Research Articles
-
Jin Hong, Hyeonmi Lee.
Solving discrete logarithm problems faster with the aid of pre-computation.
Discrete Appl. Math. 267, pp.93–119, (2019).
https://doi.org/10.1016/j.dam.2019.03.023
-
Jin Hong, Hyeonmi Lee.
Rigged configuration descriptions of the crystals B(∞) and B(λ) for special linear Lie algebras.
J. Math. Phys. 58(10), 101701, (2017).
https://doi.org/10.1063/1.4986276
-
Jin Hong, Hyeonmi Lee.
Description of B(∞) through Kashiwara embedding for Lie algebra types E6 and E7.
Algebr. Represent. Theor. 20(4), pp.871–893, (2017).
https://doi.org/10.1007/s10468-017-9667-2
(SN SharedIt)
-
Jin Hong.
Perfect rainbow tradeoff with checkpoints revisited.
PLOS ONE 11(11), e0166404, (2016).
https://doi.org/10.1371/journal.pone.0166404
-
Jin Hong, Byoung-Il Kim.
Performance comparison of cryptanalytic time memory data tradeoff methods.
B. Korean Math. Soc. 53(5), pp.1439–1446, (2016).
https://doi.org/10.4134/BKMS.b150754
-
Ga Won Lee, Jin Hong.
Comparison of perfect table cryptanalytic tradeoff algorithms.
Des. Codes Cryptogr. 80(3), pp.473–523, (2016).
https://doi.org/10.1007/s10623-015-0116-0
(SN SharedIt)
(IACR ePrint)
-
Jin Hong, Hyeonmi Lee.
Analysis of possible pre-computation aided DLP solving algorithms.
J. Korean Math. Soc. 52(4), pp.797–819, (2015).
https://doi.org/10.4134/JKMS.2015.52.4.797
-
Jung Woo Kim, Jungjoo Seo, Jin Hong, Kunsoo Park, Sung-Ryul Kim.
High-speed parallel implementations of the rainbow method based on perfect tables in a heterogeneous system.
Softw. Pract. Exper. 45(6), pp.837–855, (2015).
https://doi.org/10.1002/spe.2257
(Author Copy)
-
Taekyoung Kwon, Jin Hong.
Analysis and improvement of a PIN-entry method resilient to shoulder-surfing and recording attacks.
IEEE Trans. Inf. Forensics Secur. 10(2), pp.278–292, (2015).
https://doi.org/10.1109/TIFS.2014.2374352
(Author Copy)
-
Jin Hong, Hyeonmi Lee.
Crystal B(λ) as a subset of the tableau description of B(∞) for the classical Lie algebra types.
Algebr. Represent. Theory 18(1), pp.137–160, (2015).
https://doi.org/10.1007/s10468-014-9485-8
(SN SharedIt)
-
Byoung-Il Kim, Jin Hong.
Analysis of the perfect table fuzzy rainbow tradeoff.
J. Appl. Math. 2014, Article ID 765394, (2014).
https://doi.org/10.1155/2014/765394
-
Jin Hong, Sunghwan Moon.
A comparison of cryptanalytic tradeoff algorithms.
J. Cryptology 26(4), pp.559–637, (2013).
https://doi.org/10.1007/s00145-012-9128-3
(SN SharedIt)
(IACR ePrint)
(Erratum)
-
Byoung-Il Kim, Jin Hong.
Analysis of the non-perfect table fuzzy rainbow tradeoff.
ACISP 2013, LNCS 7959, pp.347–362, Springer, (2013).
https://doi.org/10.1007/978-3-642-39059-3_24
(IACR ePrint)
-
Jung Woo Kim, Jungjoo Seo, Jin Hong, Kunsoo Park.
A faster cryptanalytic time-memory tradeoff.
International Journal of Security and Its Applications 7(2), pp.75–87, (2013).
http://www.sersc.org/journals/IJSIA/vol7_no2_2013/6.pdf
-
Jung Woo Kim, Jungjoo Seo, Jin Hong, Kunsoo Park, Sung-Ryul Kim.
High-speed parallel implementations of the rainbow method in a heterogeneous system.
INDOCRYPT 2012, LNCS 7668, pp.303–316, Springer, (2012).
https://doi.org/10.1007/978-3-642-34931-7_18
(Author Copy)
-
Jung Hee Cheon, Jin Hong, Minkyu Kim.
Accelerating Pollard's rho algorithm on finite fields.
J. Cryptology 25(2), pp.195–242, (2012).
https://doi.org/10.1007/s00145-010-9093-7
(SN SharedIt)
(Author Copy)
-
Jin Hong, Hyeonmi Lee.
Young tableaux and crystal B(∞) for the exceptional Lie algebra types.
J. Combin. Theory Ser. A. 119(2), pp.397–419, (2012).
https://doi.org/10.1016/j.jcta.2011.09.009
-
Jin Hong, Ga Won Lee, Daegun Ma.
Analysis of the parallel distinguished point tradeoff.
INDOCRYPT 2011, LNCS 7107, pp.161–180, Springer, (2011).
https://doi.org/10.1007/978-3-642-25578-6_14
(IACR ePrint)
-
Jin Hong.
The cost of false alarms in Hellman and rainbow tradeoffs.
Des. Codes Cryptogr. 57(3), pp.293–327, (2010).
https://doi.org/10.1007/s10623-010-9368-x
(SN SharedIt)
(IACR ePrint)
-
Taekyoung Kwon, Jin Hong.
Secure and efficient broadcast authentication in wireless sensor networks.
IEEE Trans. Computers 59(8), pp.1120–1133, (2010).
https://doi.org/10.1109/TC.2009.171
(Author Copy)
(Funny Copy)
-
Minkyu Kim, Jung Hee Cheon, Jin Hong.
Subset-restricted random walks for Pollard rho method on Fpm.
PKC 2009, LNCS 5443, pp.54–67, Springer, (2009).
https://doi.org/10.1007/978-3-642-00468-1_4
-
Daegun Ma, Jin Hong.
Success probability of the Hellman trade-off.
Inform. Process. Lett. 109(7), pp.347–351, (2009).
https://doi.org/10.1016/j.ipl.2008.12.002
(Author Copy)
-
Jung Hee Cheon, Jin Hong, Minkyu Kim.
Speeding up the Pollard rho method on prime fields.
ASIACRYPT 2008, LNCS 5350, pp.471–488, Springer, (2008).
https://doi.org/10.1007/978-3-540-89255-7_29
-
Jin Hong, Hyeonmi Lee.
Young tableaux and crystal B(∞) for finite simple Lie algebras.
J. Alg. 320(10), pp.3680–3693, (2008).
https://doi.org/10.1016/j.jalgebra.2008.06.008
-
Jin Hong, Kyung Chul Jeong, Eun Young Kwon, In-Sok Lee, Daegun Ma.
Variants of the distinguished point method for cryptanalytic time memory trade-offs.
ISPEC 2008, LNCS 4991, pp.131–145, Springer, (2008).
https://doi.org/10.1007/978-3-540-79104-1_10
(IACR ePrint)
-
Jin Hong, Woo-Hwan Kim.
TMD-tradeoff and state entropy loss considerations of streamcipher MICKEY.
INDOCRYPT 2005, LNCS 3797, pp.169–182, Springer, (2005).
https://doi.org/10.1007/11596219_14
(IACR ePrint)
-
Jin Hong.
Period of streamcipher Edon80.
INDOCRYPT 2005, LNCS 3797, pp.23–34, Springer, (2005).
https://doi.org/10.1007/11596219_3
(Author Copy)
-
Jin Hong, Palash Sarkar.
New applications of time memory data tradeoffs.
ASIACRYPT 2005, LNCS 3788, pp.353–372, Springer, (2005).
https://doi.org/10.1007/11593447_19
-
Jin Hong, Dong Hoon Lee, Yongjin Yeom, Daewan Han.
A new class of single cycle T-functions.
FSE 2005, LNCS 3557, pp.68–82, Springer, (2005).
https://doi.org/10.1007/11502760_5
-
Jin Hong, Dong Hoon Lee, Seongtaek Chee, Palash Sarkar.
Vulnerability of nonlinear filter generators based on linear finite state machines.
FSE 2004, LNCS 3017, pp.193–209, Springer, (2004).
https://doi.org/10.1007/978-3-540-25937-4_13
-
Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, Dukjae Moon.
Algebraic attacks on summation generators.
FSE 2004, LNCS 3017, pp.34–48, Springer, (2004).
https://doi.org/10.1007/978-3-540-25937-4_3
-
Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong.
New block cipher: ARIA.
ICISC 2003, LNCS 2971, pp.432–445, Springer, (2004).
https://doi.org/10.1007/978-3-540-24691-6_32
(Author Copy)
-
Jin Hong, Seok-Jin Kang, Hyeonmi Lee.
Young wall realization of crystal graphs for Uq(Cn(1)).
Commun. Math. Phy. 244(1), pp.111–131, (2004).
https://doi.org/10.1007/s00220-003-0966-6
(SN SharedIt)
-
Boris Feigin, Jin Hong, Tetsuji Miwa.
A construction of level 1 irreducible modules for Uq(\hat{sp}4) using level 2 intertwiners for Uq(\hat{sl}2).
Moscow Math. J. 3(4), pp.1247–1267, (2003).
http://www.ams.org/distribution/mmj/vol3-4-2003/feigin-etal.pdf
-
Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon.
Key recovery attacks on NTRU without ciphertext validation routine.
ACISP 2003, LNCS 2727, pp.274–284, Springer, (2003).
https://doi.org/10.1007/3-540-45067-X_24
(IACR ePrint)
-
Jin Hong, Seok-Jin Kang.
Crystal graphs for basic representations of the quantum affine algebra Uq(C2(1)).
In Representations and Quantizations: Proceedings of the International Conference on Representation Theory, July 1998, Shanghai, pp.213–227, China High. Educ. Press, Beijing, (2000).
(arXiv)
-
Jin Hong.
Center and universal R-matrix for quantized Borcherds superalgebras.
J. Math. Phys. 40(6), pp.3123–3145, (1999).
https://doi.org/10.1063/1.532750
(arXiv)
-
Jin Hong, Seok-Jin Kang, Tetsuji Miwa, Robert Weston.
Vertex models with alternating spins.
Asian J. Math. 2(4), pp.711–757, (1998).
https://doi.org/10.4310/AJM.1998.v2.n4.a6
-
Jin Hong, Seok-Jin Kang, Tetsuji Miwa, Robert Weston.
Mixing of ground states in vertex models.
J. Phys. A 31, pp.L515–L525, (1998).
https://doi.org/10.1088/0305-4470/31/28/001
(arXiv)
-
Myung-Hoon Chung, Jin Hong, Jae-Hoon Kwon.
Symmetries of the Yoshioka-Halperin-Lee Hamiltonian for the fractional quantum Hall effect.
Phys. Rev. B 55(4), pp.2249–2273, (1997).
https://doi.org/10.1103/PhysRevB.55.2249
-
Jin Hong, Kyeonghoon Jeong, Jae-Hoon Kwon.
Integral points on hyperbolas.
J. Korean Math. Soc. 34(1), pp.149–157, (1997).
http://jkms.kms.or.kr/journal/view.html?uid=1208
-
Jin Hong, Jae-Hoon Kwon.
Decomposition of free Lie algebras into irreducible components.
J. Alg. 197(1), pp.127–145, (1997).
https://doi.org/10.1006/jabr.1997.7110
(Erratum)
Book
-
Jin Hong, Seok-Jin Kang.
Introduction to Quantum Groups and Crystal Bases.
Graduate Studies in Mathematics 42, Amer. Math. Soc., (2002).
https://doi.org/10.1090/gsm/042
Patents
-
지피유를 이용한 레인보우 방법 고속 구현 시스템 및 그 방법.
대한민국 특허
등록번호: 10-1472493-0000 (2014.12.08)
출원번호: 10-2012-0064409 (2012.06.15)
발명자: 김성렬, 박근수, 김정우, 서정주, 홍진
출원인: 건국대학교 산학협력단, 서울대학교산학협력단
(KiPRIS)
-
Method and apparatus for solving discrete logarithm problem using pre-computation table.
United States Patent
Publication Number: US 9,077,536 (July 7, 2015)
Application Number: US 13/358,674 (January 26, 2012)
Inventors: Jung Hee Cheon, Hyung Tae Lee, Jin Hong
Assignee: SAMSUNG SDS CO., LTD., SNU R&DB FOUNDATION
(USPTO)
-
사전계산 테이블을 이용한 이산대수 계산 방법 및 그 장치.
대한민국 특허
등록번호: 10-1166129-0000 (2012.07.10)
출원번호: 10-2011-0052389 (2011.05.31)
발명자: 이형태, 천정희, 홍진
출원인: 서울대학교산학협력단, 삼성에스디에스 주식회사
(KiPRIS)