Search the dblp DataBase
Dowon Hong :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Ju-Sung Kang , Okyeon Yi , Dowon Hong , Hyunsook Cho Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:60-73 [Conf ] Jongsung Kim , Guil Kim , Seokhie Hong , Sangjin Lee , Dowon Hong The Related-Key Rectangle Attack - Application to SHACAL-1. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:123-136 [Conf ] Ju-Sung Kang , Sang Uk Shin , Dowon Hong , Okyeon Yi Provable Security of KASUMI and 3GPP Encryption Mode f8. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:255-271 [Conf ] Dowon Hong , Ku-Young Chang , Heuisu Ryu Efficient Oblivious Transfer in the Bounded-Storage Model. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:143-159 [Conf ] Mun-Kyu Lee , Dowon Hong An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity Module. [Citation Graph (0, 0)][DBLP ] Security and Management, 2004, pp:408-413 [Conf ] Dowon Hong , Ju-Sung Kang , Bart Preneel , Heuisu Ryu A Concrete Security Analysis for 3GPP-MAC. [Citation Graph (0, 0)][DBLP ] FSE, 2003, pp:154-169 [Conf ] Mun-Kyu Lee , Howon Kim , Dowon Hong , Kyoil Chung Efficient Exponentiation in GF (p m ) Using the Frobenius Map. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:584-593 [Conf ] Ku-Young Chang , Ju-Sung Kang , Mun-Kyu Lee , Hangrok Lee , Dowon Hong New Variant of the Self-Shrinking Generator and Its Cryptographic Properties. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:41-50 [Conf ] Taekeon Lee , Jongsung Kim , Changhoon Lee , Jaechul Sung , Sangjin Lee , Dowon Hong Padding Oracle Attacks on Multiple Modes of Operation. [Citation Graph (0, 0)][DBLP ] ICISC, 2004, pp:343-351 [Conf ] Jin Wook Byun , Su-Mi Lee , Dong Hoon Lee , Dowon Hong Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] SPC, 2006, pp:3-17 [Conf ] Tae-Jun Park , Mun-Kyu Lee , Dowon Hong , Kyoil Chung A DPA Countermeasure by Randomized Frobenius Decomposition. [Citation Graph (0, 0)][DBLP ] WISA, 2005, pp:271-282 [Conf ] Ku-Young Chang , Dowon Hong , Hyun-Sook Cho Low Complexity Bit-Parallel Multiplier for GF(2^m) Defined by All-One Polynomials Using Redundant Representation. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2005, v:54, n:12, pp:1628-1630 [Journal ] Sun-Mi Park , Ku-Young Chang , Dowon Hong Efficient Bit-Parallel Multiplier for Irreducible Pentanomials Using a Shifted Polynomial Basis. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2006, v:55, n:9, pp:1211-1215 [Journal ] Mun-Kyu Lee , Dowon Hong , Dong Kyue Kim Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:427-434 [Conf ] Improving Performance in Digital Forensics: A Case Using Pattern Matching Board. [Citation Graph (, )][DBLP ] Forensic Data Acquisition from Cell Phones using JTAG Interface. [Citation Graph (, )][DBLP ] Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network. [Citation Graph (, )][DBLP ] Data Randomization for Lightweight Secure Data Aggregation in Sensor Network. [Citation Graph (, )][DBLP ] A New Anti-Forensic Tool Based on a Simple Data Encryption Scheme. [Citation Graph (, )][DBLP ] A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network. [Citation Graph (, )][DBLP ] Privacy in Location Based Services: Primitives Toward the Solution. [Citation Graph (, )][DBLP ] Constructing PEKS schemes secure against keyword guessing attacks is possible? [Citation Graph (, )][DBLP ] Privacy Preserving Association Rule Mining Revisited [Citation Graph (, )][DBLP ] Privacy in Location Based Services: Primitives Toward the Solution [Citation Graph (, )][DBLP ] Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering [Citation Graph (, )][DBLP ] Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.302secs