What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Howon Kim
Google Scholar
39
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/icisc
RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring Techniques.
Rini Wisnu Wardhani
Dedy Septono Catur Putranto
Howon Kim
2024
conf/wisa
ECPM Cryptanalysis Resource Estimation.
Dedy Septono Catur Putranto
Rini Wisnu Wardhani
Jaehan Cho
Howon Kim
2024
conf/wisa
Adversarial Manhole: Challenging Monocular Depth Estimation and Semantic Segmentation Models with Patch Attack.
Naufal Suryanto
Andro Aprila Adiputra
Ahmada Yusril Kadiptya
Yongsu Kim
Howon Kim
2024
conf/wisa
LLM Guardrail Framework: A Novel Approach for Implementing Zero Trust Architecture.
Bogeum Kim
Hyejin Sim
Jiwon Yun
Jaehan Cho
Howon Kim
2023
conf/icisc
Quantum Circuits for High-Degree and Half-Multiplication for Post-quantum Analysis.
Rini Wisnu Wardhani
Dedy Septono Catur Putranto
Howon Kim
2023
conf/wisa
A New Frontier in Digital Security: Verification for NFT Image Using Deep Learning-Based ConvNeXt Model in Quantum Blockchain.
Aji Teguh Prihatno
Naufal Suryanto
Harashta Tatimma Larasati
Yustus Eko Oktian
Thi-Thu-Huong Le
Howon Kim
2023
conf/wisa
Quantum Circuit Designs of Point Doubling Operation for Binary Elliptic Curves.
Harashta Tatimma Larasati
Howon Kim
2023
conf/wisa
Patchman: Firmware Update Delivery Service Over the Blockchain for IoT Environment.
Yustus Eko Oktian
Uk Jo
Simon Oh
Hanho Jeong
Jaehyun Kim
Thi-Thu-Huong Le
Howon Kim
2021
conf/wisa
AnyTRNG: Generic, High-Throughput, Low-Area True Random Number Generator Based on Synchronous Edge Sampling.
Asep Muhamad Awaludin
Derry Pratama
Howon Kim
2021
conf/wisa
Quantum Cryptanalysis Landscape of Shor's Algorithm for Elliptic Curve Discrete Logarithm Problem.
Harashta Tatimma Larasati
Howon Kim
2020
conf/ccsw-ws
ABSTRACT: Together We Can Fool Them: A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization.
Naufal Suryanto
Hyoeun Kang
Yongsu Kim
Youngyeo Yun
Harashta Tatimma Larasati
Howon Kim
2020
conf/wisa
Spatially Localized Perturbation GAN (SLP-GAN) for Generating Invisible Adversarial Patches.
Yongsu Kim
Hyoeun Kang
Afifatul Mukaroh
Naufal Suryanto
Harashta Tatimma Larasati
Howon Kim
2018
conf/wisa
Parallel Implementations of CHAM.
Hwajeong Seo
Kyuhwang An
Hyeokdong Kwon
Taehwan Park
Zhi Hu
Howon Kim
2017
conf/icisc
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors.
Hwajeong Seo
Zhe Liu
Taehwan Park
Hyeokchan Kwon
Sokjoon Lee
Howon Kim
2017
conf/wisa
ARM/NEON Co-design of Multiplication/Squaring.
Hwajeong Seo
Taehwan Park
Janghyun Ji
Zhi Hu
Howon Kim
2017
conf/wisa
Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, Revisited.
Hwajeong Seo
Taehwan Park
Janghyun Ji
Howon Kim
2017
conf/wisa
Parallel Implementations of SIMON and SPECK, Revisited.
Taehwan Park
Hwajeong Seo
Garam Lee
Md. Al-Amin Khandaker
Yasuyuki Nogami
Howon Kim
2016
journals/tifs
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes.
Zhe Liu
Hwajeong Seo
Johann Großschädl
Howon Kim
2016
conf/wisa
Slowloris DoS Countermeasure over WebSocket.
Jongseok Choi
Jong-gyu Park
Shinwook Heo
Namje Park
Howon Kim
2016
conf/wisa
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward.
Hwajeong Seo
Taehwan Park
Shinwook Heo
Gyuwon Seo
Bongjin Bae
Lu Zhou
Howon Kim
2016
conf/wisa
Parallel Implementations of LEA, Revisited.
Hwajeong Seo
Taehwan Park
Shinwook Heo
Gyuwon Seo
Bongjin Bae
Zhi Hu
Lu Zhou
Yasuyuki Nogami
Youwen Zhu
Howon Kim
2015
journals/compsec
Montgomery multiplication and squaring for Optimal Prime Fields.
Hwajeong Seo
Zhe Liu
Yasuyuki Nogami
Jongseok Choi
Howon Kim
2015
conf/icisc
Faster ECC over F<sub>2<sup>521</sup>-1</sub> (feat. NEON).
Hwajeong Seo
Zhe Liu
Yasuyuki Nogami
Taehwan Park
Jongseok Choi
Lu Zhou
Howon Kim
2015
conf/ches
Efficient Ring-LWE Encryption on 8-Bit AVR Processors.
Zhe Liu
Hwajeong Seo
Sujoy Sinha Roy
Johann Großschädl
Howon Kim
Ingrid Verbauwhede
2015
conf/wisa
Compact Implementations of LSH.
Taehwan Park
Hwajeong Seo
Zhe Liu
Jongseok Choi
Howon Kim
2015
conf/wisa
Secure Binary Field Multiplication.
Hwajeong Seo
Chien-Ning Chen
Zhe Liu
Yasuyuki Nogami
Taehwan Park
Jongseok Choi
Howon Kim
2015
conf/wisa
Applying Recurrent Neural Network to Intrusion Detection with Hessian Free Optimization.
Jihyun Kim
Howon Kim
2015
conf/wisa
Compact Implementations of LEA Block Cipher for Low-End Microprocessors.
Hwajeong Seo
Zhe Liu
Jongseok Choi
Taehwan Park
Howon Kim
2015
conf/wisa
Open Sesame! Hacking the Password.
Hwajeong Seo
Zhe Liu
Gyuwon Seo
Taehwan Park
Jongseok Choi
Howon Kim
2014
conf/icisc
Montgomery Modular Multiplication on ARM-NEON Revisited.
Hwajeong Seo
Zhe Liu
Johann Großschädl
Jongseok Choi
Howon Kim
2014
conf/wisa
Improved Modular Multiplication for Optimal Prime Fields.
Hwajeong Seo
Zhe Liu
Yasuyuki Nogami
Jongseok Choi
Howon Kim
2014
conf/wisa
The Unified Hardware Design for GCM and SGCM.
Yeoncheol Lee
Hwajeong Seo
Howon Kim
2014
conf/icics
Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors.
Zhe Liu
Hwajeong Seo
Johann Großschädl
Howon Kim
2013
conf/icisc
Parallel Implementations of LEA.
Hwajeong Seo
Zhe Liu
Taehwan Park
Hyunjin Kim
Yeoncheol Lee
Jongseok Choi
Howon Kim
2013
conf/icics
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes.
Zhe Liu
Hwajeong Seo
Johann Großschädl
Howon Kim
2012
conf/wisa
Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors.
Hwajeong Seo
Howon Kim
2006
conf/wisa
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols.
Mun-Kyu Lee
Jung Ki Min
Seok Hun Kang
Sang-Hwa Chung
Howon Kim
Dong Kyue Kim
2005
conf/wisa
</sup>).
Mun-Kyu Lee
Keon Tae Kim
Howon Kim
Dong Kyue Kim
2004
conf/wisa
Hyperelliptic Curve Coprocessors on a FPGA.
Howon Kim
Thomas J. Wollinger
YongJe Choi
Kyoil Chung
Christof Paar
Coauthors
Afifatul Mukaroh
(1)
Ahmada Yusril Kadiptya
(1)
Aji Teguh Prihatno
(1)
Andro Aprila Adiputra
(1)
Asep Muhamad Awaludin
(1)
Bogeum Kim
(1)
Bongjin Bae
(2)
Chien-Ning Chen
(1)
Christof Paar
(1)
Dedy Septono Catur Putranto
(3)
Derry Pratama
(1)
Dong Kyue Kim
(2)
Garam Lee
(1)
Gyuwon Seo
(3)
Hanho Jeong
(1)
Harashta Tatimma Larasati
(5)
Howon Kim
(39)
Hwajeong Seo
(22)
Hyejin Sim
(1)
Hyeokchan Kwon
(1)
Hyeokdong Kwon
(1)
Hyoeun Kang
(2)
Hyunjin Kim
(1)
Ingrid Verbauwhede
(1)
Jaehan Cho
(2)
Jaehyun Kim
(1)
Janghyun Ji
(2)
Jihyun Kim
(1)
Jiwon Yun
(1)
Johann Großschädl
(5)
Jong-gyu Park
(1)
Jongseok Choi
(10)
Jung Ki Min
(1)
Keon Tae Kim
(1)
Kyoil Chung
(1)
Kyuhwang An
(1)
Lu Zhou
(3)
Md. Al-Amin Khandaker
(1)
Mun-Kyu Lee
(2)
Namje Park
(1)
Naufal Suryanto
(4)
Rini Wisnu Wardhani
(3)
Sang-Hwa Chung
(1)
Seok Hun Kang
(1)
Shinwook Heo
(3)
Simon Oh
(1)
Sokjoon Lee
(1)
Sujoy Sinha Roy
(1)
Taehwan Park
(13)
Thi-Thu-Huong Le
(2)
Thomas J. Wollinger
(1)
Uk Jo
(1)
Yasuyuki Nogami
(6)
Yeoncheol Lee
(2)
YongJe Choi
(1)
Yongsu Kim
(3)
Youngyeo Yun
(1)
Youwen Zhu
(1)
Yustus Eko Oktian
(2)
Zhe Liu
(14)
Zhi Hu
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to