notes Comput. Sci. 4296, 286--295 (2006; Zbl 1272.94023) Full Text: DOI
Yun, Aaram; Sung, Soo Hak; Park, Sangwoo; Chang, Donghoon; Hong, Seokhie; Cho, Hong-Su Finding collision on 45-step HAS-160. (English) Zbl 1185.94071 Won, Dongho (ed.) et al., Information security and cryptology – ICISC 2005. 8th international conference, Seoul, Korea, December 1–2, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-33354-1/pbk). Lecture Notes in Computer Science 3935, 146-155 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Yun} et al., Lect. Notes Comput. Sci. 3935, 146--155 (2006; Zbl 1185.94071) Full Text: DOI
Yun, Aaram; Kim, Jaeheon; Lee, Dong Hoon Cryptanalysis of a divisor class group based public-key cryptosystem. (English) Zbl 1125.94334 Buell, Duncan (ed.), Algorithmic number theory. 6th international symposium, ANTS-VI, Burlington, VT, USA, June 13–18, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22156-5/pbk). Lecture Notes in Computer Science 3076, 442-450 (2004). MSC: 94A60 13C20 PDFBibTeX XMLCite \textit{A. Yun} et al., Lect. Notes Comput. Sci. 3076, 442--450 (2004; Zbl 1125.94334) Full Text: DOI