H
Howon Kim
Researcher at Pusan National University
Publications - 297
Citations - 3405
Howon Kim is an academic researcher from Pusan National University. The author has contributed to research in topics: Encryption & Cryptography. The author has an hindex of 25, co-authored 270 publications receiving 2788 citations. Previous affiliations of Howon Kim include Electronics and Telecommunications Research Institute & Katholieke Universiteit Leuven.
Papers
More filters
Journal ArticleDOI
Implementation and Analysis of Multi-precision Multiplication for Public Key Cryptography Based on NDK
Hwajeong Seo,Howon Kim +1 more
TL;DR: This paper implements multiplication using NDK and SDK to analyze the public key cryptography over Android environment and execution time of arithmetic, branch and call operations overAndroid environment is compared to understand performance enhancement usingNDK package.
Book ChapterDOI
Open Sesame! Hacking the Password
TL;DR: A novel hacking method is presented to identify the user's password from wearable devices and this approach reduces the password complexity by 99.99i¾?%.
Journal ArticleDOI
EC-ELGAMAL Homomorphic Cryptography based E-voting System
Hwajeong Seo,Howon Kim +1 more
TL;DR: An e-voting system which is able to open votes in server without decryption during midst process using EC-ELGAMAL homomorphic cryptography is proposed and users ensure anonymity with pseudo id from server and check their voting with Bloom Filter technology.
Patent
Device and method for classifying appliances by using electric power data analysis
TL;DR: In this paper, a device and a method for classifying appliances by using electric power data analysis, which classify appliances by analyzing electric power datasets that are collected from customers and extracting an impedance component of electric power.
Journal ArticleDOI
SIGNORA: A Blockchain-Based Framework for Dataflow Integrity Provisioning in an Untrusted Data Pipeline
TL;DR: The experiment results show that SIGNORA can provide dataflow integrity provisioning in multiple scenarios of data payload size with reasonable overhead and can provide a high degree of accountability for participants collaborating in an untrusted environment.