• 대학원진학
  • 논문실적
논문실적
논문실적
Home / 논문실적

논문실적

논문실적

180 

특허

28

프로젝트

38 

SCI paper
  • Thi-Thu-Huong Le and Howon Kim, “Non-Intrusive Load Monitoring Based on Novel Transient Signal in Household Appliances with Low Sampling Rate”, energies 11(12), Dec 2018(SCIE)
  • Taehwan Park, Hwajeong Seo, Junsub Kim, Haeryong Park, and Howon Kim, “Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor”, Security and Communication Networks Vol 2018, Nov 2018(SCIE)
  • Taehwan Park, Hwajeong Seo, Sokjoon Lee, and Howon Kim, “Secure Data Encryption for Cloud-Based Human Care Services”, Journal of Sensors Vol 2018, 2018(SCIE)
  • Jihyun Kim, Howon Kim “The intelligent IoT common service platform architecture and service implementation”, JOURNAL OF SUPERCOMPUTING 74(9): 4242-4260, 2018 (SCI)
  • H Seo, J Kim, H Kim, Z Liu, “Personal identification number entry for Google glass”, Computers & Electrical Engineering (SCIE)
  • Z Liu, R Azarderakhsh, H Kim, H Seo, “Efficient Software Implementation of Ring-LWE Encryption on IoT Processors”, IEEE Transactions on Computers (SCI)
  • Jihyun Kim, Thi-Thu-Huong Le, Howon Kim,“Non-Intrusive Load Monitoring Based on Advanced Deep Learning and Novel Signature”, Hindawi Publishing Corporation, August, 2017 (SCIE)
  • Zhe Liu, Thomas Poppelmann, Tobias Oder, Hwajeong Seo, Sujoy Sinha Roy, Tim Guneysu, Johann Großschädl, Howon Kim, Ingrid Verbauwhede,“High-Performance Ideal Lattice-Based Cryptography on 8-Bit AVR Microcontrollers”, ACM Transactions on Embedded Computing Systems, July, 2017 (SCIE)
  • Hwajeong Seo, Zhe Liu, Johann Groszschaedl, Howon Kim, “Efficient arithmetic on ARM‐NEON and its application for high‐speed RSA implementation,” Security and Communication Networks, December, 2016, (SCIE)
  • Jongseok Choi, Seonhee Seok, Hwajeong Seo, Howon Kim, “A fast ARX model-based image encryption scheme”, Multimedia Tools and Applications, Nov, 2016, (SCIE)
  • Zhe Liu, Hwajeong Seo, Chien-Ning Chen, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim, “Secure GCM Implementation on AVR”, Preprint submitted to Discrete Applied Mathematics, Nov, 2016, (SCI)
  • Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim, “Binary field multiplication on ARMv8”, SECURITY AND COMMUNICATION NETWORKS, Sep, 2016,(SCIE)
  • Jihyun Kim, Yonghun Jeon, Howon Kim, “The intelligent IoT common service platform architecture and service implementation”, The Journal of Supercomputing, Aug, 2016, (SCI)
  • Zhe Liu, Hwajeong Seo, Howon Kim, Johann Groszschaedl, “Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes,” IEEE Transactions on Information Forensics & Security, July, 2016, (SCI)
  • Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim, “Hybrid Montgomery Reduction”, ACM Transactions on Embedded Computing Systems, July, 2016 (SCIE)
  • Zhe Liu, Hwajeong Seo, Howon Kim, “A Synthesis of Multi-Precision Multiplication and Squaring Techniques for 8-Bit Sensor Nodes: State-of-the-Art Research and Future Challenges”, Journal of Computer Science and Technology, Mar, 2016, (SCIE)
  • Zhe liu, Hwajeong Seo, Johann Grobschadl, Howon Kim, “A Survey of Multi-Precision Multiplication and Squaring Techniques for 8-bit Sensor Nodes,” Journal of Computer Science and Technology, (SCIE)
  • Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim, “Optimized Karatsuba Squaring on 8-bit AVR Processors,” Security and communication networks, May, 2015, (SCIE)
  • Zhe Liu, Hwajeong Seo, Qiuliang Xu, “Performance Evaluation of Twisted Edwards-Form Elliptic Curve Cryptography for Wireless Sensor Nodes,” security and communication networks, April, 2015, (SCIE)
  • Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim, “Karatsuba -Block Comb Technique for Elliptic Curve Cryptography over Binary Fields,” Security and communication networks, March, 2015, (SCIE)
  • Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim, “Montgomery Multiplication and Squaring for Optimal Prime Fields,” COSE, March, 2015, (SCIE)
  • Hwajeong Seo, Yeoncheol Lee, Hyunjin Kim, Taehwan Park, and Howon Kim. “Binary and prime field multiplication for public key cryptography on embedded microprocessors.” Security and Communication Networks, Issue 4, Pages 774-787, April, 2014, (SCIE)
  • Hwajeong Seo, Jihyun Kim, Jongseok Choi, Taehwan Park, Zhe Liu, Howon Kim, “Small Private Key MQPKS on Embedded Microprocessor.” Sensors, Vol. 14, No. 3, pp. 5441-5458, March, 2014, (SCIE)
  • Donggeon Lee, Dong-Chan Kim, Daesung Kwon, Howon Kim, “Efficient Hardware Implementation of the Lightweight Block Encryption Algorithm LEA,” Sensors, Vol. 14, No. 1, pp. 975-994, Jan, 2014, (SCIE)
  • Hwajeong Seo, Hyunjin Kim, Taehwan Park, Yeoncheol Lee, Zhe Liu, Howon Kim, “Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication.” Sensors, vol. 13, no. 7, pp. 9483-951, July, 2013, (SCIE)
  • Dong-geon Lee, Dooho Choi, Jungtaek Seo, and Howon Kim, “Reset Tree-based Optical Fault Detection”, Sensors, vol. 13, no.5, pp.6713-6729, May, 2013, (SCIE)
  • Hwajeong Seo, Kyung‐Ah Shim, and Howon Kim. “Performance enhancement of TinyECC based on multiplication optimizations.” Security and Communication Networks,Volume 6, Issue 2, pages 151–160, February, 2013, (SCIE)
  • You-Seok Lee, Kyung-Won Song, Dong-Guk Han, Ho-won Kim, and Hyoung-Nam Kim,“ Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals,”, Vol.E95-A, No.6, pp.1091-1094, IEICE, June, 2012, (SCIE)
  • Shirase, Masaaki, Tsuyoshi Takagi, Dooho Choi, DongGuk Han, and Howon Kim. “Efficient computation of Eta pairing over binary field with Vandermonde matrix.” ETRI journal 31, no. 2, pp. 129-139, April, 2009, (SCI)
  • Han, Dong-Guk, Dooho Choi, and Howon Kim. “Improved computation of square roots in specific finite fields.” Computers, IEEE Transactions on 58, no. 2, pp. 188-196, February, 2009, (SCI)
  • Choi, Dooho, Dongguk Han, and Howon Kim. “Construction of efficient and secure pairing algorithm and its application.” Communications and Networks, Journal of 10, no. 4, pp. 437-443, December, 2008, (SCIE)
  • Masaaki SHIRASE, Dong-Guk HAN, Yasushi HIBINO, Howon KIM, Tsuyoshi TAKAGI,”A More Compact Representation of XTR Cryptosystem,” IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E91-A, No.10, pp.2843-2850,
  • Howon Kim, Thomas Wollinger, Dooho Choi, Dong-Guk Han, Munkyu Lee,”Hyperelliptic Curve Crypto-Coprocessor over Affine and Projective Coordinates,” ETRI Journal, Vol. 30, No. 3, pp.365-376, June 2008 (SCI)
  • TaeHyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Howon Kim, and Jongin Lim,”Power Analysis Attacks and Countermeasures on ηT Pairing over Binary Fields,” ETRI Journal, Vol. 30, No. 1, pp.68-80, February. 2008, (SCI)
  • Dong Kyue Kim, Mun-Kyu Lee, You Sung Kang, Sang-Hwa Chung, Won-Ju Yoon, Jung-Ki Min, and Howon Kim,”Design and Performance Analysis of Electronic Seal Protection Systems Based on AES,” ETRI Journal, Vol.29, No.6, pp.755-768, December, 2007, (SCI)
  • Howon-Kim, and Sunggu Lee”Design and Implementation of a Private and Public Key Crypto Processor and Its Application to a Security System,” IEEE Trans. Consumer Electronics, Vol.50, No.1, pp.214-224, February. 2004 (SCI)

 

 

국제학회
  • Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Zhi Hu, Lu Zhou, Yasuyuki Nogami, Youwen Zhu, and Howon Kim, “Parallel Implementations of LEA, Revisited”, WISA 2016, 2016.8
  • Jongseok Choi, Jong-gyu Park, Shinwook Heo, Namje Park, Howon Kim, “Slowloris DoS Countermeasure over WebSocket”, WISA 2016, 2016.8
  • Hwajeong Seo, Zhe Liu, Jongseok Choi , Howon Kim, “Multi-Precision Squaring for Public-key Cryptography on Embedded Microprocessors, A Step Forward”, WISA 2016, 2016.8
  • Thi-Thu-Huong Le, Jihyun Kim, Howon Kim, “The impact of activation functions applying to recurrent neural network on Intrusion Detection”, MITA 2016, 2016.7
  • Taehwan Park, Hwajeong Seo, Howon Kim. “Parallel Implementations of SIMON and SPECK.” 2016 International Conference on Platform Technology and Service (PlatCon). IEEE, 2016
  • Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou, Howon Kim, “Faster ECC over F_{2^521-1} (feat. NEON),” ICISC2015. 2015. 11.
  • Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede, “Efficient Ring-LWE Encryption on 8-bit AVR Processors,” CHES2015.
  • Taehwan Park, Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim, “Compact Implementations of LSH,” WISA2015. 2015. 8.
  • Hwajeong Seo, Zhe Liu, Taehwan Park, Jongseok Choi, Howon Kim, “Compact Implementations of LEA Block Cipher for Low-End Microprocessors,” WISA2015. 2015. 8.
  • Jihyun Kim, Howon Kim, “Applying Recurrent Neural Network to Intrusion Detection with Hessian Free Optimization,” WISA2015. 2015. 8.
  • Hwajeong Seo, Chien Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim, “Secure Binary Field Multiplication,” WISA2015. 2015. 8.
  • Hwajeong Seo, Zhe Liu, Gyuwon Seo, Taehwan Park, Jongseok Choi, Howon Kim, “Open Sesame! Hacking the Password,” WISA2015. 2015. 8.
  • Zhe Liu, Hwajeong Seo, Zhi Hu, Xinyi Huang and Johann Großschädl, “High-Speed MoTE ECDH Implementation on Sensor Nodes using MSP430 Microcontrollers,” AsiaCCS’15, APR. 2015.
  • Yasuyuki Nogami, Hwajeong Seo, “Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree 1,” ICISC2014. 2014. 12.
  • Hwajeong Seo, Zhe Liu, Jongseok Choi, Johann Groszschaedl, Howon Kim, “Montgomery Modular Multiplication on ARM-NEON Revisited,” ICISC2014. 2014. 12.
  • Zhe Liu, Hwajeong Seo, Howon Kim and Johann Großschädl, “Reverse Product-Scanning Multiplication on 8-bit AVR Processors: Tradeoffs between Performance, Code Size and Scalability”, ICICS2014, 2014. 12
  • Ha V. Nguyen, Hwajeong Seo and Howon Kim, “Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA”, FDSE2014. 2014. 11
  • Zhe Liu, Hwajeong Seo, Zhi Hu, Xinyi Hunag, Johann Großschädl, “Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks”, ASIA CCS’15, 2014.10.30
  • Hwajeong Seo, Howon Kim, “Multi-precision Squaring on MSP and ARM processors,” ICTC’14, 2014.
  • Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim, “Improved Modular Multiplication for Optimal Prime Fields,” WISA’14, 2014. 8
  • Yeoncheol Lee, Hwajeong Seo, Howon Kim, “The Unified Hardware Design for GCM and SGCM,” WISA’14, 2014. 8 .
  • Jihyun Kim, Howon Kim, “The Prediction and Classification of Family Type by using Power Consumption Model over Smart Grid”, International Conference on Aritificial Intelligence 14, Vol. 2, pp.555-560, 2014
  • Hwajeong Seo, Jongseok Choi, Hyunjin Kim, Taehwan Park, Howon Kim, “Pseudo Random Number Generator and Hash Function for Embedded Microprocessors,” WF-IoT 2014. Mar. 2014.
  • Hwajeong Seo, Jongseok Choi, Hyunjin Kim, Taehwan Park, Howon Kim, “Surveillance System with Light Sensor,” WF-IoT 2014. Mar. 2014.
  • Jongseok Choi, Hwajeong Seo, Howon Kim, “TRAPA Three-way RFID Authentication preserving Anonymity”, UCES2013, 2013, 12
  • Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim, “Multiprecision Squaring for Public Key Cryptography on Embedded Microprocessors” INDOCRYPT13, 2013. 12
  • Hwajeong Seo,Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Howon Kim, “High Performance LEA Design on FPGA”, UCES2013, 2013, 12
  • Donggeon Lee, Hwajeong Seo, Howon Kim, “Metastability-based Feedback Method for Enhancing FPGA-based TRNG”, ICCA 2013, Nov 2013.
  • Hwajeong Seo, Zhe Liu, Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Jongseok Choi, Howon Kim, “Parallel Implementations of LEA”, ICISC2013, 2013, 11.
  • Zhe Liu, Hwajeong Seo, Johann Grobschadl, Howon Kim, “Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes,” ICICS’13, 2013. 11
  • Hwajeong Seo, Taehae Kim, Howon Kim, “A Three Dimensional Location based Two Factor TL-OTP Protocol,” WTA’13, 2013. 9
  • Jihyun Kim, Howon Kim, “Analysis for Memory Reduction of the UOV Scheme with the Application fo PRNG”, International Journal of Computer and Communication Engineering, Vol. 2, No. 3, pp.363-367 , 2013. 5
  • Jongseok Choi, Howon Kim, “Enhanced Attribute-Based Proxy Re-Encryption for Home Network”, International Journal of Computer and Communication Engineering, Vol. 2, No. 3, pp. 299-303, 2013. 5
  • Yunjin Lee, Howon Kim, “Insider Attack Resistant OTP(One-Time-Password) Based on Bilinear Maps”, International Journal of Computer and Communication Engineering, Vol. 2, No. 3, pp. 304-308, 2013. 5
  • Hwajeong Seo, Howon Kim, “Optimized Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors”, International Journal of Computer and Communication Engineering, Vol. 2, No. 3, pp. 255-259, 2013. 5
  • Dynamic Tag Identity-Based Encryption Scheme for Logistics System
  • Hwajeong Seo, Howon Kim, “Multi-precision Multiplication for Public Key Cryptography on Embedded Microprocessors,” WISA’12, 2012. 8
  • Jihyun Kim, Yanghyun Kwon, Yunjin Lee, Jungtaek Seo, and Howon Kim, “Access Control Mechanism supporting Scalability, Interoperability and Flexibility of Multi-Domain Smart Grid System”, Information Science and Industrial Applications, 2012. 6
  • Jongseok Choi and Howon Kim, “Designing Secure SMS Scheme on Android OS”, ISA 2012, 2012.4
  • Jongseok Choi and Howon Kim, “Broadcast-Based Anonymous Authentication”, CCA2012, 2012.3
  • Hwajeong Seo, Howon Kim, “Three-dimensional Localization System for Logistics Part,” International Conference on IML 2012, 2012. 2
  • Yanghyeon Kwon, Howon Kim, “Efficient Group Key Management of ZigBee Network for Home Automation”, International Conference on Consumer Electronics, 2012.1
  • Hwajeong Seo, Howon Kim, “Zigbee Security for Visitors in Home Automation using Attribute Based Proxy Re-encryption”, International Symposium on Consumer Electronics, 2011. 6
  • Hwajeong Seo, CheolSoo Kim, Howon Kim, “ZigBee Security For Home Automation Using Attribute-based Cryptography,”,2011 IEEE International Conference on Consumer Electronics, pp 375-376, 2011, 01
  • Hwajeong Seo, Ahreum Hwang, Cheol Soo Kim, Howon Kim, “Speed Optimized Implementation of Hummingbird Cryptographic Algorithm on 16-Bit Microcontrollers,” ICONI & APIC-IST 2010 , 2010. 12
  • Seongyun Kim, Sangho Chu, Donggeon Lee, Howon Kim,“OHLCAP based RFID Secure Protocol with Forward Secrecy”, ICONI & APIC-IST 2010, 2010. 12
  • Hwajeong Seo, Cheol Soo Kim, Howon Kim,”Performance Enhancement of TinyECC based on the Multiplication Optimizations”ICONI & APIC-IST 2010 , 2010. 12
  • Dong-geon Lee, Seongyun Kim, Howon Kim,“Mobile Platform for Networked RFID Applications”, ITNG 2010 Seventh International Conference on Information Technology : New Generations, 2010. 04

 

 

국내논문지
  • 박태환, 배봉진, 김호원, “해시 기반 서명 기법 최신 기술 동향 및 전망.”, 한국정보보호학회, 2016.12
  • Taehwan Park, Hwajeong Seo, Bongjin Bae, Howon Kim, “Secure Message Transmission against Remote Control System”, 한국정보통신학회, 2016.12
  • Taehwan Park, Hwajeong Seo, Bongjin Bae, Howon Kim, “Efficient Implementation of Simeck Family Block Cipher on 8-Bit Processor.”, 한국정보통신학회, 2016.9
  • 서화정, 김호원, “입력 위치 유추 방지를 위한 보안 키패드의 설계”, 한국정보보호학회, 26(1), Feb, 2016
  • 서화정, 김호원, “다중 채널 인증 기반 보안 카드의 설계 및 구현”, 한국정보통신학회, 20(1), Jan, 2016
  • 서화정, 석선희, 김경훈, 김호원, “난수생성기를 이용한 멀티채널 보안카드 설계”, 정보보호학회, 25(3), Jun, 2015
  • 서화정, 김호원, “금융보안을 위한 물리적 보안 카드의 설계 및 구현”, 한국정보통신학회, 19(4), Apr, 2015
  • 서화정, 김호원, “Consecutive Operand-Caching Method for Multi-precision Multiplication, Revisited,” 한국정보통신학회, 3, 2015 . Accepted for Publication.
  • 서화정, 김호원, “LEA Block Cipher in Javascript,” 한국정보통신학회, 12(4), 2014 . Accepted for Publication.
  • 서화정, 김호원, “입력 메시지 암호화를 통한 보안 키패드의 설계와 구현 ,” 한국정보통신학회, 12, 2014 . Accepted for Publication.
  • 서화정, 김호원, “Study of Modular Multiplication Methods on Embedded Processors ,” 한국정보통신학회, 12(3), pp. 145-153, Sep. 2014 .
  • 서화정, 김호원, “난수 발생기를 이용한 이중화 구조의 안전한 비밀번호 생성 기법 ,” 한국정보통신학회, 18(4) pp. 867-875, Apr, 2014.
  • 아파르나, 서화정, 이동건, 김호원, “Implementation of an RFID Key Management System for DASH7,” 한국정보통신학회, 12(1) pp. 19-25, Mar. 2014.
  • 서화정, 김호원, “센서 네트워크 상에서의 저전력 보안 수중 통신을 위한 동작 전압 스케일 기반 암호화에 대한 연구 ,” 한국정보통신학회, 18(3) pp. 586-594, Mar. 2014.
  • 김지현,이윤진, 김호원, “스마트 그리드 환경에서 가정의 소비전력 생성 시뮬레이터 개발 및 데이터 마이닝 기법을 이용한 가족 유형 분류”, 한국정보처리학회, 한국통신학회논문지, ISSN 1226-4717, Vol. 39C, No. 1, pp.72-81, 2014.01
  • 최종석, 김호원, “타원곡선상의 영지식기반 사용자 원격인증 프로토콜”, 한국정보처리학회, 정보처리학회논문지, ISSN 2287-5891, Vol. 2, No. 12, pp.517-524, 2013.12
  • 이연철, 서화정, 김호원, “WAVE 하드웨어 암호 라이브러리에 적합한 효율적인 AES-CCM 구조 설계”, 한국정보통신학회논문지, Vol. 17, No. 12, pp.2899-2905, 2013. 12
  • 서화정, 김호원, “임베디드 마이크로 프로세서 상에서의 최신 암호 구현 동향 ,” 정보보호학회(Accepted for Publication)
  • 서화정, 김호원,”EC-ELGAMAL 준동형 암호화기반 전자투표,” 한국정보통신학회논문지, Vol. 17, No, 4, pp.909-916. 2013. 4
  • Hwajeong Seo, Howon Kim, “Implemetation of Multi-precision multiplication over sensor networks with efficient instructions,” the korea institute of information and communication engineering, Vol. 11. No. 1. pp. 12-16, 2013. 3
  • 이동건, 최용제, 최두호, 김민호, 김호원, “광학 오류 주입 공격에 강인한 몽고메리 지수승 기반 RSA 하드웨어 구현”, 한국정보통신학회논문지, Vol. 17, No. 1, pp.76-89, 2013. 1
  • Hwajeong Seo, Howon Kim, “Four Anchor Sensor nodes based localization algorithm over Three-dimensional space (FAST),” the korea institute of information and communication engineering, vol. 10, No. 4, pp. 349-358, 2012. 12
  • Hwajeong Seo, Howon Kim, “ZigBee Security using Attribute-Based Proxy Re-encryption,” the korea institute of information and communication engineering, vol. 10, No. 4, pp. 343-348, 2012. 12
  • 서화정, 김호원,”NDK 기반 공개키 암호를 위한 곱셈기 구현 및 분석,” 한국정보통신학회논문지, vol. 16, No. 11, pp. 2347-2354, 2012. 11
  • 서화정, 김호원, “임베디드 장비 상에서의 공개키 기반 암호를 위한 다중 곱셈기 최신 연구 동향,” 정보보호학회 vol. 22, No. 5, pp. 999-1008, 2012. 10
  • 서화정, 김호원, “안드로이드 기반 공개키 암호를 위한 곱셈기 구현 및 분석,” 한국통신학회 vol. 37C, No. 10, pp. 940-948, 2012. 10
  • Hwajeong Seo, Howon Kim, “Always Metastable State True Random Number Generator,” the korea institute of information and communication engineering, vol. 10, No. 3, pp. 253-257, 2012. 9
  • Hwajeong Seo, Howon Kim, “Network and Data Link Layer Security for DASH7,” the korea institute of information and communication engineering, vol. 10, No. 3, pp. 248-252, 2012. 9
  • 서화정, 김호원, “VANET 환경에서의 사용자 인증 기법,” 한국통신학회, 37권 7호, pp. 576-583, 2012.7
  • Jongseok Choi and Howon Kim, “Half-Broadcast Encryption for Anonymity,” International Journal of Grid and Distributed Computing, 5(2), pp. 43-51, 2012.6 (SCOPUS)
  • 서화정, 김호원, “센서 네트워크 상에서의 HUMMINGBIRD2 암호화 속도 최적화 구현기법”, 한국통신학회논문지, 37권 6호, pp. 414-422, 2012.6
  • 최종석, 김호원, “단일 제어 모바일 일회용 패스워드 기법”, 한국통신학회, 37C(6), pp. 497-501, 2012.6
  • Jongseok Choi and Howon Kim, “A Novel Approach for SMS Security”, International Journal of Security and Its Applications, 6(2), pp. 372-378, 2012.4 (SCOPUS)
  • Hwajeong Seo, Howon Kim, “Attribute-Based Proxy Re-encryption with constant number of pairing operation,” the korea institute of information and communication engineering, Vol.10, No.1, March. 2012(정보통신학회)
  • 권양현, 최두호, 최용제, 김호원, “배터리 교체식 전기 자동차 시스템 연구 및 보안 요구 사항 분석”, 한국정보통신학회논문지, 2012
  • 황아름, 서화정, 김호원,”항만 물류 환경에서의 복제된 CSD 탐지를 위한 정책 기반 복제 탐지 메커니즘,” 한국정보통신학회논문지, vol.16, no.1, pp.98-106, 2012. 1
  • Hwajeong Seo, Howon Kim, “Transmission Power Range based Sybil Attack Detection Method over Wireless Sensor Networks,” the korea institute of information and communication engineering, Vol.9, No.6, December 2011(정보통신학회)
  • 김성윤, 김호원, “Efficient RFID Secure Protocol with Forward Secrecy,” 한국인터넷정보학회논문지, 제12권제6호, 2011.12, pp.139-147
  • Hwajeong Seo, Howon Kim, “Speed Optimized Implementation of HUMMINGBIRD Cryptography for Sensor Networks,” the korea institute of information and communication engineering, Vol.9, No.6, December 2011(정보통신학회)
  • 서화정, 김호원, “위치기반 Two-Factor L-OTP 프로토콜,” 정보처리학회논문지, 18-C, 5, 327, 2011. 10
  • 서화정, 김호원, “익명성을 제공하는 RSSI기반 V2V 메시지 인증기법”, Vol. 18-C, No. 4, 정보처리학회논문지, 2011, 9
  • 서화정, 김호원, “센서네트워크에 적용 가능한 HIGHT 알고리즘의 최적화 구현 기법”, 한국해양정보통신학회논문지,Vol. 15, No. 5, 2011, 7
  • 서화정, 김호원, “VANET 상에서의 이동성을 고려한 안전한 메시지 인증기법”, 한국해양정보통신학회논문지, Vol. 15, No. 5, pp1087-1095, 2011. 5
  • 김완진, 송경원, 이유리, 김호원, 김형남, “웨이블릿 잡음 제거 방법을 이용한 전력 분석 공격 성능 개선,” 한국통신학회논문지, vol. 35, no.9, pp. 1330-1341, 2010. 9
  • 이철희, 황아름, 이동건, 김형남, 김호원,“IT융합 디바이스에 대한 물리적 2차 CPA 공격을 위한 새로운 전처리 기법”, 한국통신학회, 한국통신학회논문지, ISSN 1226-4717, Vol. 35, No. 9, pp. 1369~1380, 2010. 9
  • 서화정,김호원,”속성기반 재 암호화를 이용한 스마트카드 인증권한 분배스킴”,대한임베디드공학회,대한임베디드공학회논문지, ISSN 1975-5066, Vol. 5, No. 3, pp. 168~174, 2010. 9
  • 서화정, 김호원, “Elliptic curve 기반 센서네트워크 보안을 위한 곱셈 최적화 기법”, 한국해양정보통신학회, 한국해양정보통신학회논문지, ISSN 1226-6981, Vol. 14, No. 8, pp. 1836~1842, 2010. 8
  • 이동건, 이철희, 최두호, 김철수, 최은영, 김호원,“Eta-T Pairing 알고리즘의 효율적인 하드웨어 구현”, 한국정보보호학회, 정보보호학회논문지, ISSN 1598-3986, Vol. 20, No. 1, pp. 3~16, 2010. 2
  • 장남수,김태현,김창한,한동국,김호원,”Digit-Serial Finite Field Multiplier for GF(3^m),” 전자공학논문지 제45권 SD편 제10호, pp23~30, 2008.10

 

 

국내학회
  • 박종규, 허신욱, 박태환, 김호원, “oneM2M 보안을 위한 하드웨어 기반의 암호통신”, CISC-16 동계학술대회, 2016.12
  • 조동근, 김동주, 김호원, “Machine Learning 이용한 Intrusion Detection System 연구 동향과 미래 IDS 시스템의 전망”, CISC-16 동계학술대회, 2016.12
  • 배봉진, 이가람, 박태환, 김호원, “트리 기반 다중 사물인터넷(IoT) 디바이스 동시 인증 구조 설계 방안”, CISC-16 동계학술대회, 2016.12 .
  • 박태환, 배봉진, 김호원, “Stateless 해시 기반 서명 기법 동향 및 전망”, 정보처리학회 추계학술대회, 2016.11
  • THI-THU-HUONG LE, JIHYUN KIM, HOWON KIM, “CLASSIFICATION PERFORMANCE USING GATED RECURRENT UNIT RECURRENT NEURAL NETWORK ON ENERGY DISAGGREATION”, ICMLC 2016, 2016.7 .
  • 박창준, 인영진, 허신욱, 최종석, 김호원, “oneM2M 구현 플랫폼 mobius 상의 end-to-end 보안 적용 방안 연구”, 한국컴퓨터종합학술대회, 2016.6
  • 박종규, 최종석, 김호원, “oneM2M 플랫폼에 대한 보안 분석”, 한국컴퓨터종합학술대회, 2016.6
  • 서규원, 김호원, “랜섬웨어의 종류와 앞으로의 동향”, 한국컴퓨터종합학술대회, 2016.6
  • 박태환, 배봉진, 김호원, “해시기반 서명 알고리즘 동향 분석 및 전망”, 한국정보보호학회 하계학술대회, 2016.6
  • 김동주, 조동근, 김호원, “스마트 홈 서비스 도입사례로 본 발전 방향 제시”, 한국컴퓨터종합학술대회, 2016.6
  • 이가람, 박태환, 김호원, “사물인터넷 디바이스에 대한 Chaskey 알고리즘 적용 가능성에 관한 연구”, 한국컴퓨터종합학술대회, 2016.6
  • 박태환, 배봉진, 이가람, 김호원, “Stateful 해시 기반 서명 기법 동향 및 전망”, 한국컴퓨터종합학술대회, 2016.6
  • 박태환, 배봉진, 김호원, “시각 장애인용 금융 보안 및 기술 동향과 전망”, 춘계학술발표대회, 2016.5
  • 박태환, 서화정, 김호원, “4비트 마이크로프로세서 상에서의 효율적인 ARX연산 기반 블록암호 구현에 관한 연구”, 한국정보처리학회 추계학술대회, 2015. 10
  • 서화정, 박태환, 최종석, 김지현, LSH 최적화 구현 분야 우수상
  • 박태환, 서화정, 응엔반하, 석선희, 최종석, 김경훈, LSH 경진대회 활용분야 우수상
  • 박태환, 서화정, 김지현, 최종석, 김호원, “사물인터넷 디바이스 상의 암호기법 구현 기술 동향 및 전망”, 한국정보보호학회, 2015. 4
  • 서화정, 김호원, “사물인터넷을 위한 경량 암호 알고리즘 구현”, 한국정보보호학회, 2015.4
  • 서화정, 김호원, “공개키 암호화 상에서의 Side Channel Attack 방지를 위한 Secure Coding”, 정보보호학회 영남지부, 2015. 2.
  • 박태환, 서화정, 김지현, 김호원, “ARX연산 기반의 대칭키 암호 알고리즘의 자바스크립트 구현 기법 연구”, 정보보호학회 영남지부, 2015. 2.
  • 서화정, 김호원, “공개키 암호화를 위한 곱셈 기법 연구”, CISC-W’14, 2014. 12.
  • 김경훈, 서화정, 석선희, 김호원, “안전한 금융거래를 위한 멀티채널 보안카드의 설계”, CISC-W’14, 2014. 12.
  • 김현진, 김호원, “스마트폰 지문인식을 활용한 안전한 금융거래”, CISC-W’14, 2014. 12.
  • 석선희, 서화정, 김경훈, “난수 생성기를 이용한 멀티 채널 보안카드의 설계”, 국가암호공모전 최우수상
  • 서화정, “Modular Multiplication and Squaring on ARM-NEON Revisited”, 국가암호공모전 최우수상.
  • 서화정, 김호원, “Bathroom Safety with Smart Devices”, UCWIT, 2014. 11.
  • 2014 지급결제제도 발전 논문 현상공모 아이디어상, 서화정,이연철,김현진,박태환, 나엔하반, 석선희, 김경훈, 김호원, “촉각을 이용한 보안키패드의 설계”, 2014, 9 .
  • 서화정, 김호원, “Hello SIMDCRYPTO”, CISC-S’14, 2014. 6
  • 2013 국가암호기술공모전 우수상, 이연철, 박태환, 서화정, “입력 메시지 암호화를 통한 보안 키패드의 설계와 구현”, 2013, 11 .
  • 2013 국가암호기술공모전 최우수상, 서화정, “montgomery multiplication for public-kley cryptography on embedded microprocessors”, 2013, 11 .
  • 서화정, 김호원, “임베디드 보드 상에서의 타원곡선 암호화 구현 동향”, 한국국방기술학회 국방기술학술대회, 2013. 10
  • 김현진, 서화정, 박태환, 이연철, 김호원,”어깨너머 공격에 강인한 보안 키패드의 설계와 구현” 2013년 금융정보보호 공모전 우수상
  • 서화정, 김호원, “수중 통신 보안을 위한 경량화 암호 구현”, 한국통신학회 동계종합학술발표회, 2013. 1
  • 2012 국가암호기술공모전 장려상, 서화정, “multi-precision multiplication for public-kley cryptography on embedded microprocessors”, 2012, 11
  • 한국정보보호학회 우수논문상 서화정, 김호원, “임베디드 장비 상에서의 공개키 기반 암호를 위한 다중 곱셈기 최신 연구 동향”, 한국정보보호학회 하계학술발표회, 2012. 6
  • 이동건, 서화정, 김호원, “PI 제어를 통한 FPGA 기반 TRNG에 대한 재고”, 한국전자공학회 하계종합학술발표회, 2012. 6
  • 이동건, 김호원, “Hummingbird-2 의 하드웨어 설계 및 구현”, 한국통신학회 동계종합학술발표회, 2012. 2
  • 김지현, 김호원, “VANET에서 프라이버시 보호를 위한 브로드캐스트 프로토콜”, 한국통신학회 동계종합학술발표회, 2012. 2
  • 최종석, 김호원, “One-Handled 모바일 One-Time Password 기법”, 한국통신학회, 2012 동계학술대회
  • 권양현, 김호원, “전기 자동차 시스템 및 사용자 인증 기술 연구”, 한국통신학회 동계종합학술발표회, 2012. 2
  • 서화정, 김호원, “NDK 기반 대칭키 암호화 구현에 관한 연구”, 한국통신학회 동계종합학술발표회, 2012. 2
  • 서화정, 김호원,”HIGHT 블록 암호 알고리즘 최적화 FPGA 구현,” 한국통신학회, 2011. 11
  • 제5회 대한민국 보안기술 논문대상 공모전, 장려상 수상, 서화정 “속성기반 스마트카드 전자화폐 인증 기술”
  • Hwajeong Seo, Howon Kim,”Optimizing Multiprecision Multiplication for Elliptic Curve Cryptography to Wireless Sensor Netowrks,” 한국통신학회, 2011.11
  • 한국통신학회 우수논문상, 서화정, 김호원, “센서 네트워크 상에서의 초경량 블락 암호화 하이트 구현 기법” 한국통신학회 하계학술대회 2011 6
  • 이동건, 김호원, “HIGHT 블록 암호 알고리즘의 FPGA 구현”, 대한전자공학회 하계종합학술대회, 2011. 6
  • 서화정, 김호원, “센서네트워크상에서의 초경량블락암호화 하이트 구현기법”, 한국통신학회 하계종합학술발표회, 2011. 6
  • 서화정, 김호원, “이동성 속성기반 스마트카드 인증스킴”, 한국정보처리학회 춘계학술대회, 2011. 5
  • 서화정, 김호원, “효율적인 타원곡선 알고리즘 구현을 위한 센서의 특성 분석”, 한국통신학회 동계학술대회, 2011. 2
  • 김지현, 서화정, 김호원, “무선 센서 네트워크 환경에서 RSSI기반 SybilAttack 탐지 알고리즘 제안 및 성능 분석”, 한국통신학회 동계학술대회, 2011.2