default search action
Dowon Hong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j47]Juyoung Kim, Sooyong Jeong, Dowon Hong, Nam-Su Jho:
Improvement of the Efficiency of Neural Cryptography-Based Secret Key Exchange Algorithm. IEEE Access 11: 45323-45333 (2023) - [j46]Cheolhee Park, Jonghoon Lee, Youngsoo Kim, Jong-Geun Park, Hyunjin Kim, Dowon Hong:
An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks. IEEE Internet Things J. 10(3): 2330-2345 (2023) - 2022
- [j45]Cheolhee Park, Dowon Hong, Changho Seo:
Evaluating differentially private decision tree model over model inversion attack. Int. J. Inf. Sec. 21(3): 1-14 (2022) - 2021
- [j44]Cheolhee Park, Youngsoo Kim, Jong-Geun Park, Dowon Hong, Changho Seo:
Evaluating Differentially Private Generative Adversarial Networks Over Membership Inference Attack. IEEE Access 9: 167412-167425 (2021) - [j43]Sooyong Jeong, Cheolhee Park, Dowon Hong, Changho Seo, Nam-Su Jho:
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems. Secur. Commun. Networks 2021: 6680782:1-6680782:12 (2021) - 2020
- [j42]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Space Efficient $GF(2^m)$ Multiplier for Special Pentanomials Based on $n$ -Term Karatsuba Algorithm. IEEE Access 8: 27342-27360 (2020) - [j41]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Efficient Bit-Parallel Multiplier for All Trinomials Based on n-Term Karatsuba Algorithm. IEEE Access 8: 173491-173507 (2020)
2010 – 2019
- 2019
- [j40]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Low Space Complexity $GF(2^m)$ Multiplier for Trinomials Using $n$ -Term Karatsuba Algorithm. IEEE Access 7: 27047-27064 (2019) - [j39]Cheolhee Park, Dowon Hong, Changho Seo:
An Attack-Based Evaluation Method for Differentially Private Learning Against Model Inversion Attack. IEEE Access 7: 124988-124999 (2019) - 2018
- [j38]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Efficient Three-Way Split Formulas for Binary Polynomial Multiplication and Toeplitz Matrix Vector Product. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 239-248 (2018) - [j37]Ku-Young Chang, Sun-Mi Park, Dowon Hong, Changho Seo:
Efficient multiplier based on hybrid approach for Toeplitz matrix-vector product. Inf. Process. Lett. 131: 33-38 (2018) - [j36]Cheolhee Park, Hyunil Kim, Dowon Hong, Changho Seo:
A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments. Secur. Commun. Networks 2018: 2193897:1-2193897:16 (2018) - [j35]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Subquadratic Space Complexity Multiplier Using Even Type GNB Based on Efficient Toeplitz Matrix-Vector Product. IEEE Trans. Computers 67(12): 1794-1805 (2018) - 2017
- [j34]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
New Block Recombination for Subquadratic Space Complexity Polynomial Multiplication Based on Overlap-Free Approach. IEEE Trans. Computers 66(8): 1396-1406 (2017) - 2016
- [j33]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Efficient Multiplication Based on Dickson Bases over Any Finite Fields. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(11): 2060-2074 (2016) - [j32]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Explicit formulae for Mastrovito matrix and its corresponding Toeplitz matrix for all irreducible pentanomials using shifted polynomial basis. Integr. 53: 27-38 (2016) - [j31]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Comments on "Multiway Splitting Method for Toeplitz Matrix Vector Product". IEEE Trans. Computers 65(1): 332-333 (2016) - [j30]Nam-Su Jho, Ku-Young Chang, Dowon Hong, Changho Seo:
Symmetric searchable encryption with efficient range query using multi-layered linked chains. J. Supercomput. 72(11): 4233-4246 (2016) - 2015
- [j29]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Generalization to Any Field of Toeplitz Matrix Vector Product Based on Multi-Way Splitting Method and Its Application. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 378-383 (2015) - [j28]Nam-Su Jho, Ku-Young Chang, Dowon Hong:
Efficient Construction of Order-Preserving Encryption Using Pseudo Random Function. IEICE Trans. Commun. 98-B(7): 1276-1283 (2015) - [j27]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Low Complexity Multiplier Based on Dickson Basis Using Efficient Toeplitz Matrix-Vector Product. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(11): 2283-2290 (2015) - 2014
- [j26]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Bit-Parallel Cubing Computation over GF(3m) for Irreducible Trinomials. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 347-353 (2014) - [j25]Taek-Young Youn, Dowon Hong:
Authenticated Distance Bounding Protocol with Improved FAR: Beyond the Minimal Bound of FAR. IEICE Trans. Commun. 97-B(5): 930-935 (2014) - [j24]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
New efficient bit-parallel polynomial basis multiplier for special pentanomials. Integr. 47(1): 130-139 (2014) - [j23]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Comments on "On the Polynomial Multiplication in Chebyshev Form". IEEE Trans. Computers 63(12): 3162-3163 (2014) - [c24]Taek-Young Youn, Nam-Su Jho, Ku-Young Chang, Dowon Hong:
Bucket Index Ordering Problem in Range Queries. FCC 2014: 347-355 - 2013
- [j22]Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo:
Fast Bit-Parallel Polynomial Basis Multiplier for GF(2m) Defined by Pentanomials Using Weakly Dual Basis. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 322-331 (2013) - [j21]Sun-Mi Park, Ku-Young Chang, Dowon Hong:
Parallel GF(3m) multiplier for trinomials. Inf. Process. Lett. 113(4): 111-115 (2013) - [j20]Ji Young Chun, Dowon Hong, Ik Rae Jeong, Dong Hoon Lee:
Privacy-preserving disjunctive normal form operations on distributed sets. Inf. Sci. 231: 113-122 (2013) - [j19]Nam-Su Jho, Dowon Hong:
Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search. KSII Trans. Internet Inf. Syst. 7(5): 1328-1342 (2013) - [j18]Kee Sung Kim, Dowon Hong, Ik Rae Jeong:
Identity-based proxy signature from lattices. J. Commun. Networks 15(1): 1-7 (2013) - 2012
- [j17]Taek-Young Youn, Dowon Hong:
Signcryption with fast online signing and short signcryptext for secure and private mobile communication. Sci. China Inf. Sci. 55(11): 2530-2541 (2012) - [j16]Geontae Noh, Dowon Hong, Jeong Ok Kwon, Ik Rae Jeong:
A Strong Binding Encryption Scheme from Lattices for Secret Broadcast. IEEE Commun. Lett. 16(6): 781-784 (2012) - [j15]Ji Young Chun, Dowon Hong, Dong Hoon Lee, Ik Rae Jeong:
Scalable Privacy-Preserving t-Repetition Protocol with Distributed Medical Data. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(12): 2451-2460 (2012) - 2011
- [j14]Abedelaziz Mohaisen, Ku-Young Chang, Dowon Hong:
Attacks and Countermeasures for RFID Mutual Authentication Scheme in Pervasive Computing Environmen. KSII Trans. Internet Inf. Syst. 5(9): 1684-1697 (2011) - [j13]Woo-Yong Choi, Yongwha Chung, Jin-Won Park, Dowon Hong:
Fingerprint Template Protection Using One-Time Fuzzy Vault. KSII Trans. Internet Inf. Syst. 5(11): 2221-2234 (2011) - [j12]Keonwoo Kim, Sang Su Lee, Dowon Hong, Jae-Cheol Ryou:
GPU-Accelerated Password Cracking of PDF Files. KSII Trans. Internet Inf. Syst. 5(11): 2235-2253 (2011) - [c23]Ju-Sung Kang, Dowon Hong:
On Fast Private Scalar Product Protocols. FGIT-SecTech 2011: 1-10 - 2010
- [j11]Dowon Hong, Je Yoon Kim, Sang-Uk Shin:
Authentication mechanism for fast handoff in cdma2000-WiBro interworking. Sci. China Inf. Sci. 53(1): 137-146 (2010) - [j10]Abedelaziz Mohaisen, Nam-Su Jho, Dowon Hong, DaeHun Nyang:
Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency. IEICE Trans. Inf. Syst. 93-D(2): 315-325 (2010) - [i6]Dowon Hong, Abedelaziz Mohaisen:
Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering. CoRR abs/1006.1948 (2010)
2000 – 2009
- 2009
- [j9]Ik Rae Jeong, Jeong Ok Kwon, Dowon Hong, Dong Hoon Lee:
Constructing PEKS schemes secure against keyword guessing attacks is possible? Comput. Commun. 32(2): 394-396 (2009) - [j8]Ik Rae Jeong, Jeong Ok Kwon, Dowon Hong, Dong Hoon Lee:
Searchable Encryption with Keyword-Recoverability. IEICE Trans. Inf. Syst. 92-D(5): 1200-1203 (2009) - [j7]Abedelaziz Mohaisen, DaeHun Nyang, YoungJae Maeng, KyungHee Lee, Dowon Hong:
Grid-Based Key Pre-Distribution in Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 3(2): 195-208 (2009) - [j6]Abedelaziz Mohaisen, Jeong Woon Choi, Dowon Hong:
On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 3(4): 376-384 (2009) - [c22]Jooyoung Lee, Sungkyung Un, Dowon Hong:
Improving Performance in Digital Forensics: A Case Using Pattern Matching Board. ARES 2009: 1001-1005 - [c21]Abedelaziz Mohaisen, Nam-Su Jho, Dowon Hong:
A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network. ISA 2009: 190-199 - [i5]Abedelaziz Mohaisen, Dowon Hong, DaeHun Nyang:
Privacy in Location Based Services: Primitives Toward the Solution. CoRR abs/0903.2682 (2009) - [i4]Abedelaziz Mohaisen, Dowon Hong:
Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering. CoRR abs/0906.0202 (2009) - 2008
- [j5]Jooyoung Lee, Sung-Kyong Un, Dowon Hong:
High-speed search using Tarari content processor in digital forensics. Digit. Investig. 5(Supplement): S91-S95 (2008) - [c20]Keonwoo Kim, Dowon Hong, Jae-Cheol Ryou:
Forensic Data Acquisition from Cell Phones using JTAG Interface. Security and Management 2008: 410-414 - [c19]Keonwoo Kim, Dowon Hong, Kyoil Chung:
Forensics for Korean cell phone. e-Forensics 2008: 30 - [c18]Hyungkeun Jee, Jooyoung Lee, Dowon Hong:
High speed search for large-scale digital forensic investigation. e-Forensics 2008: 31 - [c17]Young-Soo Kim, Sang-Su Lee, Dowon Hong:
Suspects' data hiding at remaining registry values of uninstalled programs. e-Forensics 2008: 32 - [c16]Abedelaziz Mohaisen, Dowon Hong, DaeHun Nyang:
Privacy in Location Based Services: Primitives Toward the Solution. NCM (1) 2008: 572-579 - [c15]Abedelaziz Mohaisen, Ik Rae Jeong, Dowon Hong, Nam-Su Jho, DaeHun Nyang:
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network. UIC 2008: 338-351 - [c14]Abedelaziz Mohaisen, YoungJae Maeng, Jeonil Kang, DaeHun Nyang, KyungHee Lee, Dowon Hong, Jong Wook Han:
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network. UIC 2008: 548-562 - [i3]Abedelaziz Mohaisen, Dowon Hong:
Privacy Preserving Association Rule Mining Revisited. CoRR abs/0808.3166 (2008) - 2007
- [j4]Ju-Sung Kang, Dowon Hong:
A Practical Privacy-Preserving Cooperative Computation Protocol without Oblivious Transfer for Linear Systems of Equations. J. Inf. Process. Syst. 3(1): 21-25 (2007) - [c13]Sang Su Lee, Ku-Young Chang, Deokgyu Lee, Dowon Hong:
A New Anti-Forensic Tool Based on a Simple Data Encryption Scheme. FGCN (2) 2007: 114-118 - [i2]Nam-Su Jho, Myung-Hwan Kim, Dowon Hong, Byung-Gil Lee:
Multiparty Key Agreement Using Bilinear Map. IACR Cryptol. ePrint Arch. 2007: 439 (2007) - 2006
- [j3]Sun-Mi Park, Ku-Young Chang, Dowon Hong:
Efficient Bit-Parallel Multiplier for Irreducible Pentanomials Using a Shifted Polynomial Basis. IEEE Trans. Computers 55(9): 1211-1215 (2006) - [c12]Mun-Kyu Lee, Dowon Hong, Dong Kyue Kim:
Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme. CIS 2006: 427-434 - [c11]Mun-Kyu Lee, Howon Kim, Dowon Hong, Kyoil Chung:
Efficient Exponentiation in GF(pm) Using the Frobenius Map. ICCSA (4) 2006: 584-593 - [c10]Ku-Young Chang, Ju-Sung Kang, Mun-Kyu Lee, Hangrok Lee, Dowon Hong:
New Variant of the Self-Shrinking Generator and Its Cryptographic Properties. ICISC 2006: 41-50 - [c9]Jin Wook Byun, Su-Mi Lee, Dong Hoon Lee, Dowon Hong:
Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks. SPC 2006: 3-17 - [i1]Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon, Dowon Hong:
Analysis of Privacy-Preserving Element Reduction of Multiset. IACR Cryptol. ePrint Arch. 2006: 418 (2006) - 2005
- [j2]Dowon Hong, Ju-Sung Kang:
An efficient key distribution scheme with self-healing property. IEEE Commun. Lett. 9(8): 759-761 (2005) - [j1]Ku-Young Chang, Dowon Hong, Hyun Sook Cho:
Low Complexity Bit-Parallel Multiplier for GF(2^m) Defined by All-One Polynomials Using Redundant Representation. IEEE Trans. Computers 54(12): 1628-1630 (2005) - [c8]Tae-Jun Park, Mun-Kyu Lee, Dowon Hong, Kyoil Chung:
A DPA Countermeasure by Randomized Frobenius Decomposition. WISA 2005: 271-282 - 2004
- [c7]Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong:
The Related-Key Rectangle Attack - Application to SHACAL-1. ACISP 2004: 123-136 - [c6]Mun-Kyu Lee, Dowon Hong:
An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity Module. Security and Management 2004: 408-413 - [c5]Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong:
Padding Oracle Attacks on Multiple Modes of Operation. ICISC 2004: 343-351 - 2003
- [c4]Dowon Hong, Ju-Sung Kang, Bart Preneel, Heuisu Ryu:
A Concrete Security Analysis for 3GPP-MAC. FSE 2003: 154-169 - 2002
- [c3]Dowon Hong, Ku-Young Chang, Heuisu Ryu:
Efficient Oblivious Transfer in the Bounded-Storage Model. ASIACRYPT 2002: 143-159 - 2001
- [c2]Ju-Sung Kang, Okyeon Yi, Dowon Hong, Hyun Sook Cho:
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI. ACISP 2001: 60-73 - [c1]Ju-Sung Kang, Sang-Uk Shin, Dowon Hong, Okyeon Yi:
Provable Security of KASUMI and 3GPP Encryption Mode f8. ASIACRYPT 2001: 255-271
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint