The SCEAS System
Navigation Menu

Search the dblp DataBase


Dowon Hong: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ju-Sung Kang, Okyeon Yi, Dowon Hong, Hyunsook Cho
    Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:60-73 [Conf]
  2. Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong
    The Related-Key Rectangle Attack - Application to SHACAL-1. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:123-136 [Conf]
  3. Ju-Sung Kang, Sang Uk Shin, Dowon Hong, Okyeon Yi
    Provable Security of KASUMI and 3GPP Encryption Mode f8. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:255-271 [Conf]
  4. Dowon Hong, Ku-Young Chang, Heuisu Ryu
    Efficient Oblivious Transfer in the Bounded-Storage Model. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:143-159 [Conf]
  5. Mun-Kyu Lee, Dowon Hong
    An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity Module. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2004, pp:408-413 [Conf]
  6. Dowon Hong, Ju-Sung Kang, Bart Preneel, Heuisu Ryu
    A Concrete Security Analysis for 3GPP-MAC. [Citation Graph (0, 0)][DBLP]
    FSE, 2003, pp:154-169 [Conf]
  7. Mun-Kyu Lee, Howon Kim, Dowon Hong, Kyoil Chung
    Efficient Exponentiation in GF(pm) Using the Frobenius Map. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:584-593 [Conf]
  8. Ku-Young Chang, Ju-Sung Kang, Mun-Kyu Lee, Hangrok Lee, Dowon Hong
    New Variant of the Self-Shrinking Generator and Its Cryptographic Properties. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:41-50 [Conf]
  9. Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong
    Padding Oracle Attacks on Multiple Modes of Operation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:343-351 [Conf]
  10. Jin Wook Byun, Su-Mi Lee, Dong Hoon Lee, Dowon Hong
    Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:3-17 [Conf]
  11. Tae-Jun Park, Mun-Kyu Lee, Dowon Hong, Kyoil Chung
    A DPA Countermeasure by Randomized Frobenius Decomposition. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:271-282 [Conf]
  12. Ku-Young Chang, Dowon Hong, Hyun-Sook Cho
    Low Complexity Bit-Parallel Multiplier for GF(2^m) Defined by All-One Polynomials Using Redundant Representation. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2005, v:54, n:12, pp:1628-1630 [Journal]
  13. Sun-Mi Park, Ku-Young Chang, Dowon Hong
    Efficient Bit-Parallel Multiplier for Irreducible Pentanomials Using a Shifted Polynomial Basis. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2006, v:55, n:9, pp:1211-1215 [Journal]
  14. Mun-Kyu Lee, Dowon Hong, Dong Kyue Kim
    Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:427-434 [Conf]

  15. Improving Performance in Digital Forensics: A Case Using Pattern Matching Board. [Citation Graph (, )][DBLP]

  16. Forensic Data Acquisition from Cell Phones using JTAG Interface. [Citation Graph (, )][DBLP]

  17. Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network. [Citation Graph (, )][DBLP]

  18. Data Randomization for Lightweight Secure Data Aggregation in Sensor Network. [Citation Graph (, )][DBLP]

  19. A New Anti-Forensic Tool Based on a Simple Data Encryption Scheme. [Citation Graph (, )][DBLP]

  20. A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network. [Citation Graph (, )][DBLP]

  21. Privacy in Location Based Services: Primitives Toward the Solution. [Citation Graph (, )][DBLP]

  22. Constructing PEKS schemes secure against keyword guessing attacks is possible? [Citation Graph (, )][DBLP]

  23. Privacy Preserving Association Rule Mining Revisited [Citation Graph (, )][DBLP]

  24. Privacy in Location Based Services: Primitives Toward the Solution [Citation Graph (, )][DBLP]

  25. Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering [Citation Graph (, )][DBLP]

  26. Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering [Citation Graph (, )][DBLP]

Search in 0.021secs, Finished in 0.023secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002