SCI & SCI-E       International(ETC)       Domestic

[85] Seokhee Lee, Keungi Lee, Jong Hyuk Park, Sangjin Lee, "An on-site digital investigation methodology for data leak case," Security and Communication Networks , pp. -, 2012.06.
  
[84] Jong Hyuk Park, Ji-Sook Park, Sangjin Lee, Byoung-Soo Koh, "A DRBAC Model based on Context for Smart and Secure Services in Intelligent Ubiquitous Home," ICISC 4159, pp. 893-901, 2009.09.
  
[83] Daesung Lim, Nam Su Chang, Sung Yeon Ji, Chang Han Kim, Sangjin Lee, Young-Ho Park, "An efficient signed digit montgomery multiplication for RSA," Journal of Systems Architecture 55(7), pp. 355-362, 2009.06.
  
[82] JeongChoon Ryoo, Dong-Guk Han, Sung-Kyung Kim, Sangjin Lee, "Performance Enhancement of Differential Power Analysis Attacks with Signal Companding Methods," IEEE Signal Processing Letters 15, pp. 625-628, 2008.11.
  
[81] Bora Park, Antonio Savoldi, Paolo Gubian, Jungheum Park, Seok Hee Lee, and Sangjin Lee, "Data Extraction from Damage Compressed File for Computer Forensic Purposes," International Journal of Hybrid Information Technology 1(3), pp. 89-102, 2008.10.
  
[80] Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee, "Preimage Attack on the Parallel FFT-Hashing Function," 12th Australasian Conference, ACISP 2007 4586, pp. 59-67, 2007.07.
  
[79] Kitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jaeheon Kim, Deukjo Hong, "Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators," VIETCRYPT 2006 4341, pp. 260-270, 2007.01.
  
[78] Hwajong Oh, Kwangsoo Lee, Sangjin Lee, "Attack on JPEG2000 Steganography Using LRCA," Digital Watermarking 4283, pp. 268-281, 2006.11.
  
[77] Kwangsoo Lee, Andreas Westfeld, Sangjin Lee, "Category Attack for LSB Steganalysis of JPEG Images," Digital Watermarking 4283, pp. 35-48, 2006.11.
  
[76] Bonseok Koo, Dongwook Lee, Gwonho Ryu, Taejoo Chang, Sangjin Lee, "High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem," ICISC 2006 4296, pp. 81-93, 2006.11.
  
[75] Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yung, "Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding," ASIACRYPT 2006 4284, pp. 283-298, 2006.11.
  
[74] Jong Hyuk Park, Sangjin Lee, Byoung-Soo Koh, Jae-Hyuk Jang, "uiH-PMAC Model Suitable for Ubi-Home Gateway in Ubiquitous Intelligent Environment," ICISC 4252, pp. 777-784, 2006.10.
  
[73] Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bon-Seok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee, "HIGHT: A New Block Cipher Suitable for Low-Resource Device," CHES 2006 4249, pp. 46-59, 2006.10.
  
[72] Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon, Sungtaek Chee, "A New Dedicated 256-Bit Hash Function: FORK-256," ICISC 4047, pp. 195-209, 2006.10.
  
[71] Jong Hyuk Park, Sangjin Lee, Sung Hee Hong, "C-iUMS: Context Based Smart and Secure Multimedia Service in Intelligent Ubiquitous Home," ICISC 4097, pp. 660-670, 2006.08.
  
[70] Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, "Forgery and Key Recovery Attacks on PMAC and Mitchell¡¯s TMAC Variant," ICISC 4058, pp. 421-431, 2006.06.
  
[69] Jong Hyuk Park, Jungsuk Song, Sangjin Lee, Byoung-Soo Koh, In-Hwa Hong, "User Centric Intelligent IPMPS in Ubi-Home," ICISC 3983, pp. 245-254, 2006.05.
  
[68] Jong Hyuk Park, Sangjin Lee, Byoung-Soo Koh, "A Flexible DRM System Considering Ubiquitous Environment," ICISC 3983, pp. 236-244, 2006.05.
  
[67] Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, "Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis," ICISC 3982, pp. 446-455, 2006.05.
  
[66] Jong-Hyuk Park, Jun Choi, Sangjin Lee, Hye-Ung Park, Deok-Gyu Lee, "User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home," ICISC 3801, pp. 313-320, 2005.12.
  
[65] Jong-Hyuk Park, Sangjin Lee, Yeog Kim, Byoung-Soo Koh, "Design and Implementation of the IMS-IPMP System in Convergence Home-Network Environment," ICISC 3815, pp. 465-466, 2005.11.
  
[64] Deukjo Hong, Jaechul Sung, Seokhie Hong, Sangjin Lee, "How to Construct Universal One-Way Hash Functions of Order r," ICISC 3797, pp. 63-76, 2005.11.
  
[63] Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon, "Related-Key Differential Attacks on Cobra-H64 and Cobra-H128," ICISC 3796, pp. 201-219, 2005.11.
  
[62] Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim, "New Steganalysis Methodology: LR Cube Analysis for the Detection of LSB Steganography," ICISC 3727, pp. 312-326, 2005.11.
  
[61] Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee, "On the Security of Encryption Modes of MD4, MD5, and HAVAL," ICISC 3783, pp. 147-158, 2005.10.
  
[60] Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee, "Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b," ICISC 3715, pp. 244-262, 2005.09.
  
[59] Jong-Hyuk Park, Heung-Soo Park, Sangjin Lee, Jun Choi, Deok-Gyu Lee, "Intelligent Multimedia Service System Based on Context Awareness in Smart Home," ICISC 3681, pp. 1146-1152, 2005.09.
  
[58] Kwangsoo Lee, Changho Jung, Sangjin Lee, HyungJun Kim, Jongin Lim, "Applying LR Cube Analysis to JSteg Detection," ICISC 3677, pp. 275-276, 2005.09.
  
[57] Seokhie Hong, Jongsung Kim, Sangjin Lee, Bart Preneel, "Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192," ICISC 3557, pp. 368-383, 2005.07.
  
[56] Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee, "Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model," ICISC 3557, pp. 243-254, 2005.07.
  
[55] Kisik Chang, Robert H. Deng, Bao Feng, Sangjin Lee, Hyungjun Kim, Jongin Lim, "On Security Notions for Steganalysis," ICISC 3506, pp. 440-454, 2005.05.
  
[54] Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong, "Padding Oracle Attacks on Multiple Modes of Operation," ICISC 3506, pp. 343-351, 2005.05.
  
[53] Wonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee, "On the Pseudorandomness of a Modification of KASUMI Type Permutations," ICISC 3506, pp. 313-329, 2005.05.
  
[52] Jaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee, Jongin Lim, "Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE," ICISC 3481, pp. 567-5, 2005.05.
  
[51] Kwangsoo Lee, Changho Jung, Sangjin Lee, Jongin Lim, "Color Cube Analysis for Detection of LSB Steganography in RGB Color Images," ICISC 3481, pp. 537-546, 2005.05.
  
[50] Jeong Jae Yu, Chang-ho Jung, Seok-Koo Yoon, Sangjin Lee, "Steganographic Scheme Using a Block Cipher," ICISC 3304, pp. 163-170, 2005.02.
  
[49] Kisik Chang, Robert H. Deng, Bao Feng, Sangjin Lee, Hyungjun Kim, "On Security Notions of Steganographic Systems," ICISC 3304, pp. 137-151, 2005.02.
  
[48] Wonil Lee, Donghoon Chang, Sangjin Lee, Soohak Sung, Mridul Nandi, "Construction of UOWHF: Two New Parallel Methods," IEICE 1008, pp. 49-58, 2005.01.
  
[47] Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Konichi Sakurai, "PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis," IEICE 1008, pp. 39-48, 2005.01.
  
[46] Jun Choi, Deukjo Hong, Seokhie Hong, Sangjin Lee, "Linear Attack Using Multiple Linear Approximations," IEICE 1008, pp. 2-8, 2005.01.
  
[45] Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee, Soohak Sung, "Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA," ICISC 3348, pp. 328-328, 2004.12.
  
[44] Youngdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee, "Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H," ICISC 3348, pp. 191-205, 2004.12.
  
[43] Jongsung Kim, Guil Kim, Sangjin Lee, Jongin Lim, Junghwan Song, "Related-Key Attacks on Reduced Rounds of SHACAL-2," ICISC 3348, pp. 175-190, 2004.12.
  
[42] Deukjo Hong, Bart Preneel, Sangjin Lee, "Higher Order Universal One-Way Hash Functions," ICISC 3329, pp. 201-213, 2004.12.
  
[41] Jong-Hyuk Park, Sung-Soo Kim, Jae-Won Han, Sangjin Lee, "Implementation of the H-IPMP System Based on MPEG-21 for Secure Multimedia Distribution Enviroment," WSEAS 1(5), pp. 1301-1308, 2004.11.
  
[40] Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai, "A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model," ICISC 3108, pp. 212-212, 2004.07.
  
[39] Youngdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee, "Related Key Differential Cryptanalysis of Full-Round SPECTR-H64, and CIKS-1," ICISC 3108, pp. 137-148, 2004.07.
  
[38] Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong, "The Related-Key Rectangle Attack - Application to SHACAL-1," ICISC 3108, pp. 123-136, 2004.07.
  
[37] Yongsup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, "Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2," ICISC 3108, pp. 110-122, 2004.07.
  
[36] Wonil Lee, Donghoon Chang, Sangjin Lee, Soohak Sung, and Mridul Nandi, "New Parallel Domain Extenders for UOWHF," Advances in Cryptology - ASIACRYPT 2003 2894, pp. 208-227, 2003.12.
  
[35] Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, and Sangjin Lee, "Impossible Differential attack on 30-round SHACAL-2," Progress in Cryptology - Indocrypt 2003 2904, pp. 97-106, 2003.12.
  
[34] Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee, Jongin Lim, and Suhak Sung, "Impossible differential cryptanlysis for block cipher structures," Progress in Cryptology - Indocrypt 2003 2904, pp. 82-96, 2003.12.
  
[33] Taeshik Sohn, Jongsub Moon, Sangjin Lee, Donghoon Lee, and Jongin Lim, "Covert Channel in the ICMP Payload Using Support Vector Machine," Computer and Information Sciences - ISCIS 2003 2869, pp. 828-835, 2003.11.
  
[32] Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee, "Differential Cryptanalysis of TEA and XTEA," Information Security and Cryptology-ICISC2003 2971, pp. 402-417, 2003.11.
  
[31] Jongsung Kim, Seokhie Hong, Sangjin Lee, Junghwan Song, Hyungjin Yang, "Truncated Differential Attacks on 8-Round CRYTON," ICISC 2971, pp. 446-456, 2003.11.
  
[30] Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong, "New Block Cipher: ARIA," ICISC 2971, pp. 432-445, 2003.11.
  
[29] Kilsoo Chun, Seungjoo Kim, Sangjin Lee, Soo Hak Sung and Seonhee Yoon, "Differential and linear cryptanalysis for 2-round SPNs," Digital Watermarking 87(5), pp. 277-282, 2003.09.
  
[28] Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, and Jongin Lim, "Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property," Computer Network Security 2776, pp. 298-307, 2003.09.
  
[27] Jaechul Sung, Deukjo Hong, and Sangjin Lee, "Key Recovery Attacks on RMAC, TMAC, and IACBC," Information Security and Privacy 2727, pp. 265-273, 2003.07.
  
[26] Sangwoo Park, Soo Hak Sung, Sangjin Lee, and Jongin Lee, "Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES," Fast Software Encryption 2887, pp. 247-260, 2003.02.
  
[25] Hyejoung Yoo, Hyungwoo Lee, Sangjin Lee, and Jongin Lim, "Designated Verification of Non-invertible Watermark," Information Security 2851, pp. 338-351, 2003.01.
  
[24] Kisik Chang, Changho Jung, Sangjin Lee, and Wooil Yang, "High Quality Perceptual Steganographic Techniques," Digital Watermarking 2939, pp. 518-531, 2003.01.
  
[23] Jeong Jae Yu, Jae Won Han, Kwang Su Lee, Seung Cheol O, Sangjin Lee, and IL Hwan Park, "A Secure Steganographic Scheme against Statistical Analyses," Digital Watermarking 2939, pp. 497-507, 2003.01.
  
[22] Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung, "Amplified Boomerang Attack against Reduced-Round SHACAL," Advances in Cryptology - ASIACRYPT 2002 2501, pp. 243-253, 2002.12.
  
[21] Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, and Jongin Lim, "A Chosen Plaintext Linear Attack On Block Cipher CIKS-1," Information and Communications Security 2513, pp. 456-468, 2002.12.
  
[20] Donghoon Chang, Jaechul Sung, Soohak Sung, Sangjin Lee, and Jongin Lim, "Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC"98," Selected Areas in Cryptography 2595, pp. 160-174, 2002.08.
  
[19] Dong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee, and Hyung-Jin Yang, "A Practical Approach Defeating Blackmailing," Information Security and Privacy 2384, pp. 464-481, 2002.07.
  
[18] Young-Ho Park, Sangho Oh, Sangjin Lee, Jongin Lim, and Maenghee Sung, "An improved method of multiplication on certain elliptic curves," Public Key Cryptography - PKC 2002 2274, pp. 310-322, 2002.02.
  
[17] Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim, "Saturation attacks on reduced-round Skipjack," Fast Software Encryption Workshop 2002 2365, pp. 100-111, 2002.02.
  
[16] Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, and Jongin Lim, "Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA," Fast Software Encryption Workshop 2002 2365, pp. 49-60, 2002.02.
  
[15] Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, and Okyeon Yi, "Known-IV Attacks on Triple Modes of Operation of Block Ciphers," Advances in Cryptology - ASIACRYPT 2001 2248, pp. 208-221, 2001.12.
  
[14] Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee, and Jongin Lim, "Off-line Authentication Using Watermarks," Information Security and Cryptology - ICISC 2001 2288, pp. 200-2013, 2001.12.
  
[13] Jaechul Sung, Sangjin Lee, Jongin Lim, Wonil Lee, and Okyeon Yi, "Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation," Information Security and Cryptology - ICISC 2001 2288, pp. 103-113, 2001.12.
  
[12] Seonhee Lee, Seokhie Hong, Sangjin Lee, Jongin Lim, and Seonhee Yoon, "Truncated Differential Cryptanalysis of Camellia," Information Security and Cryptology - ICISC 2001 2288, pp. 32-38, 2001.12.
  
[11] Jaechul Sung, Sangjin Lee, Jongin Lim, Seokhie Hong, and Sangjoon Park, "Provable Security for the Skipjack-like Structure against DC and LC," Advances in Cryptology - ASIACRYPT 2000 1976, pp. 274-288, 2000.12.
  
[10] Dong Hyeon Cheon, Sangjin Lee, Jongin Lim, and Sung Jae Lee, "New Block Cipher DOWNUT using Pairwise Perfect Decorrelation," Progress in Cryptology - INDOCRYPT 2000 1977, pp. 262-270, 2000.12.
  
[9] Dong Hyeon Cheon, Seok Hie Hong, Sangjin Lee, Sung Jae Lee, Kyung Hwan Park, and Seon Hee Yoon, "Difference Distribution Attack on DONUT and Improved DONUT," Information Security and Cryptology - ICISC 2000 2015, pp. 37-48, 2000.12.
  
[8] Seokhie Hong, Sangjin Lee, Jongin Lim, Jaechul Sung, Dong Hyeon Cheon, and Inho Cho, "Provable Security against Differential and Linear Cryptanalysis for the SPN Structure," Fast Software Encryption 1978, pp. 273-283, 2000.04.
  
[7] Heajoung Yoo, Seokhie Hong, Sangjin Lee, Jongin Lim, Okyeon Yi, and Maenghee Sung, "A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring," Information Security and Privacy 1841, pp. 41-48, 2000.03.
  
[6] Ju-Sung Kang, Choonsik Park, Sangjin Lee, and Jong-In Lim, "On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis," Information Security and Cryptology - ICISC"99 1787, pp. 38-52, 1999.12.
  
[5] Sang Uk Shin, Kyung Hyune Rhee, Dae Hyun Rye, and Sangjin Lee, "A New Hash Function Based on MDx-family and Its Application to MAC," Public Key Cryptography 1431, pp. 234-246, 1998.02.
  
[4] Sangjin Lee, Seongtaek Chee, Sangjoon Park, and Sungmo Park, "Conditional Correlation Attack on Nonlinear Filter Generators," Advances in Cryptology - ASIACRYPT"96 1163, pp. 360-367, 1996.11.
  
[3] Seongtaek Chee, Sangjin Lee, Daiki Lee, Soohak Sung, "On the Correlation Immune Functions and their Nonlinearity," Advances in Cryptology - ASIACRYPT"96 1163, pp. 232-243, 1996.11.
  
[2] Sangjoon Park, Sangjin Lee, and Seung-Cheol Goh, "On the Security of the Gollmann Cascades," Advances in Cryptology - CRYPTO"95 963, pp. 148-156, 1995.08.
  
[1] Seongtaek Chee, Sangjin Lee, and Kwangjo Kim, "Semi-bent Functions," Advances in Cryptology - ASIACRYPT"94 917, pp. 105-118, 1994.12.