scispace - formally typeset
H

Howon Kim

Researcher at Pusan National University

Publications -  297
Citations -  3405

Howon Kim is an academic researcher from Pusan National University. The author has contributed to research in topics: Encryption & Cryptography. The author has an hindex of 25, co-authored 270 publications receiving 2788 citations. Previous affiliations of Howon Kim include Electronics and Telecommunications Research Institute & Katholieke Universiteit Leuven.

Papers
More filters
Journal ArticleDOI

Implementation and Analysis of Multi-precision Multiplication for Public Key Cryptography Based on NDK

TL;DR: This paper implements multiplication using NDK and SDK to analyze the public key cryptography over Android environment and execution time of arithmetic, branch and call operations overAndroid environment is compared to understand performance enhancement usingNDK package.
Book ChapterDOI

Open Sesame! Hacking the Password

TL;DR: A novel hacking method is presented to identify the user's password from wearable devices and this approach reduces the password complexity by 99.99i¾?%.
Journal ArticleDOI

EC-ELGAMAL Homomorphic Cryptography based E-voting System

TL;DR: An e-voting system which is able to open votes in server without decryption during midst process using EC-ELGAMAL homomorphic cryptography is proposed and users ensure anonymity with pseudo id from server and check their voting with Bloom Filter technology.
Patent

Device and method for classifying appliances by using electric power data analysis

TL;DR: In this paper, a device and a method for classifying appliances by using electric power data analysis, which classify appliances by analyzing electric power datasets that are collected from customers and extracting an impedance component of electric power.
Journal ArticleDOI

SIGNORA: A Blockchain-Based Framework for Dataflow Integrity Provisioning in an Untrusted Data Pipeline

TL;DR: The experiment results show that SIGNORA can provide dataflow integrity provisioning in multiple scenarios of data payload size with reasonable overhead and can provide a high degree of accountability for participants collaborating in an untrusted environment.