


default search action
Howon Kim 0001
- > Home > Persons > Howon Kim 0001
Publications
- 2020
- [j53]Zhe Liu
, Reza Azarderakhsh, Howon Kim
, Hwajeong Seo
:
Efficient Software Implementation of Ring-LWE Encryption on IoT Processors. IEEE Trans. Computers 69(10): 1424-1433 (2020) - 2019
- [j52]Zhe Liu
, Hwajeong Seo, Aniello Castiglione
, Kim-Kwang Raymond Choo
, Howon Kim:
Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things. IEEE Trans. Dependable Secur. Comput. 16(3): 521-529 (2019) - 2018
- [j50]Zhe Liu, Hwajeong Seo
, Chien-Ning Chen, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim:
Secure GCM implementation on AVR. Discret. Appl. Math. 241: 58-66 (2018) - [j48]Taehwan Park
, Hwajeong Seo
, Sokjoon Lee
, Howon Kim
:
Secure Data Encryption for Cloud-Based Human Care Services. J. Sensors 2018: 6492592:1-6492592:10 (2018) - [j47]Taehwan Park
, Hwajeong Seo
, Junsub Kim, Haeryong Park, Howon Kim
:
Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor. Secur. Commun. Networks 2018: 7012056:1-7012056:10 (2018) - [j46]Jongseok Choi, Youngjin In, Changjun Park, Seonhee Seok, Hwajeong Seo, Howon Kim:
Secure IoT framework and 2D architecture for End-To-End security. J. Supercomput. 74(8): 3521-3535 (2018) - [j45]Jongseok Choi, Youngjin In, Changjun Park, Seonhee Seok, Hwajeong Seo, Howon Kim:
Erratum to: Secure IoT framework and 2D architecture for End-To-End security. J. Supercomput. 74(8): 3536 (2018) - [c73]Taehwan Park, Hwajeong Seo, Chanhui Park, Howon Kim:
Parallel Implementation of Simeck Family Block Cipher by Using ARM NEON. ICUFN 2018: 703-707 - [c72]Chanhui Park, Taehwan Park, Hwajeong Seo, Howon Kim:
Optimization of CHAM Encryption Algorithm Based on Javascript. ICUFN 2018: 774-778 - [c71]Hwajeong Seo, Kyuhwang An, Hyeokdong Kwon, Taehwan Park, Zhi Hu, Howon Kim:
Parallel Implementations of CHAM. WISA 2018: 93-104 - 2017
- [j43]Hwajeong Seo, Jiye Kim, Howon Kim, Zhe Liu:
Personal identification number entry for Google glass. Comput. Electr. Eng. 63: 160-167 (2017) - [j40]Hwajeong Seo, Howon Kim:
Hidden Indicator Based PIN-Entry Method Using Audio Signals. J. Inform. and Commun. Convergence Engineering 15(2) (2017) - [j39]Hwajeong Seo, Howon Kim:
MoTE-ECC Based Encryption on MSP430. J. Inform. and Commun. Convergence Engineering 15(3) (2017) - [j38]Zhe Liu, Thomas Pöppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Güneysu
, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
:
High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers. ACM Trans. Embed. Comput. Syst. 16(4): 117:1-117:24 (2017) - [c69]Hwajeong Seo, Zhe Liu, Taehwan Park, Hyeokchan Kwon, Sokjoon Lee
, Howon Kim:
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors. ICISC 2017: 175-188 - [c68]Hwajeong Seo, Garam Lee, Taehwan Park, Howon Kim:
Compact GCM implementations on 32-bit ARMv7-A processors. ICTC 2017: 704-707 - [c67]Garam Lee, Hwajeong Seo, Taehwan Park, Howon Kim:
Optimized implementation of chaskey MAC on 16-bit MSP430. ICUFN 2017: 904-909 - [c66]Taehwan Park, Hwajeong Seo, Garam Lee, Howon Kim:
Efficient implementation of simeck family block cipher on 16-bit MSP430. ICUFN 2017: 983-988 - [c65]Hwajeong Seo, Taehwan Park, Janghyun Ji, Howon Kim:
Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, Revisited. WISA 2017: 3-15 - [c64]Hwajeong Seo, Taehwan Park, Janghyun Ji, Zhi Hu, Howon Kim:
ARM/NEON Co-design of Multiplication/Squaring. WISA 2017: 72-84 - [c63]Taehwan Park, Hwajeong Seo, Garam Lee, Md. Al-Amin Khandaker
, Yasuyuki Nogami, Howon Kim:
Parallel Implementations of SIMON and SPECK, Revisited. WISA 2017: 283-294 - 2016
- [j37]Zhe Liu, Hwajeong Seo, Howon Kim:
A Synthesis of Multi-Precision Multiplication and Squaring Techniques for 8-Bit Sensor Nodes: State-of-the-Art Research and Future Challenges. J. Comput. Sci. Technol. 31(2): 284-299 (2016) - [j36]Taehwan Park, Hwajeong Seo, Bongjin Bae, Howon Kim:
Efficient Implementation of Simeck Family Block Cipher on 8-Bit Processor. J. Inform. and Commun. Convergence Engineering 14(3) (2016) - [j35]Taehwan Park, Hwajeong Seo, Bongjin Bae, Howon Kim:
Secure Message Transmission against Remote Control System. J. Inform. and Commun. Convergence Engineering 14(4) (2016) - [j33]Jongseok Choi, Seonhee Seok, Hwajeong Seo, Howon Kim:
A fast ARX model-based image encryption scheme. Multim. Tools Appl. 75(22): 14685-14706 (2016) - [j32]Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Binary field multiplication on ARMv8. Secur. Commun. Networks 9(13): 2051-2058 (2016) - [j31]Hwajeong Seo, Zhe Liu, Johann Großschädl, Howon Kim:
Efficient arithmetic on ARM-NEON and its application for high-speed RSA implementation. Secur. Commun. Networks 9(18): 5401-5411 (2016) - [j30]Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Hybrid Montgomery Reduction. ACM Trans. Embed. Comput. Syst. 15(3): 58:1-58:13 (2016) - [j29]Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim:
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes. IEEE Trans. Inf. Forensics Secur. 11(7): 1385-1397 (2016) - [c61]Zhe Liu, Reza Azarderakhsh, Howon Kim, Hwajeong Seo:
Efficient Implementation of Ring-LWE Encryption on High-End IoT Platform. RFIDSec 2016: 76-90 - [c59]Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Zhi Hu, Lu Zhou, Yasuyuki Nogami, Youwen Zhu, Howon Kim:
Parallel Implementations of LEA, Revisited. WISA 2016: 318-330 - [c58]Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Lu Zhou, Howon Kim:
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward. WISA 2016: 331-340 - 2015
- [j28]Hwajeong Seo
, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Montgomery multiplication and squaring for Optimal Prime Fields. Comput. Secur. 52: 276-291 (2015) - [j27]Hwajeong Seo, Howon Kim:
Consecutive Operand-Caching Method for Multiprecision Multiplication, Revisited. J. Inform. and Commun. Convergence Engineering 13(1): 27-35 (2015) - [j26]Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim:
Karatsuba-Block-Comb technique for elliptic curve cryptography over binary fields. Secur. Commun. Networks 8(17): 3121-3130 (2015) - [j25]Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim:
Optimized Karatsuba squaring on 8-bit AVR processors. Secur. Commun. Networks 8(18): 3546-3554 (2015) - [c57]Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede
:
Efficient Ring-LWE Encryption on 8-Bit AVR Processors. CHES 2015: 663-682 - [c56]Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou, Howon Kim:
Faster ECC over F2521-1 (feat. NEON). ICISC 2015: 169-181 - [c55]Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim:
Compact Implementations of LEA Block Cipher for Low-End Microprocessors. WISA 2015: 28-40 - [c54]Taehwan Park, Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim:
Compact Implementations of LSH. WISA 2015: 41-53 - [c53]Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim:
Secure Binary Field Multiplication. WISA 2015: 161-173 - [c52]Hwajeong Seo, Zhe Liu, Gyuwon Seo, Taehwan Park, Jongseok Choi, Howon Kim:
Open Sesame! Hacking the Password. WISA 2015: 215-226 - [i12]Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede:
Efficient Ring-LWE Encryption on 8-bit AVR Processors. IACR Cryptol. ePrint Arch. 2015: 410 (2015) - [i11]Hwajeong Seo, Zhe Liu, Johann Großschädl, Howon Kim:
Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation. IACR Cryptol. ePrint Arch. 2015: 465 (2015) - [i10]Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Binary Field Multiplication on ARMv8. IACR Cryptol. ePrint Arch. 2015: 688 (2015) - [i9]Hwajeong Seo, Zhe Liu, Jongseok Choi, Taehwan Park, Howon Kim:
Compact Implementations of LEA Block Cipher for Low-End Microprocessors. IACR Cryptol. ePrint Arch. 2015: 732 (2015) - [i8]Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Faster ECC over F2571 (feat. PMULL). IACR Cryptol. ePrint Arch. 2015: 745 (2015) - [i7]Hwajeong Seo, Chien-Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim:
Secure Binary Field Multiplication. IACR Cryptol. ePrint Arch. 2015: 799 (2015) - [i6]Reza Azarderakhsh, Zhe Liu, Hwajeong Seo, Howon Kim:
NEON PQCryto: Fast and Parallel Ring-LWE Encryption on ARM NEON Architecture. IACR Cryptol. ePrint Arch. 2015: 1081 (2015) - 2014
- [j24]Aparna Vegendla, Hwajeong Seo, Donggeon Lee, Howon Kim:
Implementation of an RFID Key Management System for DASH7. J. Inform. and Commun. Convergence Engineering 12(1): 19-25 (2014) - [j23]Hwajeong Seo, Howon Kim:
Study of Modular Multiplication Methods for Embedded Processors. J. Inform. and Commun. Convergence Engineering 12(3): 145-153 (2014) - [j22]Hwajeong Seo, Howon Kim:
Low-Power Encryption Algorithm Block Cipher in JavaScript. J. Inform. and Commun. Convergence Engineering 12(4): 252-256 (2014) - [j21]Hwajeong Seo, Yeoncheol Lee, Hyunjin Kim, Taehwan Park, Howon Kim:
Binary and prime field multiplication for public key cryptography on embedded microprocessors. Secur. Commun. Networks 7(4): 774-787 (2014) - [j19]Hwajeong Seo, Jihyun Kim, Jongseok Choi, Taehwan Park, Zhe Liu, Howon Kim:
Small Private Key MQPKS on an Embedded Microprocessor. Sensors 14(3): 5441-5458 (2014) - [c50]Ha Van Nguyen, Hwajeong Seo, Howon Kim:
Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA. FDSE 2014: 191-203 - [c49]Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim:
Reverse Product-Scanning Multiplication and Squaring on 8-Bit AVR Processors. ICICS 2014: 158-175 - [c48]Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, Howon Kim:
Montgomery Modular Multiplication on ARM-NEON Revisited. ICISC 2014: 328-342 - [c47]Hwajeong Seo, Howon Kim:
Multi-precision squaring on MSP and ARM processors. ICTC 2014: 356-361 - [c46]Hwajeong Seo, Jongseok Choi, Hyunjin Kim, Taehwan Park, Howon Kim:
Pseudo random number generator and Hash function for embedded microprocessors. WF-IoT 2014: 37-40 - [c45]Hwajeong Seo, Jongseok Choi, Hyunjin Kim, Taehwan Park, Howon Kim:
Short paper: Surveillance system with light sensor. WF-IoT 2014: 165-166 - [c44]Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Improved Modular Multiplication for Optimal Prime Fields. WISA 2014: 150-161 - [c43]Yeoncheol Lee, Hwajeong Seo, Howon Kim:
The Unified Hardware Design for GCM and SGCM. WISA 2014: 307-320 - [i5]Hwajeong Seo, Zhe Liu, Johann Großschädl, Jongseok Choi, Howon Kim:
Montgomery Modular Multiplication on ARM-NEON Revisited. IACR Cryptol. ePrint Arch. 2014: 760 (2014) - [i4]Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim:
Optimized Karatsuba Squaring on 8-bit AVR Processors. IACR Cryptol. ePrint Arch. 2014: 817 (2014) - 2013
- [j18]Hwajeong Seo, Howon Kim:
Implementation of Multi-Precision Multiplication over Sensor Networks with Efficient Instructions. J. Inform. and Commun. Convergence Engineering 11(1): 12-16 (2013) - [j17]Hwajeong Seo, Kyung-Ah Shim, Howon Kim:
Performance enhancement of TinyECC based on multiplication optimizations. Secur. Commun. Networks 6(2): 151-160 (2013) - [j15]Hwajeong Seo, Hyunjin Kim, Taehwan Park, Yeoncheol Lee, Zhe Liu, Howon Kim:
Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication. Sensors 13(7): 9483-9512 (2013) - [c42]Zhe Liu, Hwajeong Seo, Johann Großschädl, Howon Kim:
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes. ICICS 2013: 302-317 - [c41]Hwajeong Seo, Zhe Liu, Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Jongseok Choi, Howon Kim:
Parallel Implementations of LEA. ICISC 2013: 256-274 - [c40]Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim:
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors. INDOCRYPT 2013: 227-243 - 2012
- [j13]Hwajeong Seo, Howon Kim:
Attribute-based Proxy Re-encryption with a Constant Number of Pairing Operations. J. Inform. and Commun. Convergence Engineering 10(1): 53-60 (2012) - [j12]Hwajeong Seo, Howon Kim:
Network and Data Link Layer Security for DASH7. J. Inform. and Commun. Convergence Engineering 10(3): 248-252 (2012) - [j11]Hwajeong Seo, Howon Kim:
Always Metastable State True Random Number Generator. J. Inform. and Commun. Convergence Engineering 10(3): 253-257 (2012) - [j10]Hwajeong Seo, Howon Kim:
ZigBee Security Using Attribute-Based Proxy Re-encryption. J. Inform. and Commun. Convergence Engineering 10(4): 343-348 (2012) - [j9]Hwajeong Seo, Howon Kim:
Four Anchor Sensor Nodes Based Localization Algorithm over Three-Dimensional Space. J. Inform. and Commun. Convergence Engineering 10(4): 349-358 (2012) - [c37]Hwajeong Seo, Howon Kim:
Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors. WISA 2012: 55-67 - 2011
- [j8]Hwajeong Seo, Howon Kim:
Transmission Power Range based Sybil Attack Detection Method over Wireless Sensor Networks. J. Inform. and Commun. Convergence Engineering 9(6): 676-682 (2011) - [j7]Hwajeong Seo, Howon Kim:
Speed Optimized Implementation of HUMMINGBIRD Cryptography for Sensor Network. J. Inform. and Commun. Convergence Engineering 9(6): 683-688 (2011)

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-06-17 00:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint