default search action
Jung Hwan Song
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j14]Ted Taekyoung Kwon, Junghwan Song, Heeyoung Jung, Selin Chun, Hyunwoo Lee, Minhyeok Kang, Minkyung Park, Eunsang Cho:
How to decentralize the internet: A focus on data consolidation and user privacy. Comput. Networks 234: 109911 (2023) - 2022
- [j13]Yoonji Kim, Jungmin Kim, Junghwan Song, Dongweon Yoon:
Blind Estimation of Self-Synchronous Scrambler Using Orthogonal Complement Space in DSSS Systems. IEEE Access 10: 66522-66528 (2022) - 2020
- [j12]Dongyeong Kim, Junghwan Song, Dongweon Yoon:
On the Estimation of Synchronous Scramblers in Direct Sequence Spread Spectrum Systems. IEEE Access 8: 166450-166459 (2020) - [j11]Dongyeong Kim, Dawoon Kwon, Junghwan Song:
Efficient Computation of Boomerang Connection Probability for ARX-Based Block Ciphers with Application to SPECK and LEA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(4): 677-685 (2020)
2010 – 2019
- 2019
- [j10]Dongyeong Kim, Younghoon Jung, Youngjin Ju, Junghwan Song:
Fast Implementation of LSH With SIMD. IEEE Access 7: 107016-107024 (2019) - [c15]Siyoung Choi, Junghwan Song, Junseok Kim, Suhun Lim, Sunghyun Choi, Ted Taekyoung Kwon, Saewoong Bahk:
5G K-SimNet: End-to-End Performance Evaluation of 5G Cellular Systems. CCNC 2019: 1-6 - 2018
- [c14]Junghwan Song, Munyoung Lee, Ted "Taekyoung" Kwon:
SMIC: subflow-level multi-path interest control for information centric networking. ICN 2018: 77-87 - [c13]Siyoung Choi, Seongjoon Kang, Saewoong Bahk, Junghwan Song, Ted Taekyoung Kwon:
5G K-SimNet: Network Simulator for Evaluating End-to-end Performance of 5G Cellular Systems. DySPAN 2018: 1-2 - 2017
- [j9]Minchul Kim, Younghoon Jung, Junghwan Song:
A modified exhaustive search on a password system using SHA-1. Int. J. Inf. Sec. 16(3): 263-269 (2017) - 2015
- [j8]Munyoung Lee, Junghwan Song, Kideok Cho, Sangheon Pack, Ted Taekyoung Kwon, Jussi Kangasharju, Yanghee Choi:
Content discovery for information-centric networking. Comput. Networks 83: 1-14 (2015) - [c12]Munyoung Lee, Jung Hwan Song, Jaehoon Jeong, Ted Taekyoung Kwon:
DOVE: Data Offloading through Spatio-Temporal Rendezvous in Vehicular Networks. ICCCN 2015: 1-8 - 2014
- [j7]Junghwan Song, Kwanhyung Lee, Younghoon Jung:
The Security Weakness of Block Cipher Piccolo against Fault Analysis. Int. J. Distributed Sens. Networks 10 (2014) - [j6]Junghwan Song, Kwanhyung Lee, HwanJin Lee:
Biclique Cryptanalysis on the Full Crypton-256 and mCrypton-128. J. Appl. Math. 2014: 529736:1-529736:10 (2014) - 2013
- [j5]Junghwan Song, Kwanhyung Lee, HwanJin Lee:
Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo. Int. J. Comput. Math. 90(12): 2564-2580 (2013) - 2011
- [j4]Bonwook Koo, Yongjin Yeom, Jung Hwan Song:
Related-Key Boomerang Attack on Block Cipher SQUARE. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 3-9 (2011) - 2010
- [j3]Jaeik Cho, Changhoon Lee, Sang Hyun Cho, Jung Hwan Song, Jongin Lim, Jongsub Moon:
A statistical model for network data analysis: KDD CUP 99' data evaluation and its comparing with MIT Lincoln Laboratory network data. Simul. Model. Pract. Theory 18(4): 431-435 (2010) - [j2]Changhoon Lee, Sangjin Lee, Jong Hyuk Park, Sajid Hussain, Jung Hwan Song:
Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device. Telecommun. Syst. 44(3-4): 267-279 (2010) - [i1]Bonwook Koo, Yongjin Yeom, Jung Hwan Song:
Related-Key Boomerang Attack on Block Cipher SQUARE. IACR Cryptol. ePrint Arch. 2010: 73 (2010)
2000 – 2009
- 2009
- [j1]Haeryong Park, Seongan Lim, Ikkwon Yie, Kitae Kim, Junghwan Song:
Strong unforgeability in group signature schemes. Comput. Stand. Interfaces 31(4): 856-862 (2009) - [c11]HwanJin Lee, InKyung Jeun, Hyun Cheol Jeong, Junghwan Song:
Analysis of the OPENID from a privacy law perspective. IADIS AC (1) 2009: 209-216 - 2008
- [c10]Yeonjung Kang, Haeryong Park, Kilsoo Chun, Junghwan Song:
A Digital Identity Management Service Model. ITNG 2008: 599-602 - [c9]HwanJin Lee, InKyung Jeun, Kilsoo Chun, Junghwan Song:
A New Anti-phishing Method in OpenID. SECURWARE 2008: 243-247 - 2007
- [c8]Yeonjung Kang, Hyangjin Lee, Kilsoo Chun, Junghwan Song:
Classification of Privacy Enhancing Technologies on Life-cycle of Information. SECURWARE 2007: 66-70 - 2006
- [c7]Bonwook Koo, Hwan Seok Jang, Jung Hwan Song:
On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher. ICISC 2006: 51-64 - 2005
- [c6]Ho Lee, Jung Hwan Song:
Designing Security Auditing Protocol with Web Browsers. WISA 2005: 364-376 - 2004
- [c5]Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim:
New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. ICISC 2004: 21-32 - [c4]Jongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, Jung Hwan Song:
Related-Key Attacks on Reduced Rounds of SHACAL-2. INDOCRYPT 2004: 175-190 - 2003
- [c3]Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong:
New Block Cipher: ARIA. ICISC 2003: 432-445 - [c2]Jongsung Kim, Seokhie Hong, Sangjin Lee, Jung Hwan Song, Hyungjin Yang:
Truncated Differential Attacks on 8-Round CRYPTON. ICISC 2003: 446-456 - [c1]Bonwook Koo, Hwan Seok Jang, Jung Hwan Song:
Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer. WISA 2003: 489-503
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint