Dowon Hong

Orcid: 0000-0001-9690-5055

According to our database1, Dowon Hong authored at least 76 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks.
IEEE Internet Things J., February, 2023

Improvement of the Efficiency of Neural Cryptography-Based Secret Key Exchange Algorithm.
IEEE Access, 2023

2022
Evaluating differentially private decision tree model over model inversion attack.
Int. J. Inf. Sec., 2022

2021
Neural Cryptography Based on Generalized Tree Parity Machine for Real-Life Systems.
Secur. Commun. Networks, 2021

Evaluating Differentially Private Generative Adversarial Networks Over Membership Inference Attack.
IEEE Access, 2021

2020
Efficient Bit-Parallel Multiplier for All Trinomials Based on n-Term Karatsuba Algorithm.
IEEE Access, 2020

Space Efficient $GF(2^m)$ Multiplier for Special Pentanomials Based on $n$ -Term Karatsuba Algorithm.
IEEE Access, 2020

2019
An Attack-Based Evaluation Method for Differentially Private Learning Against Model Inversion Attack.
IEEE Access, 2019

Low Space Complexity $GF(2^m)$ Multiplier for Trinomials Using $n$ -Term Karatsuba Algorithm.
IEEE Access, 2019

2018
Subquadratic Space Complexity Multiplier Using Even Type GNB Based on Efficient Toeplitz Matrix-Vector Product.
IEEE Trans. Computers, 2018

A Symmetric Key Based Deduplicatable Proof of Storage for Encrypted Data in Cloud Storage Environments.
Secur. Commun. Networks, 2018

Efficient multiplier based on hybrid approach for Toeplitz matrix-vector product.
Inf. Process. Lett., 2018

Efficient Three-Way Split Formulas for Binary Polynomial Multiplication and Toeplitz Matrix Vector Product.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

2017
New Block Recombination for Subquadratic Space Complexity Polynomial Multiplication Based on Overlap-Free Approach.
IEEE Trans. Computers, 2017

2016
Symmetric searchable encryption with efficient range query using multi-layered linked chains.
J. Supercomput., 2016

Comments on "Multiway Splitting Method for Toeplitz Matrix Vector Product".
IEEE Trans. Computers, 2016

Explicit formulae for Mastrovito matrix and its corresponding Toeplitz matrix for all irreducible pentanomials using shifted polynomial basis.
Integr., 2016

Efficient Multiplication Based on Dickson Bases over Any Finite Fields.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

2015
Low Complexity Multiplier Based on Dickson Basis Using Efficient Toeplitz Matrix-Vector Product.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Generalization to Any Field of Toeplitz Matrix Vector Product Based on Multi-Way Splitting Method and Its Application.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Efficient Construction of Order-Preserving Encryption Using Pseudo Random Function.
IEICE Trans. Commun., 2015

2014
Comments on "On the Polynomial Multiplication in Chebyshev Form".
IEEE Trans. Computers, 2014

New efficient bit-parallel polynomial basis multiplier for special pentanomials.
Integr., 2014

Authenticated Distance Bounding Protocol with Improved FAR: Beyond the Minimal Bound of FAR.
IEICE Trans. Commun., 2014

Bit-Parallel Cubing Computation over <i>GF</i>(3<i><sup>m</sup></i>) for Irreducible Trinomials.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Bucket Index Ordering Problem in Range Queries.
Proceedings of the Frontier and Innovation in Future Computing and Communications, 2014

2013
Identity-based proxy signature from lattices.
J. Commun. Networks, 2013

Symmetric Searchable Encryption with Efficient Conjunctive Keyword Search.
KSII Trans. Internet Inf. Syst., 2013

Privacy-preserving disjunctive normal form operations on distributed sets.
Inf. Sci., 2013

Parallel <i>GF</i>(3<sup><i>m</i></sup>) multiplier for trinomials.
Inf. Process. Lett., 2013

Fast Bit-Parallel Polynomial Basis Multiplier for <i>GF</i>(2<sup><i>m</i></sup>) Defined by Pentanomials Using Weakly Dual Basis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

2012
Scalable Privacy-Preserving <i>t</i>-Repetition Protocol with Distributed Medical Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

A Strong Binding Encryption Scheme from Lattices for Secret Broadcast.
IEEE Commun. Lett., 2012

Signcryption with fast online signing and short signcryptext for secure and private mobile communication.
Sci. China Inf. Sci., 2012

2011
Attacks and Countermeasures for RFID Mutual Authentication Scheme in Pervasive Computing Environmen.
KSII Trans. Internet Inf. Syst., 2011

GPU-Accelerated Password Cracking of PDF Files.
KSII Trans. Internet Inf. Syst., 2011

Fingerprint Template Protection Using One-Time Fuzzy Vault.
KSII Trans. Internet Inf. Syst., 2011

On Fast Private Scalar Product Protocols.
Proceedings of the Security Technology, 2011

2010
Privacy Preserving Association Rule Mining Revisited: Privacy Enhancement and Resources Efficiency.
IEICE Trans. Inf. Syst., 2010

Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering
CoRR, 2010

Authentication mechanism for fast handoff in cdma2000-WiBro interworking.
Sci. China Inf. Sci., 2010

2009
Grid-Based Key Pre-Distribution in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2009

On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2009

Searchable Encryption with <i>Keyword-Recoverability</i>.
IEICE Trans. Inf. Syst., 2009

Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering
CoRR, 2009

Constructing PEKS schemes secure against keyword guessing attacks is possible?
Comput. Commun., 2009

A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network.
Proceedings of the Advances in Information Security and Assurance, 2009

Improving Performance in Digital Forensics: A Case Using Pattern Matching Board.
Proceedings of the The Forth International Conference on Availability, 2009

2008
High-speed search using Tarari content processor in digital forensics.
Digit. Investig., 2008

Privacy Preserving Association Rule Mining Revisited
CoRR, 2008

Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Data Randomization for Lightweight Secure Data Aggregation in Sensor Network.
Proceedings of the Ubiquitous Intelligence and Computing, 5th International Conference, 2008

Privacy in Location Based Services: Primitives Toward the Solution.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Suspects' data hiding at remaining registry values of uninstalled programs.
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008

Forensics for Korean cell phone.
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008

High speed search for large-scale digital forensic investigation.
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008

Forensic Data Acquisition from Cell Phones using JTAG Interface.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
A Practical Privacy-Preserving Cooperative Computation Protocol without Oblivious Transfer for Linear Systems of Equations.
J. Inf. Process. Syst., 2007

Multiparty Key Agreement Using Bilinear Map.
IACR Cryptol. ePrint Arch., 2007

A New Anti-Forensic Tool Based on a Simple Data Encryption Scheme.
Proceedings of the Future Generation Communication and Networking, 2007

2006
Efficient Bit-Parallel Multiplier for Irreducible Pentanomials Using a Shifted Polynomial Basis.
IEEE Trans. Computers, 2006

Analysis of Privacy-Preserving Element Reduction of Multiset.
IACR Cryptol. ePrint Arch., 2006

Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

New Variant of the Self-Shrinking Generator and Its Cryptographic Properties.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

Efficient Exponentiation in <i>GF</i>(<i>p</i><sup><i>m</i></sup>) Using the Frobenius Map.
Proceedings of the Computational Science and Its Applications, 2006

Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Low Complexity Bit-Parallel Multiplier for GF(2^m) Defined by All-One Polynomials Using Redundant Representation.
IEEE Trans. Computers, 2005

An efficient key distribution scheme with self-healing property.
IEEE Commun. Lett., 2005

A DPA Countermeasure by Randomized Frobenius Decomposition.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

2004
Padding Oracle Attacks on Multiple Modes of Operation.
Proceedings of the Information Security and Cryptology, 2004

An Efficient Protocol for Mutual Authentication and Key Agreement Using the Subscriber Identity Module.
Proceedings of the International Conference on Security and Management, 2004

The Related-Key Rectangle Attack - Application to SHACAL-1.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
A Concrete Security Analysis for 3GPP-MAC.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

2002
Efficient Oblivious Transfer in the Bounded-Storage Model.
Proceedings of the Advances in Cryptology, 2002

2001
Provable Security of KASUMI and 3GPP Encryption Mode f8.
Proceedings of the Advances in Cryptology, 2001

Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001


  Loading...