| HIGHT: A new block cipher suitable for low-resource device D Hong, J Sung, S Hong, J Lim, S Lee, BS Koo, C Lee, D Chang, J Lee, ... International workshop on cryptographic hardware and embedded systems, 46-59, 2006 | 1087 | 2006 |
| Status report on the final round of the NIST lightweight cryptography standardization process MS Turan, MS Turan, K McKay, D Chang, LE Bassham, J Kang, ... US Department of Commerce, National Institute of Standards and Technology 4, 06, 2023 | 153* | 2023 |
| Differential Cryptanalysis of TEA and XTEA S Hong, D Hong, Y Ko, D Chang, W Lee, S Lee International Conference on Information Security and Cryptology, 402-417, 2003 | 111 | 2003 |
| Improved indifferentiability security analysis of chopMD hash function D Chang, M Nandi International Workshop on Fast Software Encryption, 429-443, 2008 | 85 | 2008 |
| Status report on the second round of the NIST lightweight cryptography standardization process MS Turan, MS Turan, K McKay, D Chang, C Calik, L Bassham, J Kang, ... US Department of Commerce, National Institute of Standards and Technology, 2021 | 84 | 2021 |
| Indifferentiable security analysis of popular hash functions with prefix-free padding D Chang, S Lee, M Nandi, M Yung International Conference on the Theory and Application of Cryptology and …, 2006 | 82 | 2006 |
| Cancelable multi-biometric approach using fuzzy extractor and novel bit-wise encryption D Chang, S Garg, M Hasan, S Mishra IEEE Transactions on Information Forensics and Security 15, 3152-3167, 2020 | 71 | 2020 |
| A new dedicated 256-bit hash function: FORK-256 D Hong, D Chang, J Sung, S Lee, S Hong, J Lee, D Moon, S Chee International Workshop on Fast Software Encryption, 195-209, 2006 | 59 | 2006 |
| A short proof of the PRP/PRF switching lemma D Chang, M Nandi Cryptology ePrint Archive, 2008 | 47 | 2008 |
| A survey on lightweight authenticated encryption and challenges for securing industrial IoT M Agrawal, J Zhou, D Chang Security and privacy trends in the industrial internet of things, 71-94, 2019 | 45 | 2019 |
| RC4-Hash: A new hash function based on RC4 D Chang, KC Gupta, M Nandi International Conference on Cryptology in India, 80-94, 2006 | 45 | 2006 |
| Generation of secure and reliable honeywords, preventing false detection D Chang, A Goel, S Mishra, SK Sanadhya IEEE Transactions on Dependable and Secure Computing 16 (5), 757-769, 2018 | 40 | 2018 |
| FbHash: A new similarity hashing scheme for digital forensics D Chang, M Ghosh, SK Sanadhya, M Singh, DR White Digital Investigation 29, S113-S123, 2019 | 38 | 2019 |
| A keyed sponge construction with pseudorandomness in the standard model D Chang, M Dworkin, S Hong, J Kelsey, M Nandi The Third SHA-3 Candidate Conference (March 2012) 3, 7, 2012 | 38 | 2012 |
| Threshold Implementations of : A Trade-Off Analysis A Jati, N Gupta, A Chattopadhyay, SK Sanadhya, D Chang IEEE Transactions on Information Forensics and Security 15, 2110-2120, 2019 | 37 | 2019 |
| BIOFUSE: A framework for multi-biometric fusion on biocryptosystem level D Chang, S Garg, M Ghosh, M Hasan Information Sciences 546, 481-511, 2021 | 36 | 2021 |
| Ascon-Based Lightweight Cryptography Standards for Constrained Devices MS Turan, KA McKay, D Chang, J Kang, J Kelsey NIST SP 800 232, 1-41, 2025 | 35 | 2025 |
| Multi-lane detection using instance segmentation and attentive voting D Chang, V Chirakkal, S Goswami, M Hasan, T Jung, J Kang, SC Kee, ... 2019 19th International conference on control, automation and systems (ICCAS …, 2019 | 34 | 2019 |
| Release of unverified plaintext: Tight unified model and application to ANYDAE D Chang, N Datta, A Dutta, B Mennink, M Nandi, S Sanadhya, F Sibleyras IACR Transactions on Symmetric Cryptology 2019 (4), 119-146, 2019 | 33 | 2019 |
| Bicliques with minimal data and time complexity for AES A Bogdanov, D Chang, M Ghosh, SK Sanadhya International Conference on Information Security and Cryptology, 160-174, 2014 | 31 | 2014 |