关注
Seong-Min Hong
Seong-Min Hong
Cryptolab Inc.
在 kaist.ac.kr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Toward a secure drone system: Flying with real-time homomorphic authenticated encryption
JH Cheon, K Han, SM Hong, HJ Kim, J Kim, S Kim, H Seo, H Shim, ...
IEEE access 6, 24325-24339, 2018
1332018
New modular multiplication algorithms for fast modular exponentiation
SM Hong, SY Oh, H Yoon
International Conference on the Theory and Applications of Cryptographic …, 1996
751996
Trust management for resilient wireless sensor networks
J Hur, Y Lee, SM Hong, H Yoon
Information Security and Cryptology-ICISC 2005: 8th International Conference …, 2006
432006
On the construction of a powerful distributed authentication server without additional key management
SM Hong, S Lee, Y Park, Y Cho, H Yoon
Computer Communications 23 (17), 1638-1644, 2000
372000
Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field.
J Lee, H Kim, Y Lee, SM Hong, H Yoon
Int. J. Netw. Secur. 4 (1), 99-106, 2007
302007
A new appraoch to server-aided secret computation.
SM Hong, JB Shin, H Lee-Kwang, H Yoon
ICISC, 33-45, 1998
271998
Trust-based secure aggregation in wireless sensor networks
J Hur, Y Lee, S Hong, H Yoon
3rd International Conference on Computing, Communications and Control …, 2005
232005
Secure group communication with multiplicative one-way functions
H Kim, S Hong, H Yoon, JW Cho
International Conference on Information Technology: Coding and Computing …, 2005
202005
Lizard public key encryption
JH Cheon, S Park, J Lee, D Kim, Y Song, S Hong, D Kim, J Kim, SM Hong, ...
NIST PQC Round 1, 4, 2018
112018
Accelerating key establishment protocols for mobile communication
S Lee, SM Hong, H Yoon, Y Cho
Information Security and Privacy: 4th Australasian Conference, ACISP’99 …, 1999
111999
Improved batch exponentiation
B Chung, J Hur, H Kim, SM Hong, H Yoon
Information processing letters 109 (15), 832-837, 2009
72009
Expansion of Sliding Window Method for Finding Shorter Addition/Subtraction-Chains.
Y Lee, H Kim, SM Hong, H Yoon
Int. J. Netw. Secur. 2 (1), 34-40, 2006
72006
Kimoon kim, Jun-Sub Kim, and Jieun Lee
JH Cheon, S Park, J Lee, D Kim, Y Song, S Hong, D Kim, J Kim, SM Hong, ...
Lizard. Technical report, National Institute of Standards and Technology …, 0
7
A secure strong proxy signature scheme with proxy signer privacy protection
YH Lee, SM Hong, H Yoon
CCCT'05.(International Conference on Computing, Communications and Control …, 2005
22005
A Distributed Model for Secure and Scalable Group Communication
H Kim, SM Hong, H Yoon
3rd International Conference on Computing, Communications and Control …, 2005
22005
Fast scalar multiplication algorithm on elliptic curve over optimal extension fields
C Byungchun, H Seong-Min, Y Hyunsoo
Journal of The Korea Institute of Information Security & Cryptology 15 (3 …, 2005
22005
Active Trial-and-error Attack on SASC Protocols.
H Kim, Y Lee, SM Hong, H Yoon
Int. J. Netw. Secur. 2 (2), 105-110, 2006
12006
Securing mobile agents by integrity-based encryption
J Lee, SM Hong, H Yoon
The 7th International Conference on Advanced Communication Technology, 2005 …, 2005
12005
Rogue public key registration attack and the importance of'proof of possession'in the PKI environment
Y Lee, Y Park, H Kim, SM Hong, H Yoon
IEICE transactions on information and systems 89 (8), 2452-2455, 2006
2006
Fast Computation Methods for Scalar Multiplication on Elliptic Curves Defined over Higher Characteristic Finite Field
J Lee, D Kim, SM Hong, H Yoon
3rd International Conference on Computing, Communications and Control …, 2005
2005
系统目前无法执行此操作,请稍后再试。
文章 1–20