Edit Profile Hong, Seokhie Compute Distance To: Compute Author ID: hong.seokhie Published as: Hong, S.; Hong, Seok Hie; Hong, Seokhie Documents Indexed: 65 Publications since 1977, including 3 Books all top 5 Co-Authors 0 single-authored 30 Lee, Sangjin 27 Sung, Jaechul 18 Kim, Jongsung 13 Lim, Jongin 12 Lee, Changhoon 9 Hong, Deukjo 8 Chang, Donghoon 8 Jeong, Kitae 7 Lee, Wonil 4 Ko, Youngdai 4 Moon, Dukjae 4 Preneel, Bart 3 Kim, Guil 3 Lee, Yuseop 3 Park, Youngho 3 Sung, Soohak 3 Yi, Okyeon 2 Chang, Nam Su 2 Cheon, Donghyeon 2 Kim, Heeseok 2 Kim, Jaeheon 2 Kim, Suhri 2 Lee, Eunjin 2 Lee, Jesang 2 Yoon, Kisoon 1 Biham, Eli 1 Biryukov, Alex 1 Chee, Seongtaek 1 Chee, Sungtaek 1 Cho, Hong-Su 1 Cho, Inho 1 Cho, Sungmin 1 Cho, Young In 1 Dunkelman, Orr 1 Han, Dong-Guk 1 Hong, Dowon 1 Iwata, Tetsu 1 Jung, Seokwon 1 Kang, Eun Sook 1 Kang, HyungChul 1 Kang, Jinkeon 1 Kang, Ju-Sung 1 Keller, Nathan 1 Kim, Hyun Jeong 1 Kim, Jongsu 1 Kim, Juhyuk 1 Kim, Kimoon 1 Kim, Taehyun 1 Koo, Bonseok 1 Kwon, Jihoon 1 Lee, Donghoon 1 Lee, Jaesang 1 Lee, Kyungho 1 Lee, Seonhee 1 Lee, Sungjae 1 Lee, Yangsun 1 Park, Haeryong 1 Park, Jonghwan 1 Park, Kyunghwan 1 Park, Myungseo 1 Park, Sangjoon 1 Park, Sangwoo 1 Sakurai, Kouichi 1 Seo, Seog Chung 1 Shin, Yongsup 1 Song, Jung Hwan 1 Sung, Maenghee 1 Yang, Hyungjin 1 Yoo, Heajoung 1 Yoon, Seonhee 1 Yun, Aaram 1 Yung, Moti all top 5 Serials 3 Information Processing Letters 3 Lecture Notes in Computer Science 2 IEEE Transactions on Information Theory 2 Information Sciences 1 Discrete Applied Mathematics 1 Discrete Mathematics 1 Mathematical and Computer Modelling 1 Journal of Cryptology 1 International Journal of Computer Mathematics 1 Journal of Universal Computer Science 1 Journal of Applied Mathematics 1 Information Fields 54 Information and communication theory, circuits (94-XX) 20 Computer science (68-XX) 3 General and overarching topics; collections (00-XX) 1 Number theory (11-XX) 1 Algebraic geometry (14-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH 32 Publications have been cited 191 times in 155 Documents Cited by ▼ Year ▼ HIGHT: a new block cipher suitable for low-resource device. Zbl 1307.94058Hong, Deukjo; Sung, Jaechul; Hong, Seokhie; Lim, Jongin; Lee, Sangjin; Koo, Bon-Seok; Lee, Changhoon; Chang, Donghoon; Lee, Jesang; Jeong, Kitae; Kim, Hyun; Kim, Jongsung; Chee, Seongtaek 32 2006 An alternating projection algorithm for computing the nearest Euclidean distance matrix. Zbl 0728.65034Glunt, W.; Hayden, T. L.; Hong, S.; Wells, J. 28 1990 Related-key rectangle attacks on reduced AES-192 and AES-256. Zbl 1186.94455Kim, Jongsung; Hong, Seokhie; Preneel, Bart 12 2007 Impossible differential cryptanalysis for block cipher structures. Zbl 1123.94352Kim, Jongsung; Hong, Seokhie; Sung, Jaechul; Lee, Sangjin; Lim, Jongin; Sung, Soohak 12 2003 Provable security against differential and linear cryptanalysis for the SPN structure. Zbl 0994.68505Hong, Seokhie; Lee, Sangjin; Lim, Jongin; Sung, Jaechul; Cheon, Donghyeon; Cho, Inho 11 2001 Impossible differential cryptanalysis using matrix method. Zbl 1235.94048Kim, Jongsung; Hong, Seokhie; Lim, Jongin 9 2010 On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. (Extended abstract). Zbl 1152.94428Kim, Jongsung; Biryukov, Alex; Preneel, Bart; Hong, Seokhie 9 2006 Related key differential attacks on 27 rounds of XTEA and full-round GOST. Zbl 1079.68548Ko, Youngdai; Hong, Seokhie; Lee, Wonil; Lee, Sangjin; Kang, Ju-Sung 9 2004 Related-key chosen IV attacks on Grain-v1 and Grain-128. Zbl 1285.94076Lee, Yuseop; Jeong, Kitae; Sung, Jaechul; Hong, Seokhie 8 2008 A fast and provably secure higher-order masking of AES S-box. Zbl 1321.94068Kim, HeeSeok; Hong, Seokhie; Lim, Jongin 7 2011 Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192. Zbl 1140.94346Hong, Seokhie; Kim, Jongsung; Lee, Sangjin; Preneel, Bart 6 2005 The related-key rectangle attack-application to SHACAL-1. Zbl 1098.94619Kim, Jongsung; Kim, Guil; Hong, Seokhie; Lee, Sangjin; Hong, Dowon 6 2004 Provable security for the skipjack-like structure against differential cryptanalysis and linear cryptanalysis. Zbl 0965.94016Sung, Jaechul; Lee, Sangjin; Lim, Jongin; Hong, Seokhie; Park, Sangjoon 5 2000 Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on HMAC/NMAC-3-pass HAVAL. Zbl 1154.68398Lee, Eunjin; Chang, Donghoon; Kim, Jongsung; Sung, Jaechul; Hong, Seokhie 4 2008 A new dedicated 256-bit hash function: FORK-256. Zbl 1186.94446Hong, Deukjo; Chang, Donghoon; Sung, Jaechul; Lee, Sangjin; Hong, Seokhie; Lee, Jaesang; Moon, Dukjae; Chee, Sungtaek 4 2006 Related-key boomerang and rectangle attacks: theory and experimental analysis. Zbl 1365.94438Kim, Jongsung; Hong, Seokhie; Preneel, Bart; Biham, Eli; Dunkelman, Orr; Keller, Nathan 3 2012 Colored simultaneous geometric embeddings. Zbl 1206.05036Brandes, U.; Erten, C.; Fowler, J.; Frati, F.; Geyer, M.; Gutwenger, C.; Hong, S.; Kaufmann, M.; Kobourov, S. G.; Liotta, G.; Mutzel, P.; Symvonis, A. 3 2007 Provable security for an RC6-like structure and a MISTY-FO-like structure against differential cryptanalysis. Zbl 1172.68465Lee, Changhoon; Kim, Jongsung; Sung, Jaechul; Hong, Seokhie; Lee, Sangjin 3 2006 Differential cryptanalysis of TEA and XTEA. Zbl 1092.94507Hong, Seokhie; Hong, Deukjo; Ko, Youngdai; Chang, Donghoon; Lee, Wonil; Lee, Sangjin 3 2004 Truncated differential attacks on 8-round CRYPTON. Zbl 1092.94508Kim, Jongsung; Hong, Seokhie; Lee, Sangjin; Song, Junghwan; Yang, Hyungjin 2 2004 Truncated differential cryptanalysis of Camellia. Zbl 0994.68578Lee, Seonhee; Hong, Seokhie; Lee, Sangjin; Lim, Jongin; Yoon, Seonhee 2 2002 Finite element methods for the Stokes problem in \({\mathbb{R}}^3\). Zbl 0955.65085Hong, S.; Lee, S. 2 2000 Approximate analysis of a discrete-time queueing model of the shared buffer ATM switch. Zbl 0789.60070Hong, S.; Perros, H. G.; Yamashita, H. 2 1993 On a certain arithmetical determinant. Zbl 1399.11082Hong, S.; Hu, S.; Lin, Zong Bing 1 2016 Differential fault analysis on block cipher SEED. Zbl 1245.94075Jeong, Kitae; Lee, Yuseop; Sung, Jaechul; Hong, Seokhie 1 2012 A new double-block-length hash function using Feistel structure. Zbl 1365.94441Lee, Jesang; Hong, Seokhie; Sung, Jaechul; Park, Haeryong 1 2009 Uniqueness of some optimal superimposed codes. Zbl 1160.94394Hong, S.; Kapralov, S.; Kim, H. K.; Oh, D. Y. 1 2007 A weak key class of XTEA for a related-key rectangle attack. Zbl 1295.94102Lee, Eunjin; Hong, Deukjo; Chang, Donghoon; Hong, Seokhie; Lim, Jongin 1 2006 Differential-linear type attacks on reduced rounds of SHACAL-2. Zbl 1098.94629Shin, Yongsup; Kim, Jongsung; Kim, Guil; Hong, Seokhie; Lee, Sangjin 1 2004 Impossible differential attack on 30-round SHACAL-2. Zbl 1123.94345Hong, Seokhie; Kim, Jongsung; Kim, Guil; Sung, Jaechul; Lee, Changhoon; Lee, Sangjin 1 2003 Amplified boomerang attack against reduced-round SHACAL. Zbl 1065.94553Kim, Jongsung; Moon, Dukjae; Lee, Wonil; Hong, Seokhie; Lee, Sangjin; Jung, Seokwon 1 2002 A proposal of a new public key cryptosystem using matrices over a ring. Zbl 0963.94014Yoo, Heajoung; Hong, Seokhie; Lee, Sangjin; Lim, Jongin; Yi, Okyeon; Sung, Maenghee 1 2000 On a certain arithmetical determinant. Zbl 1399.11082Hong, S.; Hu, S.; Lin, Zong Bing 1 2016 Related-key boomerang and rectangle attacks: theory and experimental analysis. Zbl 1365.94438Kim, Jongsung; Hong, Seokhie; Preneel, Bart; Biham, Eli; Dunkelman, Orr; Keller, Nathan 3 2012 Differential fault analysis on block cipher SEED. Zbl 1245.94075Jeong, Kitae; Lee, Yuseop; Sung, Jaechul; Hong, Seokhie 1 2012 A fast and provably secure higher-order masking of AES S-box. Zbl 1321.94068Kim, HeeSeok; Hong, Seokhie; Lim, Jongin 7 2011 Impossible differential cryptanalysis using matrix method. Zbl 1235.94048Kim, Jongsung; Hong, Seokhie; Lim, Jongin 9 2010 A new double-block-length hash function using Feistel structure. Zbl 1365.94441Lee, Jesang; Hong, Seokhie; Sung, Jaechul; Park, Haeryong 1 2009 Related-key chosen IV attacks on Grain-v1 and Grain-128. Zbl 1285.94076Lee, Yuseop; Jeong, Kitae; Sung, Jaechul; Hong, Seokhie 8 2008 Second preimage attack on 3-pass HAVAL and partial key-recovery attacks on HMAC/NMAC-3-pass HAVAL. Zbl 1154.68398Lee, Eunjin; Chang, Donghoon; Kim, Jongsung; Sung, Jaechul; Hong, Seokhie 4 2008 Related-key rectangle attacks on reduced AES-192 and AES-256. Zbl 1186.94455Kim, Jongsung; Hong, Seokhie; Preneel, Bart 12 2007 Colored simultaneous geometric embeddings. Zbl 1206.05036Brandes, U.; Erten, C.; Fowler, J.; Frati, F.; Geyer, M.; Gutwenger, C.; Hong, S.; Kaufmann, M.; Kobourov, S. G.; Liotta, G.; Mutzel, P.; Symvonis, A. 3 2007 Uniqueness of some optimal superimposed codes. Zbl 1160.94394Hong, S.; Kapralov, S.; Kim, H. K.; Oh, D. Y. 1 2007 HIGHT: a new block cipher suitable for low-resource device. Zbl 1307.94058Hong, Deukjo; Sung, Jaechul; Hong, Seokhie; Lim, Jongin; Lee, Sangjin; Koo, Bon-Seok; Lee, Changhoon; Chang, Donghoon; Lee, Jesang; Jeong, Kitae; Kim, Hyun; Kim, Jongsung; Chee, Seongtaek 32 2006 On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1. (Extended abstract). Zbl 1152.94428Kim, Jongsung; Biryukov, Alex; Preneel, Bart; Hong, Seokhie 9 2006 A new dedicated 256-bit hash function: FORK-256. Zbl 1186.94446Hong, Deukjo; Chang, Donghoon; Sung, Jaechul; Lee, Sangjin; Hong, Seokhie; Lee, Jaesang; Moon, Dukjae; Chee, Sungtaek 4 2006 Provable security for an RC6-like structure and a MISTY-FO-like structure against differential cryptanalysis. Zbl 1172.68465Lee, Changhoon; Kim, Jongsung; Sung, Jaechul; Hong, Seokhie; Lee, Sangjin 3 2006 A weak key class of XTEA for a related-key rectangle attack. Zbl 1295.94102Lee, Eunjin; Hong, Deukjo; Chang, Donghoon; Hong, Seokhie; Lim, Jongin 1 2006 Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192. Zbl 1140.94346Hong, Seokhie; Kim, Jongsung; Lee, Sangjin; Preneel, Bart 6 2005 Related key differential attacks on 27 rounds of XTEA and full-round GOST. Zbl 1079.68548Ko, Youngdai; Hong, Seokhie; Lee, Wonil; Lee, Sangjin; Kang, Ju-Sung 9 2004 The related-key rectangle attack-application to SHACAL-1. Zbl 1098.94619Kim, Jongsung; Kim, Guil; Hong, Seokhie; Lee, Sangjin; Hong, Dowon 6 2004 Differential cryptanalysis of TEA and XTEA. Zbl 1092.94507Hong, Seokhie; Hong, Deukjo; Ko, Youngdai; Chang, Donghoon; Lee, Wonil; Lee, Sangjin 3 2004 Truncated differential attacks on 8-round CRYPTON. Zbl 1092.94508Kim, Jongsung; Hong, Seokhie; Lee, Sangjin; Song, Junghwan; Yang, Hyungjin 2 2004 Differential-linear type attacks on reduced rounds of SHACAL-2. Zbl 1098.94629Shin, Yongsup; Kim, Jongsung; Kim, Guil; Hong, Seokhie; Lee, Sangjin 1 2004 Impossible differential cryptanalysis for block cipher structures. Zbl 1123.94352Kim, Jongsung; Hong, Seokhie; Sung, Jaechul; Lee, Sangjin; Lim, Jongin; Sung, Soohak 12 2003 Impossible differential attack on 30-round SHACAL-2. Zbl 1123.94345Hong, Seokhie; Kim, Jongsung; Kim, Guil; Sung, Jaechul; Lee, Changhoon; Lee, Sangjin 1 2003 Truncated differential cryptanalysis of Camellia. Zbl 0994.68578Lee, Seonhee; Hong, Seokhie; Lee, Sangjin; Lim, Jongin; Yoon, Seonhee 2 2002 Amplified boomerang attack against reduced-round SHACAL. Zbl 1065.94553Kim, Jongsung; Moon, Dukjae; Lee, Wonil; Hong, Seokhie; Lee, Sangjin; Jung, Seokwon 1 2002 Provable security against differential and linear cryptanalysis for the SPN structure. Zbl 0994.68505Hong, Seokhie; Lee, Sangjin; Lim, Jongin; Sung, Jaechul; Cheon, Donghyeon; Cho, Inho 11 2001 Provable security for the skipjack-like structure against differential cryptanalysis and linear cryptanalysis. Zbl 0965.94016Sung, Jaechul; Lee, Sangjin; Lim, Jongin; Hong, Seokhie; Park, Sangjoon 5 2000 Finite element methods for the Stokes problem in \({\mathbb{R}}^3\). Zbl 0955.65085Hong, S.; Lee, S. 2 2000 A proposal of a new public key cryptosystem using matrices over a ring. Zbl 0963.94014Yoo, Heajoung; Hong, Seokhie; Lee, Sangjin; Lim, Jongin; Yi, Okyeon; Sung, Maenghee 1 2000 Approximate analysis of a discrete-time queueing model of the shared buffer ATM switch. Zbl 0789.60070Hong, S.; Perros, H. G.; Yamashita, H. 2 1993 An alternating projection algorithm for computing the nearest Euclidean distance matrix. Zbl 0728.65034Glunt, W.; Hayden, T. L.; Hong, S.; Wells, J. 28 1990 all cited Publications top 5 cited Publications all top 5 Cited by 313 Authors 8 Bogdanov, Andrey 6 Sasaki, Yu 5 Dunkelman, Orr 5 Lai, Xuejia 4 Keller, Nathan 4 Qi, Houduo 4 Rijmen, Vincent 4 Wu, Wenling 4 Wu, Zhijun 3 Banik, Subhadeep 3 Carlet, Claude 3 Hong, Seokhie 3 Huang, Jialin 3 Kim, Jongsung 3 Lavor, Carlile Campos 3 Leander, Gregor 3 Li, Chao 3 Maculan, Nelson F. 3 Meier, Willi 3 Naya-Plasencia, María 3 Preneel, Bart 3 Raydan, Marcos 3 Shamir, Adi 3 Sun, Bing 3 Sung, Jaechul 3 Tarazaga, Pablo A. 3 Zhang, Lei 2 Abdalla, Michel 2 Aoki, Kazumaro 2 Aumasson, Jean-Philippe 2 Benhamouda, Fabrice 2 Chen, Huaifeng 2 Demirci, Hüseyin 2 Derbez, Patrick 2 Dinur, Itai 2 Fowler, J. Joseph 2 Gorski, Michael 2 Harmanci, A. Emre 2 Hayden, Thomas L. 2 Hirose, Shoichi 2 Isobe, Takanori 2 Jin, Chenhui 2 Jünger, Michael 2 Karakoç, Ferhat 2 Khoo, Khoongming 2 Kobourov, Stephen G. 2 Lee, Sangjin 2 Li, Ruilin 2 Liberti, Leo 2 Lim, Jongin 2 Liu, Wei-min 2 Lu, Jiqiang 2 Lucks, Stefan 2 Luo, Yiyuan 2 Meijer, Henk G. 2 Minier, Marine 2 Mouha, Nicky 2 Mucherino, Antonio 2 Passelègue, Alain 2 Paul, Goutam 2 Phan, Raphael Chung-Wei 2 Poschmann, Axel Y. 2 Prouff, Emmanuel 2 Qi, Wenfeng 2 Regazzoni, Francesco 2 Rivain, Matthieu 2 Shibutani, Kyoji 2 Sit, Atilla 2 Tischhauser, Elmar 2 Velichkov, Vesselin 2 Wang, Huaxiong 2 Wang, Meiqin 2 Wang, Qian 2 Wang, Qingju 2 Wang, Xiaoyun 2 Yu, Hongbo 1 Abdelraheem, Mohamed Ahmed 1 Ågren, Martin 1 Akleylek, Sedat 1 Al-Homidan, Suliman S. 1 Albrecht, Martin R. 1 Alhamdan, Ali 1 Alkhzaimi, Hoda A. 1 Alrashed, Maryam H. A. 1 Aragón Artacho, Francisco Javier 1 Aslan, Bora 1 Bai, Shuanghua 1 Baksi, Anubhab 1 Bani-Ata, Mashhour 1 Bar-On, Achiya 1 Bartlett, Harry 1 Bauschke, Heinz H. 1 Biham, Eli 1 Biryukov, Alex 1 Borwein, Jonathan Michael 1 Bouillaguet, Charles 1 Boura, Christina 1 Bulus, Ercan 1 Chen, Huajin 1 Chen, Man ...and 213 more Authors all top 5 Cited in 48 Serials 16 Designs, Codes and Cryptography 11 Journal of Cryptology 9 Information Processing Letters 3 Bulletin of Mathematical Biology 3 Computational Optimization and Applications 3 Cryptography and Communications 2 Computers & Mathematics with Applications 2 Journal of Computational and Applied Mathematics 2 Journal of Optimization Theory and Applications 2 Applied Mathematics Letters 2 Computational Geometry 2 Journal of Global Optimization 2 International Journal of Computer Mathematics 2 Linear Algebra and its Applications 2 Mathematical Problems in Engineering 2 Journal of Systems Science and Complexity 2 Science China. Information Sciences 1 Bulletin of the Australian Mathematical Society 1 Discrete Applied Mathematics 1 Discrete Mathematics 1 Periodica Mathematica Hungarica 1 Problems of Information Transmission 1 Computing 1 Information Sciences 1 Operations Research Letters 1 Optimization 1 Journal of Computer Science and Technology 1 Computers & Operations Research 1 Mathematical and Computer Modelling 1 SIAM Journal on Matrix Analysis and Applications 1 Queueing Systems 1 Annals of Operations Research 1 Mathematical Programming. Series A. Series B 1 SIAM Journal on Optimization 1 Numerical Linear Algebra with Applications 1 International Transactions in Operational Research 1 Journal of Inequalities and Applications 1 Wuhan University Journal of Natural Sciences (WUJNS) 1 Journal of Discrete Mathematical Sciences & Cryptography 1 RAIRO. Operations Research 1 The ANZIAM Journal 1 Quantitative Finance 1 JP Journal of Algebra, Number Theory and Applications 1 Science in China. Series F 1 Journal of Industrial and Management Optimization 1 Advances in Mathematics of Communications 1 Algorithms 1 Journal of the Operations Research Society of China all top 5 Cited in 20 Fields 116 Information and communication theory, circuits (94-XX) 25 Operations research, mathematical programming (90-XX) 15 Computer science (68-XX) 14 Numerical analysis (65-XX) 7 Linear and multilinear algebra; matrix theory (15-XX) 5 Biology and other natural sciences (92-XX) 3 Combinatorics (05-XX) 3 Statistics (62-XX) 2 Number theory (11-XX) 2 Calculus of variations and optimal control; optimization (49-XX) 2 Fluid mechanics (76-XX) 1 Order, lattices, ordered algebraic structures (06-XX) 1 Algebraic geometry (14-XX) 1 Associative rings and algebras (16-XX) 1 Approximations and expansions (41-XX) 1 Operator theory (47-XX) 1 Geometry (51-XX) 1 Probability theory and stochastic processes (60-XX) 1 Mechanics of deformable solids (74-XX) 1 Game theory, economics, finance, and other social and behavioral sciences (91-XX) Citations by Year