Toward a secure drone system: Flying with real-time homomorphic authenticated encryption JH Cheon, K Han, SM Hong, HJ Kim, J Kim, S Kim, H Seo, H Shim, ... IEEE access 6, 24325-24339, 2018 | 133 | 2018 |
New modular multiplication algorithms for fast modular exponentiation SM Hong, SY Oh, H Yoon International Conference on the Theory and Applications of Cryptographic …, 1996 | 75 | 1996 |
Trust management for resilient wireless sensor networks J Hur, Y Lee, SM Hong, H Yoon Information Security and Cryptology-ICISC 2005: 8th International Conference …, 2006 | 43 | 2006 |
On the construction of a powerful distributed authentication server without additional key management SM Hong, S Lee, Y Park, Y Cho, H Yoon Computer Communications 23 (17), 1638-1644, 2000 | 37 | 2000 |
Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field. J Lee, H Kim, Y Lee, SM Hong, H Yoon Int. J. Netw. Secur. 4 (1), 99-106, 2007 | 30 | 2007 |
A new appraoch to server-aided secret computation. SM Hong, JB Shin, H Lee-Kwang, H Yoon ICISC, 33-45, 1998 | 27 | 1998 |
Trust-based secure aggregation in wireless sensor networks J Hur, Y Lee, S Hong, H Yoon 3rd International Conference on Computing, Communications and Control …, 2005 | 23 | 2005 |
Secure group communication with multiplicative one-way functions H Kim, S Hong, H Yoon, JW Cho International Conference on Information Technology: Coding and Computing …, 2005 | 20 | 2005 |
Lizard public key encryption JH Cheon, S Park, J Lee, D Kim, Y Song, S Hong, D Kim, J Kim, SM Hong, ... NIST PQC Round 1, 4, 2018 | 11 | 2018 |
Accelerating key establishment protocols for mobile communication S Lee, SM Hong, H Yoon, Y Cho Information Security and Privacy: 4th Australasian Conference, ACISP’99 …, 1999 | 11 | 1999 |
Improved batch exponentiation B Chung, J Hur, H Kim, SM Hong, H Yoon Information processing letters 109 (15), 832-837, 2009 | 7 | 2009 |
Expansion of Sliding Window Method for Finding Shorter Addition/Subtraction-Chains. Y Lee, H Kim, SM Hong, H Yoon Int. J. Netw. Secur. 2 (1), 34-40, 2006 | 7 | 2006 |
Kimoon kim, Jun-Sub Kim, and Jieun Lee JH Cheon, S Park, J Lee, D Kim, Y Song, S Hong, D Kim, J Kim, SM Hong, ... Lizard. Technical report, National Institute of Standards and Technology …, 0 | 7 | |
A secure strong proxy signature scheme with proxy signer privacy protection YH Lee, SM Hong, H Yoon CCCT'05.(International Conference on Computing, Communications and Control …, 2005 | 2 | 2005 |
A Distributed Model for Secure and Scalable Group Communication H Kim, SM Hong, H Yoon 3rd International Conference on Computing, Communications and Control …, 2005 | 2 | 2005 |
Fast scalar multiplication algorithm on elliptic curve over optimal extension fields C Byungchun, H Seong-Min, Y Hyunsoo Journal of The Korea Institute of Information Security & Cryptology 15 (3 …, 2005 | 2 | 2005 |
Active Trial-and-error Attack on SASC Protocols. H Kim, Y Lee, SM Hong, H Yoon Int. J. Netw. Secur. 2 (2), 105-110, 2006 | 1 | 2006 |
Securing mobile agents by integrity-based encryption J Lee, SM Hong, H Yoon The 7th International Conference on Advanced Communication Technology, 2005 …, 2005 | 1 | 2005 |
Rogue public key registration attack and the importance of'proof of possession'in the PKI environment Y Lee, Y Park, H Kim, SM Hong, H Yoon IEICE transactions on information and systems 89 (8), 2452-2455, 2006 | | 2006 |
Fast Computation Methods for Scalar Multiplication on Elliptic Curves Defined over Higher Characteristic Finite Field J Lee, D Kim, SM Hong, H Yoon 3rd International Conference on Computing, Communications and Control …, 2005 | | 2005 |