HIGHT: A new block cipher suitable for low-resource device D Hong, J Sung, S Hong, J Lim, S Lee, BS Koo, C Lee, D Chang, J Lee, ... Cryptographic Hardware and Embedded Systems-CHES 2006: 8th International …, 2006 | 913 | 2006 |
Differential Cryptanalysis of TEA and XTEA S Hong, D Hong, Y Ko, D Chang, W Lee, S Lee Information Security and Cryptology-ICISC 2003: 6th International Conference …, 2004 | 120 | 2004 |
Improved indifferentiability security analysis of chopMD hash function D Chang, M Nandi Lecture Notes in Computer Science 5086, 429-443, 2008 | 75 | 2008 |
Indifferentiable security analysis of popular hash functions with prefix-free padding D Chang, S Lee, M Nandi, M Yung Advances in Cryptology–ASIACRYPT 2006: 12th International Conference on the …, 2006 | 75 | 2006 |
A new dedicated 256-bit hash function: FORK-256 D Hong, D Chang, J Sung, S Lee, S Hong, J Lee, D Moon, S Chee Fast Software Encryption: 13th International Workshop, FSE 2006, Graz …, 2006 | 55 | 2006 |
RC4-Hash: A new hash function based on RC4 D Chang, KC Gupta, M Nandi INDOCRYPT 4329, 80-94, 2006 | 42 | 2006 |
Status report on the first round of the NIST lightweight cryptography standardization process MS Turan, KA McKay, Ç Çalik, D Chang, L Bassham National Institute of Standards and Technology, Gaithersburg, MD, NIST …, 2019 | 39 | 2019 |
A short proof of the PRP/PRF switching lemma D Chang, M Nandi Cryptology ePrint Archive, 2008 | 33 | 2008 |
Cancelable multi-biometric approach using fuzzy extractor and novel bit-wise encryption D Chang, S Garg, M Hasan, S Mishra IEEE Transactions on Information Forensics and Security 15, 3152-3167, 2020 | 32 | 2020 |
A keyed sponge construction with pseudorandomness in the standard model D Chang, M Dworkin, S Hong, J Kelsey, M Nandi The Third SHA-3 Candidate Conference (March 2012) 3, 7, 2012 | 31 | 2012 |
Status report on the second round of the NIST lightweight cryptography standardization process MS Turan, K McKay, D Chang, C Calik, L Bassham, J Kang, J Kelsey National Institute of Standards and Technology Internal Report 8369 (10.6028), 2021 | 25 | 2021 |
FbHash: A new similarity hashing scheme for digital forensics D Chang, M Ghosh, SK Sanadhya, M Singh, DR White Digital Investigation 29, S113-S123, 2019 | 24 | 2019 |
Bicliques with minimal data and time complexity for AES A Bogdanov, D Chang, M Ghosh, SK Sanadhya Information Security and Cryptology-ICISC 2014: 17th International …, 2015 | 24 | 2015 |
Finding collision on 45-step HAS-160 A Yun, SH Sung, S Park, D Chang, S Hong, HS Cho Information Security and Cryptology-ICISC 2005: 8th International Conference …, 2006 | 23 | 2006 |
Privacy-preserving indexing of iris-codes with cancelable bloom filter-based search structures P Drozdowski, S Garg, C Rathgeb, M Gomez-Barrcro, D Chang, C Busch 2018 26th European Signal Processing Conference (EUSIPCO), 2360-2364, 2018 | 22 | 2018 |
A survey on lightweight authenticated encryption and challenges for securing industrial IoT M Agrawal, J Zhou, D Chang Security and Privacy Trends in the Industrial Internet of Things, 71-94, 2019 | 21 | 2019 |
Indifferentiability of the hash algorithm BLAKE D Chang, M Nandi, M Yung Cryptology ePrint Archive, 2011 | 21 | 2011 |
Status report on the second round of the SHA-3 cryptographic hash algorithm competition MS Turan, R Perlner, LE Bassham, W Burr, D Chang, S jen Chang, ... NIST Interagency Report 7764, 2011 | 20 | 2011 |
New parallel domain extenders for UOWHF W Lee, D Chang, S Lee, S Sung, M Nandi Advances in Cryptology-ASIACRYPT 2003: 9th International Conference on the …, 2003 | 20 | 2003 |
Threshold implementations of GIFT: A trade-off analysis N Gupta, A Jati, SK Sanadhya, A Chattopadhyay, D Chang | 19 | 2021 |