2009 |
21 | EE | Abedelaziz Mohaisen,
Dowon Hong,
DaeHun Nyang:
Privacy in Location Based Services: Primitives Toward the Solution
CoRR abs/0903.2682: (2009) |
20 | EE | Ik Rae Jeong,
Jeong Ok Kwon,
Dowon Hong,
Dong Hoon Lee:
Constructing PEKS schemes secure against keyword guessing attacks is possible?
Computer Communications 32(2): 394-396 (2009) |
2008 |
19 | | Keonwoo Kim,
Dowon Hong,
Jae-Cheol Ryu:
Forensic Data Acquisition from Cell Phones using JTAG Interface.
Security and Management 2008: 410-414 |
18 | EE | Abedelaziz Mohaisen,
Ik Rae Jeong,
Dowon Hong,
Nam-Su Jho,
DaeHun Nyang:
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network.
UIC 2008: 338-351 |
17 | EE | Abedelaziz Mohaisen,
YoungJae Maeng,
Joenil Kang,
DaeHun Nyang,
KyungHee Lee,
Dowon Hong,
JongWook Han:
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network.
UIC 2008: 548-562 |
16 | EE | Abedelaziz Mohaisen,
Dowon Hong:
Privacy Preserving Association Rule Mining Revisited
CoRR abs/0808.3166: (2008) |
2007 |
15 | EE | Sang Su Lee,
Ku-Young Chang,
Deokgyu Lee,
Dowon Hong:
A New Anti-Forensic Tool Based on a Simple Data Encryption Scheme.
FGCN (2) 2007: 114-118 |
2006 |
14 | EE | Mun-Kyu Lee,
Dowon Hong,
Dong Kyue Kim:
Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme.
CIS 2006: 427-434 |
13 | EE | Mun-Kyu Lee,
Howon Kim,
Dowon Hong,
Kyoil Chung:
Efficient Exponentiation in GF(pm) Using the Frobenius Map.
ICCSA (4) 2006: 584-593 |
12 | EE | Ku-Young Chang,
Ju-Sung Kang,
Mun-Kyu Lee,
Hangrok Lee,
Dowon Hong:
New Variant of the Self-Shrinking Generator and Its Cryptographic Properties.
ICISC 2006: 41-50 |
11 | EE | Jin Wook Byun,
Su-Mi Lee,
Dong Hoon Lee,
Dowon Hong:
Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks.
SPC 2006: 3-17 |
10 | EE | Sun-Mi Park,
Ku-Young Chang,
Dowon Hong:
Efficient Bit-Parallel Multiplier for Irreducible Pentanomials Using a Shifted Polynomial Basis.
IEEE Trans. Computers 55(9): 1211-1215 (2006) |
2005 |
9 | EE | Tae-Jun Park,
Mun-Kyu Lee,
Dowon Hong,
Kyoil Chung:
A DPA Countermeasure by Randomized Frobenius Decomposition.
WISA 2005: 271-282 |
8 | EE | Ku-Young Chang,
Dowon Hong,
Hyun-Sook Cho:
Low Complexity Bit-Parallel Multiplier for GF(2^m) Defined by All-One Polynomials Using Redundant Representation.
IEEE Trans. Computers 54(12): 1628-1630 (2005) |
2004 |
7 | EE | Jongsung Kim,
Guil Kim,
Seokhie Hong,
Sangjin Lee,
Dowon Hong:
The Related-Key Rectangle Attack - Application to SHACAL-1.
ACISP 2004: 123-136 |
6 | EE | Taekeon Lee,
Jongsung Kim,
Changhoon Lee,
Jaechul Sung,
Sangjin Lee,
Dowon Hong:
Padding Oracle Attacks on Multiple Modes of Operation.
ICISC 2004: 343-351 |
5 | | Mun-Kyu Lee,
Dowon Hong:
An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity Module.
Security and Management 2004: 408-413 |
2003 |
4 | EE | Dowon Hong,
Ju-Sung Kang,
Bart Preneel,
Heuisu Ryu:
A Concrete Security Analysis for 3GPP-MAC.
FSE 2003: 154-169 |
2002 |
3 | EE | Dowon Hong,
Ku-Young Chang,
Heuisu Ryu:
Efficient Oblivious Transfer in the Bounded-Storage Model.
ASIACRYPT 2002: 143-159 |
2001 |
2 | EE | Ju-Sung Kang,
Okyeon Yi,
Dowon Hong,
Hyun-Sook Cho:
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI.
ACISP 2001: 60-73 |
1 | EE | Ju-Sung Kang,
Sang Uk Shin,
Dowon Hong,
Okyeon Yi:
Provable Security of KASUMI and 3GPP Encryption Mode f8.
ASIACRYPT 2001: 255-271 |