default search action
Wonil Lee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai:
A statistical verification method of random permutations for hiding countermeasure against side-channel attacks. J. Inf. Secur. Appl. 84: 103797 (2024) - [c20]Ismaël B. G. Mounime, Wonil Lee, Thibault Marin, Paul K. Han, Yanis Djebra, Samira V. Eslahi, Pietro Gori, Elsa Angelini, Georges El Fakhri, Chao Ma:
Sparsity Constrained Linear Tangent Space Alignment Model (LTSA) for 3d Cardiac Extracellular Volume Mapping. ISBI 2024: 1-5 - [i8]Jong-Yeon Park, Wonil Lee, Bo Gyeong Kang, Il-jong Song, Jaekeun Oh, Kouichi Sakurai:
A Compact and Parallel Swap-Based Shuffler based on butterfly Network and its complexity against Side Channel Analysis. IACR Cryptol. ePrint Arch. 2024: 1217 (2024) - 2023
- [i7]Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai:
A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks. CoRR abs/2311.08625 (2023) - [i6]Jong-Yeon Park, Jang-Won Ju, Wonil Lee, Bo-Gyeong Kang, Yasuyuki Kachi, Kouichi Sakurai:
A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2023: 1750 (2023) - [i5]Jong-Yeon Park, Dongsoo Lee, Seonggyeom Kim, Wonil Lee, Bo-Gyeong Kang, Kouichi Sakurai:
Fully Parallel, One-Cycle Random Shuffling for Efficient Countermeasure in Post-Quantum Cryptography. IACR Cryptol. ePrint Arch. 2023: 1889 (2023)
2000 – 2009
- 2007
- [c19]Juhee Bae, Christopher Howson, Wonil Lee, Jonathan P. Munson, Young Ju Tak:
Architecture and Performance of a Scalable Telemetry Acquisition and Distribution Infrastructure. IPC 2007: 268-273 - [c18]Juhee Bae, Young Ju Tak, Wonil Lee, Christopher Howson, Jonathan P. Munson:
Poster: Scalable Service-Oriented Telemetry Acquisition and Distribution. MobiQuitous 2007: 1-3 - 2006
- [j3]Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Jaechul Sung, Okyeon Yi:
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. J. Cryptol. 19(4): 441-462 (2006) - [c17]Dukhwan Choi, Seunghwan Ro, Kisung Lee, Wonil Lee, Sukyong Choi, Young Woo Pae:
Telematics Applications Based On TOPAZ Platform. CIT 2006: 262 - [c16]Ji Hyun Kim, Wonil Lee, Jonathan P. Munson, Young Ju Tak:
Services-Oriented Computing in a Ubiquitous Computing Platform. ICSOC 2006: 601-612 - [c15]WooChul Jung, DaeRyung Lee, Wonil Lee, Stella Mitchell, Jonathan P. Munson:
An Event Detection Service for Spatio-temporal Applications. W2GIS 2006: 22-30 - 2005
- [j2]Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 39-48 (2005) - [j1]Wonil Lee, Donghoon Chang, Sangjin Lee, Soo Hak Sung, Mridul Nandi:
Construction of UOWHF: Two New Parallel Methods. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 49-58 (2005) - [c14]Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee:
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model. FSE 2005: 243-254 - 2004
- [c13]Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
Pseudorandomness of SPN-Type Transformations. ACISP 2004: 212-223 - [c12]Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee, Ju-Sung Kang:
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. FSE 2004: 299-316 - [c11]Wonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee:
On the Pseudorandomness of a Modification of KASUMI Type Permutations. ICISC 2004: 313-329 - [c10]Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee, Soo Hak Sung:
Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. INDOCRYPT 2004: 328-342 - [i4]Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model. IACR Cryptol. ePrint Arch. 2004: 69 (2004) - 2003
- [c9]Wonil Lee, Donghoon Chang, Sangjin Lee, Soo Hak Sung, Mridul Nandi:
New Parallel Domain Extenders for UOWHF. ASIACRYPT 2003: 208-227 - [c8]Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee:
Differential Cryptanalysis of TEA and XTEA. ICISC 2003: 402-417 - 2002
- [c7]Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, Seok Won Jung:
Amplified Boomerang Attack against Reduced-Round SHACAL. ASIACRYPT 2002: 243-253 - [c6]Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, Jongin Lim:
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA. FSE 2002: 49-60 - [c5]Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim:
Saturation Attacks on Reduced Round Skipjack. FSE 2002: 100-111 - 2001
- [c4]Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee, Sangjin Lee, Jongin Lim, Okyeon Yi:
Known-IV Attacks on Triple Modes of Operation of Block Ciphers. ASIACRYPT 2001: 208-221 - [c3]Jaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi:
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. ICISC 2001: 103-113
1990 – 1999
- 1998
- [c2]Byeongchang Kim, Wonil Lee, Gary Geunbae Lee, Jong-Hyeok Lee:
Unlimited Vocabulary Grapheme to Phoneme Conversion for Korean TTS. COLING-ACL 1998: 675-679 - [i3]Byeongchang Kim, Wonil Lee, Gary Geunbae Lee, Jong-Hyeok Lee:
Unlimited Vocabulary Grapheme to Phoneme Conversion for Korean TTS. CoRR cmp-lg/9806008 (1998) - 1996
- [i2]Wonil Lee, Geunbae Lee, Jong-Hyeok Lee:
Phonological modeling for continuous speech recognition in Korean. CoRR cmp-lg/9607023 (1996) - 1995
- [i1]Wonil Lee, Geunbae Lee, Jong-Hyeok Lee:
Chart-driven Connectionist Categorial Parsing of Spoken Korean. CoRR abs/cmp-lg/9511005 (1995) - 1994
- [c1]Wonil Lee, Geunbae Lee, Jong-Hyeok Lee:
Table-driven Neural Syntactic Analysis of Spoken Korean. COLING 1994: 911-915
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint