
{"id":8389,"date":"2022-11-28T10:41:24","date_gmt":"2022-11-28T01:41:24","guid":{"rendered":"http:\/\/infosec.pusan.ac.kr\/?page_id=8389"},"modified":"2024-08-27T21:23:33","modified_gmt":"2024-08-27T12:23:33","slug":"sub44","status":"publish","type":"page","link":"https:\/\/infosec.pusan.ac.kr\/index.php\/sub44\/","title":{"rendered":"\uad6d\uc81c\ud559\uc220\ub300\ud68c"},"content":{"rendered":"<p><!-- research count --><\/p>\n<div class=\"research_count\">\n<ul>\n<li>\n<div>\n<ol>\n<li><img decoding=\"async\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2020\/03\/sub41_1.gif\" \/><\/li>\n<li>SCI\n<p class=\"count\">60<\/p>\n<\/li>\n<\/ol>\n<\/div>\n<\/li>\n<li>\n<div>\n<ol>\n<li><img decoding=\"async\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2020\/03\/sub41_2.gif\" \/><\/li>\n<li>\ud2b9\ud5c8\n<p class=\"count\">66<\/p>\n<\/li>\n<\/ol>\n<\/div>\n<\/li>\n<li>\n<div>\n<ol>\n<li><img decoding=\"async\" src=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2020\/03\/sub41_3.gif\" \/><\/li>\n<li>\ud504\ub85c\uc81d\ud2b8\n<p class=\"count\">44<\/p>\n<\/li>\n<\/ol>\n<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<div class=\"space40\"><\/div>\n<div id=\"sub31_tab1\" class=\"sub31\">\n<p><!-- sub tab --><\/p>\n<div class=\"sub_tab\">\n<ul>\n<li><a href=\"index.php\/sub41\">SCI<\/a><\/li>\n<li><a class=\"on\" href=\"index.php\/sub44\">\uad6d\uc81c\ud559\uc220\ub300\ud68c<\/a><\/li>\n<li><a href=\"index.php\/sub45\">\uad6d\ub0b4\ub17c\ubb38 \ubc0f \uad6d\ub0b4\ud559\uc220\ub300\ud68c<\/a><\/li>\n<li><a href=\"index.php\/sub42\">\ud2b9\ud5c8\uc2e4\uc801<\/a><\/li>\n<li><a href=\"index.php\/sub43\">\ud504\ub85c\uc81d\ud2b8<\/a><\/li>\n<\/ul>\n<\/div>\n<div class=\"space20\"><\/div>\n<div class=\"sub_content_title\">\uad6d\uc81c\ud559\uc220\ub300\ud68c<\/div>\n<div class=\"research_list\"><div class=\"mb-widget\"><div class=\"mb-latest-basic mb-widget-shortcode\"><div class=\"mb-latest-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/\" title=\"sub41_2\">sub41_2<\/a><\/div><div class=\"mb-latest-box\"><table  cellspacing=\"0\" cellpadding=\"0\" border=\"0\" class=\"table table-latest\"><colgroup><col style=\"width:100%\" \/><\/colgroup><tbody><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=362\" title=\"Wardhani, R. W., Putranto, D. S. C., and H. Kim. (2025). RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring Techniques, in Information Security and Cryptology. LNCS Springer. https:\/\/doi.org\/10.1007\/978-981-96-5566-3 \"><span class=\"mb-latest-item-title-text\">Wardhani, R. W., Putranto, D. S. C., and H. Kim. (2025). RSA Quantum Cryptanalysis: A Thorough Exploration of n-Bit Attacks and Emerging Factoring Techniques, in Information Security and Cryptology. LNCS Springer. https:\/\/doi.org\/10.1007\/978-981-96-5566-3 <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=361\" title=\"Putranto, D. S. C., Wardhani, R. W., J. Cho, and H. Kim. (2025). ECPM Cryptanalysis Resource Estimation. In Information Security and Cryptology, LNCS Springer. https:\/\/doi.org\/10.1007\/978-981-96-1624-4_1 \"><span class=\"mb-latest-item-title-text\">Putranto, D. S. C., Wardhani, R. W., J. Cho, and H. Kim. (2025). ECPM Cryptanalysis Resource Estimation. In Information Security and Cryptology, LNCS Springer. https:\/\/doi.org\/10.1007\/978-981-96-1624-4_1 <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=347\" title=\"Kyeongmin Lee, Yeonjeong Hwang, Thi-Thu-Huong Le, Junyoung Son. &quot;Performance Analysis of Signing Algorithms and Integrity Enhancement Techniques for MAVLink in PX4&quot;. ICAIIC 2025.\"><span class=\"mb-latest-item-title-text\">Kyeongmin Lee, Yeonjeong Hwang, Thi-Thu-Huong Le, Junyoung Son. &quot;Performance Analysis of Signing Algorithms and Integrity Enhancement Techniques for MAVLink in PX4&quot;. ICAIIC 2025.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=346\" title=\"Andro Aprila Adiputra, Ahmada Yusril Kadiptya, Thi-Thu-Huong Le, Junyoung Son, Howon Kim. &quot;Enhancing Contextual Understanding with Multimodal Siamese Networks Using Contrastive Loss and Text Embeddings&quot;. ICAIIC 2025\"><span class=\"mb-latest-item-title-text\">Andro Aprila Adiputra, Ahmada Yusril Kadiptya, Thi-Thu-Huong Le, Junyoung Son, Howon Kim. &quot;Enhancing Contextual Understanding with Multimodal Siamese Networks Using Contrastive Loss and Text Embeddings&quot;. ICAIIC 2025<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=345\" title=\"Thi-Thu-Huong Le, Andro Aprila Adiputra, Yeonjeong Hwang, Junyoung Son, Howon Kim. &quot;Fine-Tuning Transformer LLMs for Detecting SQL Injection and XSS Vulnerabilities&quot;. ICAIIC 2025.\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Andro Aprila Adiputra, Yeonjeong Hwang, Junyoung Son, Howon Kim. &quot;Fine-Tuning Transformer LLMs for Detecting SQL Injection and XSS Vulnerabilities&quot;. ICAIIC 2025.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=343\" title=\"Thi-Thu-Huong Le, Andro Aprila Adiputra, Muhammad Iqbal, Yeonjeong Hwang, Howon Kim. Credit Card Fraud Detection Using Hybrid Sampling and Variant Deep Learning Models. PlatCon 2024. \"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Andro Aprila Adiputra, Muhammad Iqbal, Yeonjeong Hwang, Howon Kim. Credit Card Fraud Detection Using Hybrid Sampling and Variant Deep Learning Models. PlatCon 2024. <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=342\" title=\"Thi-Thu-Huong Le, Jiwon Yun, Jaehyun Kim, Andro Aprila Adiputra, Howon Kim. Robust MQTT IoT Intrusion Detection Systems Using Boosting and Bagging Models. PlatCon 2024. \"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Jiwon Yun, Jaehyun Kim, Andro Aprila Adiputra, Howon Kim. Robust MQTT IoT Intrusion Detection Systems Using Boosting and Bagging Models. PlatCon 2024. <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=341\" title=\"Yeonjeong Hwang, Thi-Thu-Huong Le, Rini Wisnu Wardhani, Dedy Septono Catur Puranto, Howon Kim. Enhancing SQL Injection Detection Using Ensemble Learning and Boosting Models. PlatCon 2024.\"><span class=\"mb-latest-item-title-text\">Yeonjeong Hwang, Thi-Thu-Huong Le, Rini Wisnu Wardhani, Dedy Septono Catur Puranto, Howon Kim. Enhancing SQL Injection Detection Using Ensemble Learning and Boosting Models. PlatCon 2024.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=340\" title=\"Jaehyun Kim, Thi-Thu-Huong Le, Sangmyeong Lee, Howon Kim. Leveraging Fine-Tuning DistilBERT for Detecting Vulnerabilities in Ethereum Smart Contracts. PlatCon 2024.\"><span class=\"mb-latest-item-title-text\">Jaehyun Kim, Thi-Thu-Huong Le, Sangmyeong Lee, Howon Kim. Leveraging Fine-Tuning DistilBERT for Detecting Vulnerabilities in Ethereum Smart Contracts. PlatCon 2024.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=328\" title=\"Thi-Thu-Huong Le, Naufal Suryanto, Howon Kim, Janghyun Ji, Shinwook Heo, \u201cEnhancing Intrusion Detection and Explanations for Imbalanced Vehicle CAN Network Data\u201d, The 12th International Symposium on Information and Communication Technology, Ho Chi Minh, Vietnam, December 2023, DOI: https:\/\/doi.org\/10.1145\/3628797.3628994.   \"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Naufal Suryanto, Howon Kim, Janghyun Ji, Shinwook Heo, \u201cEnhancing Intrusion Detection and Explanations for Imbalanced Vehicle CAN Network Data\u201d, The 12th International Symposium on Information and Communication Technology, Ho Chi Minh, Vietnam, December 2023, DOI: https:\/\/doi.org\/10.1145\/3628797.3628994.   <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=326\" title=\"H. T. Larasati, M. Firdaus and H. Kim, &quot;Quantum Federated Learning: Remarks and Challenges,&quot; 2022 IEEE 9th International Conference on Cyber Security and Cloud Computing (CSCloud)\/2022 IEEE 8th International Conference on Edge Computing and Scalable Cloud (EdgeCom), Xi&#039;an, China, 2022, pp. 1-5, doi: 10.1109\/CSCloud-EdgeCom54986.2022.00010.\"><span class=\"mb-latest-item-title-text\">H. T. Larasati, M. Firdaus and H. Kim, &quot;Quantum Federated Learning: Remarks and Challenges,&quot; 2022 IEEE 9th International Conference on Cyber Security and Cloud Computing (CSCloud)\/2022 IEEE 8th International Conference on Edge Computing and Scalable Cloud (EdgeCom), Xi&#039;an, China, 2022, pp. 1-5, doi: 10.1109\/CSCloud-EdgeCom54986.2022.00010.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=324\" title=\"Aji Teguh Prihatno; Hyoeun Kang; Chang Woo Choi; Thi-Thu-Huong Le; Shinwook Heo; Myeongkil Kim; Howon Kim(2023, February). 2D Fluid Flows Prediction Based on U-Net Architecture. In 2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC) (pp. 452-456). IEEE, doi.org\/10.1109\/ICAIIC57133.2023.10066980. \"><span class=\"mb-latest-item-title-text\">Aji Teguh Prihatno; Hyoeun Kang; Chang Woo Choi; Thi-Thu-Huong Le; Shinwook Heo; Myeongkil Kim; Howon Kim(2023, February). 2D Fluid Flows Prediction Based on U-Net Architecture. In 2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC) (pp. 452-456). IEEE, doi.org\/10.1109\/ICAIIC57133.2023.10066980. <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=315\" title=\"D. Kim, U. Jo, Y. Kim, Y. E. Oktian and H. Kim, &quot;Design and Implementation of a Blockchain Based Interworking of oneM2M and LWM2M IoT Systems,&quot; Journal of Information Processing Systems, vol. 19, no. 1, pp. 89-97, 2023. DOI: 10.3745\/JIPS.01.0093.\"><span class=\"mb-latest-item-title-text\">D. Kim, U. Jo, Y. Kim, Y. E. Oktian and H. Kim, &quot;Design and Implementation of a Blockchain Based Interworking of oneM2M and LWM2M IoT Systems,&quot; Journal of Information Processing Systems, vol. 19, no. 1, pp. 89-97, 2023. DOI: 10.3745\/JIPS.01.0093.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=313\" title=\"Naufal Suryanto, Yongsu Kim, Hyoeun Kang, Harashta Tatimma Larasati, Youngyeo Yun, Thi-Thu-Huong Le, Hunmin Yang, Se-Yoon Oh, Howon Kim &quot;DTA: Physical Camouflage Attacks using Differentiable Transformation Network&quot;, Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2022, pp. 15305-15314\"><span class=\"mb-latest-item-title-text\">Naufal Suryanto, Yongsu Kim, Hyoeun Kang, Harashta Tatimma Larasati, Youngyeo Yun, Thi-Thu-Huong Le, Hunmin Yang, Se-Yoon Oh, Howon Kim &quot;DTA: Physical Camouflage Attacks using Differentiable Transformation Network&quot;, Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2022, pp. 15305-15314<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=312\" title=\"Thi-Thu-Huong Le, Hyeoun Kang, Howon Kim (Feb 2019), \u201cThe Impact of PCA-Scale Improving GRU Performance for Intrusion Detection\u201d, PlatCon2019, IEEE, https:\/\/ieeexplore.ieee.org\/document\/8668960.\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Hyeoun Kang, Howon Kim (Feb 2019), \u201cThe Impact of PCA-Scale Improving GRU Performance for Intrusion Detection\u201d, PlatCon2019, IEEE, https:\/\/ieeexplore.ieee.org\/document\/8668960.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=311\" title=\"Thi-Thu-Huong Le, Taehwan Park, Dongkeun Cho, Howon Kim (Jul 2018), \u201cAn Effective Classifier for DoS Attack in Wireless Sensor Network\u201d, (July 2018), The 10th International Conference on Ubiquitous and Future Networks (ICUNF), IEEE, https:\/\/ieeexplore.ieee.org\/document\/8436999.\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Taehwan Park, Dongkeun Cho, Howon Kim (Jul 2018), \u201cAn Effective Classifier for DoS Attack in Wireless Sensor Network\u201d, (July 2018), The 10th International Conference on Ubiquitous and Future Networks (ICUNF), IEEE, https:\/\/ieeexplore.ieee.org\/document\/8436999.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=310\" title=\"Thi-Thu-Huong Le, Jihyun Kim, Howon Kim (Feb 2017), \u201cAn Effective Intrusion Detection Classifier using Long Short-Term Memory with Gradient Descent Optimization\u201d,  In Proc. 2017 International Platform Technology and Service (PlatCon), DOI: 10.1109\/PlatCon.2017.7883684, pp. 1-6, https:\/\/ieeexplore.ieee.org\/abstract\/document\/7883684.\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Jihyun Kim, Howon Kim (Feb 2017), \u201cAn Effective Intrusion Detection Classifier using Long Short-Term Memory with Gradient Descent Optimization\u201d,  In Proc. 2017 International Platform Technology and Service (PlatCon), DOI: 10.1109\/PlatCon.2017.7883684, pp. 1-6, https:\/\/ieeexplore.ieee.org\/abstract\/document\/7883684.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=309\" title=\"Thi-Thu-Huong Le, Jihyun Kim, Howon Kim (Jul 2016), \u201cClassification Performance using Gated Recurrent Unit Recurrent Neural Network on Energy Disaggregation\u201d, In proceeding 2016 International Conference on Machine Learning and Cybernetics (ICMLC) (Rank B3), ISSN: 2160-1348, pp.105-110, DOI: 10.1109\/ICMLC.2016.7860885, https:\/\/ieeexplore.ieee.org\/document\/7860885.\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Jihyun Kim, Howon Kim (Jul 2016), \u201cClassification Performance using Gated Recurrent Unit Recurrent Neural Network on Energy Disaggregation\u201d, In proceeding 2016 International Conference on Machine Learning and Cybernetics (ICMLC) (Rank B3), ISSN: 2160-1348, pp.105-110, DOI: 10.1109\/ICMLC.2016.7860885, https:\/\/ieeexplore.ieee.org\/document\/7860885.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=308\" title=\"Jihyun Kim, Jaehyun Kim, Huong Le Thi Thu, and Howon Kim (Feb 2016), \u201cLong Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection\u201d, In proceeding on the International Conference on Platform Technology and Service, pp.1-5, DOI: 10.1109\/PlatCon.2016.7456805, https:\/\/ieeexplore.ieee.org\/document\/7456805.\"><span class=\"mb-latest-item-title-text\">Jihyun Kim, Jaehyun Kim, Huong Le Thi Thu, and Howon Kim (Feb 2016), \u201cLong Short Term Memory Recurrent Neural Network Classifier for Intrusion Detection\u201d, In proceeding on the International Conference on Platform Technology and Service, pp.1-5, DOI: 10.1109\/PlatCon.2016.7456805, https:\/\/ieeexplore.ieee.org\/document\/7456805.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=237\" title=\"U. Jo, Y. E. Oktian, D. Kim, S. Oh, H. Lee and H. Kim, &quot;A Zero-Knowledge-Range-Proof-based Privacy-Preserving Blockchain Platform for COVID-19 Contact Tracing,&quot; 2022 International Conference on Platform Technology and Service (PlatCon), Jeju, Korea, Republic of, 2022, pp. 53-58, doi: 10.1109\/PlatCon55845.2022.9932053.\"><span class=\"mb-latest-item-title-text\">U. Jo, Y. E. Oktian, D. Kim, S. Oh, H. Lee and H. Kim, &quot;A Zero-Knowledge-Range-Proof-based Privacy-Preserving Blockchain Platform for COVID-19 Contact Tracing,&quot; 2022 International Conference on Platform Technology and Service (PlatCon), Jeju, Korea, Republic of, 2022, pp. 53-58, doi: 10.1109\/PlatCon55845.2022.9932053.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=236\" title=\"T. -T. -H. Le, H. T. Larasati, A. T. Prihatno and H. Kim, &quot;A Review of Dataset Distillation for Deep Learning,&quot; 2022 International Conference on Platform Technology and Service (PlatCon), Jeju, Korea, Republic of, 2022, pp. 34-37, doi: 10.1109\/PlatCon55845.2022.9932086.\"><span class=\"mb-latest-item-title-text\">T. -T. -H. Le, H. T. Larasati, A. T. Prihatno and H. Kim, &quot;A Review of Dataset Distillation for Deep Learning,&quot; 2022 International Conference on Platform Technology and Service (PlatCon), Jeju, Korea, Republic of, 2022, pp. 34-37, doi: 10.1109\/PlatCon55845.2022.9932086.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=235\" title=\"H. T. Larasati, T. -T. -H. Le and H. Kim, &quot;Trends of Quantum Computing Applications to Computer Vision,&quot; 2022 International Conference on Platform Technology and Service (PlatCon), Jeju, Korea, Republic of, 2022, pp. 7-12, doi: 10.1109\/PlatCon55845.2022.9932103.\"><span class=\"mb-latest-item-title-text\">H. T. Larasati, T. -T. -H. Le and H. Kim, &quot;Trends of Quantum Computing Applications to Computer Vision,&quot; 2022 International Conference on Platform Technology and Service (PlatCon), Jeju, Korea, Republic of, 2022, pp. 7-12, doi: 10.1109\/PlatCon55845.2022.9932103.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=234\" title=\"Awaludin, A.M., Pratama, D., Kim, H. (2021). AnyTRNG: Generic, High-Throughput, Low-Area True Random Number Generator Based on Synchronous Edge Sampling. In: Kim, H. (eds) Information Security Applications. WISA 2021. Lecture Notes in Computer Science(), vol 13009. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-89432-0_13\"><span class=\"mb-latest-item-title-text\">Awaludin, A.M., Pratama, D., Kim, H. (2021). AnyTRNG: Generic, High-Throughput, Low-Area True Random Number Generator Based on Synchronous Edge Sampling. In: Kim, H. (eds) Information Security Applications. WISA 2021. Lecture Notes in Computer Science(), vol 13009. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-89432-0_13<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=233\" title=\"Larasati, H.T., Kim, H. (2021). Quantum Cryptanalysis Landscape of Shor\u2019s Algorithm for Elliptic Curve Discrete Logarithm Problem. In: Kim, H. (eds) Information Security Applications. WISA 2021. Lecture Notes in Computer Science(), vol 13009. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-89432-0_8\"><span class=\"mb-latest-item-title-text\">Larasati, H.T., Kim, H. (2021). Quantum Cryptanalysis Landscape of Shor\u2019s Algorithm for Elliptic Curve Discrete Logarithm Problem. In: Kim, H. (eds) Information Security Applications. WISA 2021. Lecture Notes in Computer Science(), vol 13009. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-030-89432-0_8<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=231\" title=\"H. T. Larasati and H. Kim, &quot;Simulation of Modular Exponentiation Circuit for Shor&#039;s Algorithm in Qiskit,&quot; 2020 14th International Conference on Telecommunication Systems, Services, and Applications (TSSA, Bandung, Indonesia, 2020, pp. 1-7, doi: 10.1109\/TSSA51342.2020.9310794.\"><span class=\"mb-latest-item-title-text\">H. T. Larasati and H. Kim, &quot;Simulation of Modular Exponentiation Circuit for Shor&#039;s Algorithm in Qiskit,&quot; 2020 14th International Conference on Telecommunication Systems, Services, and Applications (TSSA, Bandung, Indonesia, 2020, pp. 1-7, doi: 10.1109\/TSSA51342.2020.9310794.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=220\" title=\"Asep Muhamad Awaludin, Derry Pratama, and Howon Kim. &quot;AnyTRNG: Generic, High-Throughput, Low-Area True Random Number Generator Based on Synchronous Edge Sampling.&quot; International Conference on Information Security Applications. Springer, Cham, 2021.\"><span class=\"mb-latest-item-title-text\">Asep Muhamad Awaludin, Derry Pratama, and Howon Kim. &quot;AnyTRNG: Generic, High-Throughput, Low-Area True Random Number Generator Based on Synchronous Edge Sampling.&quot; International Conference on Information Security Applications. Springer, Cham, 2021.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=213\" title=\"Yongsu Kim, Hyoeun Kang, Afifatul Mukaroh, Naufal Suryanto, Harashta Tatimma Larasati, Howon Kim, &quot;Spatially Localized Perturbation GAN (SLP-GAN) for Generating Invisible Adversarial Patches.&quot; International Conference on Information Security Applications. Springer, Cham, 2020.\"><span class=\"mb-latest-item-title-text\">Yongsu Kim, Hyoeun Kang, Afifatul Mukaroh, Naufal Suryanto, Harashta Tatimma Larasati, Howon Kim, &quot;Spatially Localized Perturbation GAN (SLP-GAN) for Generating Invisible Adversarial Patches.&quot; International Conference on Information Security Applications. Springer, Cham, 2020.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=208\" title=\"Yongsu Kim, Sanghyun Lee, Howon Kim, &quot;A Real-time System to Predict Photovoltaic Power Generation of the Desired Time Section&quot;, FUTECH, 2020.01\"><span class=\"mb-latest-item-title-text\">Yongsu Kim, Sanghyun Lee, Howon Kim, &quot;A Real-time System to Predict Photovoltaic Power Generation of the Desired Time Section&quot;, FUTECH, 2020.01<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=181\" title=\"Hwajeong Seo, Howon Kim, \u201cMulti-precision Multiplication for Public Key Cryptography on Embedded Microprocessors,\u201d WISA\u201912, 2012. 8 \"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Howon Kim, \u201cMulti-precision Multiplication for Public Key Cryptography on Embedded Microprocessors,\u201d WISA\u201912, 2012. 8 <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=81\" title=\"Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Zhi Hu, Lu Zhou, Yasuyuki Nogami, Youwen Zhu, and Howon Kim, \u201cParallel Implementations of LEA, Revisited\u201d, WISA 2016, 2016.8\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Taehwan Park, Shinwook Heo, Gyuwon Seo, Bongjin Bae, Zhi Hu, Lu Zhou, Yasuyuki Nogami, Youwen Zhu, and Howon Kim, \u201cParallel Implementations of LEA, Revisited\u201d, WISA 2016, 2016.8<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=80\" title=\"Jongseok Choi, Jong-gyu Park, Shinwook Heo, Namje Park, Howon Kim, \u201cSlowloris DoS Countermeasure over WebSocket\u201d, WISA 2016, 2016.8\"><span class=\"mb-latest-item-title-text\">Jongseok Choi, Jong-gyu Park, Shinwook Heo, Namje Park, Howon Kim, \u201cSlowloris DoS Countermeasure over WebSocket\u201d, WISA 2016, 2016.8<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=79\" title=\"Hwajeong Seo, Zhe Liu, Jongseok Choi , Howon Kim, \u201cMulti-Precision Squaring for Public-key Cryptography on Embedded Microprocessors, A Step Forward\u201d, WISA 2016, 2016.8\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Zhe Liu, Jongseok Choi , Howon Kim, \u201cMulti-Precision Squaring for Public-key Cryptography on Embedded Microprocessors, A Step Forward\u201d, WISA 2016, 2016.8<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=78\" title=\"Thi-Thu-Huong Le, Jihyun Kim, Howon Kim, \u201cThe impact of activation functions applying to recurrent neural network on Intrusion Detection\u201d, MITA 2016, 2016.7\"><span class=\"mb-latest-item-title-text\">Thi-Thu-Huong Le, Jihyun Kim, Howon Kim, \u201cThe impact of activation functions applying to recurrent neural network on Intrusion Detection\u201d, MITA 2016, 2016.7<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=77\" title=\"Taehwan Park, Hwajeong Seo, Howon Kim. \u201cParallel Implementations of SIMON and SPECK.\u201d 2016 International Conference on Platform Technology and Service (PlatCon). IEEE, 2016\"><span class=\"mb-latest-item-title-text\">Taehwan Park, Hwajeong Seo, Howon Kim. \u201cParallel Implementations of SIMON and SPECK.\u201d 2016 International Conference on Platform Technology and Service (PlatCon). IEEE, 2016<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=76\" title=\"Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou, Howon Kim, \u201cFaster ECC over F_{2^521-1} (feat. NEON),\u201d ICISC2015. 2015. 11.\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Lu Zhou, Howon Kim, \u201cFaster ECC over F_{2^521-1} (feat. NEON),\u201d ICISC2015. 2015. 11.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=75\" title=\"Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Gro\u00dfsch\u00e4dl, Howon Kim, Ingrid Verbauwhede, \u201cEfficient Ring-LWE Encryption on 8-bit AVR Processors,\u201d CHES2015.\"><span class=\"mb-latest-item-title-text\">Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Gro\u00dfsch\u00e4dl, Howon Kim, Ingrid Verbauwhede, \u201cEfficient Ring-LWE Encryption on 8-bit AVR Processors,\u201d CHES2015.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=74\" title=\"Taehwan Park, Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim, \u201cCompact Implementations of LSH,\u201d WISA2015. 2015. 8.\"><span class=\"mb-latest-item-title-text\">Taehwan Park, Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim, \u201cCompact Implementations of LSH,\u201d WISA2015. 2015. 8.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=73\" title=\"Hwajeong Seo, Zhe Liu, Taehwan Park, Jongseok Choi, Howon Kim, \u201cCompact Implementations of LEA Block Cipher for Low-End Microprocessors,\u201d WISA2015. 2015. 8.\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Zhe Liu, Taehwan Park, Jongseok Choi, Howon Kim, \u201cCompact Implementations of LEA Block Cipher for Low-End Microprocessors,\u201d WISA2015. 2015. 8.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=72\" title=\"Jihyun Kim, Howon Kim, \u201cApplying Recurrent Neural Network to Intrusion Detection with Hessian Free Optimization,\u201d WISA2015. 2015. 8.\"><span class=\"mb-latest-item-title-text\">Jihyun Kim, Howon Kim, \u201cApplying Recurrent Neural Network to Intrusion Detection with Hessian Free Optimization,\u201d WISA2015. 2015. 8.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=71\" title=\"Hwajeong Seo, Chien Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim, \u201cSecure Binary Field Multiplication,\u201d WISA2015. 2015. 8.\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Chien Ning Chen, Zhe Liu, Yasuyuki Nogami, Taehwan Park, Jongseok Choi, Howon Kim, \u201cSecure Binary Field Multiplication,\u201d WISA2015. 2015. 8.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=70\" title=\"Hwajeong Seo, Zhe Liu, Gyuwon Seo, Taehwan Park, Jongseok Choi, Howon Kim, \u201cOpen Sesame! Hacking the Password,\u201d WISA2015. 2015. 8.\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Zhe Liu, Gyuwon Seo, Taehwan Park, Jongseok Choi, Howon Kim, \u201cOpen Sesame! Hacking the Password,\u201d WISA2015. 2015. 8.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=69\" title=\"Yasuyuki Nogami, Hwajeong Seo, \u201cDiscrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree 1,\u201d ICISC2014. 2014. 12.\"><span class=\"mb-latest-item-title-text\">Yasuyuki Nogami, Hwajeong Seo, \u201cDiscrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree 1,\u201d ICISC2014. 2014. 12.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=68\" title=\"Hwajeong Seo, Zhe Liu, Jongseok Choi, Johann Groszschaedl, Howon Kim, \u201cMontgomery Modular Multiplication on ARM-NEON Revisited,\u201d ICISC2014. 2014. 12.\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Zhe Liu, Jongseok Choi, Johann Groszschaedl, Howon Kim, \u201cMontgomery Modular Multiplication on ARM-NEON Revisited,\u201d ICISC2014. 2014. 12.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=67\" title=\"Zhe Liu, Hwajeong Seo, Howon Kim and Johann Gro\u00dfsch\u00e4dl, \u201cReverse Product-Scanning Multiplication on 8-bit AVR Processors: Tradeoffs between Performance, Code Size and Scalability\u201d, ICICS2014, 2014. 12\"><span class=\"mb-latest-item-title-text\">Zhe Liu, Hwajeong Seo, Howon Kim and Johann Gro\u00dfsch\u00e4dl, \u201cReverse Product-Scanning Multiplication on 8-bit AVR Processors: Tradeoffs between Performance, Code Size and Scalability\u201d, ICICS2014, 2014. 12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=66\" title=\"Ha V. Nguyen, Hwajeong Seo and Howon Kim, \u201cProspective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA\u201d, FDSE2014. 2014. 11\"><span class=\"mb-latest-item-title-text\">Ha V. Nguyen, Hwajeong Seo and Howon Kim, \u201cProspective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA\u201d, FDSE2014. 2014. 11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=65\" title=\"Zhe Liu, Hwajeong Seo, Zhi Hu, Xinyi Hunag, Johann Gro\u00dfsch\u00e4dl, \u201cEfficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks\u201d, ASIA CCS\u201915, 2014.10.30\"><span class=\"mb-latest-item-title-text\">Zhe Liu, Hwajeong Seo, Zhi Hu, Xinyi Hunag, Johann Gro\u00dfsch\u00e4dl, \u201cEfficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks\u201d, ASIA CCS\u201915, 2014.10.30<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=64\" title=\"Hwajeong Seo, Howon Kim, \u201cMulti-precision Squaring on MSP and ARM processors,\u201d ICTC\u201914, 2014.\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Howon Kim, \u201cMulti-precision Squaring on MSP and ARM processors,\u201d ICTC\u201914, 2014.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=63\" title=\"Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim, \u201cImproved Modular Multiplication for Optimal Prime Fields,\u201d WISA\u201914, 2014. 8\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim, \u201cImproved Modular Multiplication for Optimal Prime Fields,\u201d WISA\u201914, 2014. 8<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=62\" title=\"Yeoncheol Lee, Hwajeong Seo, Howon Kim, \u201cThe Unified Hardware Design for GCM and SGCM,\u201d WISA\u201914, 2014. 8 .\"><span class=\"mb-latest-item-title-text\">Yeoncheol Lee, Hwajeong Seo, Howon Kim, \u201cThe Unified Hardware Design for GCM and SGCM,\u201d WISA\u201914, 2014. 8 .<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=61\" title=\"Jihyun Kim, Howon Kim, \u201cThe Prediction and Classification of Family Type by using Power Consumption Model over Smart Grid\u201d, International Conference on Aritificial Intelligence 14, Vol. 2, pp.555-560, 2014 \"><span class=\"mb-latest-item-title-text\">Jihyun Kim, Howon Kim, \u201cThe Prediction and Classification of Family Type by using Power Consumption Model over Smart Grid\u201d, International Conference on Aritificial Intelligence 14, Vol. 2, pp.555-560, 2014 <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=60\" title=\"Hwajeong Seo, Jongseok Choi, Hyunjin Kim, Taehwan Park, Howon Kim, \u201cPseudo Random Number Generator and Hash Function for Embedded Microprocessors,\u201d WF-IoT 2014. Mar. 2014.\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Jongseok Choi, Hyunjin Kim, Taehwan Park, Howon Kim, \u201cPseudo Random Number Generator and Hash Function for Embedded Microprocessors,\u201d WF-IoT 2014. Mar. 2014.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=59\" title=\"Hwajeong Seo, Jongseok Choi, Hyunjin Kim, Taehwan Park, Howon Kim, \u201cSurveillance System with Light Sensor,\u201d WF-IoT 2014. Mar. 2014.\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Jongseok Choi, Hyunjin Kim, Taehwan Park, Howon Kim, \u201cSurveillance System with Light Sensor,\u201d WF-IoT 2014. Mar. 2014.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=58\" title=\"Jongseok Choi, Hwajeong Seo, Howon Kim, \u201cTRAPA Three-way RFID Authentication preserving Anonymity\u201d, UCES2013, 2013, 12\"><span class=\"mb-latest-item-title-text\">Jongseok Choi, Hwajeong Seo, Howon Kim, \u201cTRAPA Three-way RFID Authentication preserving Anonymity\u201d, UCES2013, 2013, 12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=57\" title=\"Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim, \u201cMultiprecision Squaring for Public Key Cryptography on Embedded Microprocessors\u201d INDOCRYPT13, 2013. 12\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim, \u201cMultiprecision Squaring for Public Key Cryptography on Embedded Microprocessors\u201d INDOCRYPT13, 2013. 12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=56\" title=\"Hwajeong Seo,Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Howon Kim, \u201cHigh Performance LEA Design on FPGA\u201d, UCES2013, 2013, 12\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo,Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Howon Kim, \u201cHigh Performance LEA Design on FPGA\u201d, UCES2013, 2013, 12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=55\" title=\"Donggeon Lee, Hwajeong Seo, Howon Kim, \u201cMetastability-based Feedback Method for Enhancing FPGA-based TRNG\u201d, ICCA 2013, Nov 2013.\"><span class=\"mb-latest-item-title-text\">Donggeon Lee, Hwajeong Seo, Howon Kim, \u201cMetastability-based Feedback Method for Enhancing FPGA-based TRNG\u201d, ICCA 2013, Nov 2013.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=54\" title=\"Hwajeong Seo, Zhe Liu, Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Jongseok Choi, Howon Kim, \u201cParallel Implementations of LEA\u201d, ICISC2013, 2013, 11.\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Zhe Liu, Taehwan Park, Hyunjin Kim, Yeoncheol Lee, Jongseok Choi, Howon Kim, \u201cParallel Implementations of LEA\u201d, ICISC2013, 2013, 11.<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=53\" title=\"Zhe Liu, Hwajeong Seo, Johann Grobschadl, Howon Kim, \u201cEfficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes,\u201d ICICS\u201913, 2013. 11\"><span class=\"mb-latest-item-title-text\">Zhe Liu, Hwajeong Seo, Johann Grobschadl, Howon Kim, \u201cEfficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes,\u201d ICICS\u201913, 2013. 11<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=52\" title=\"Hwajeong Seo, Taehae Kim, Howon Kim, \u201cA Three Dimensional Location based Two Factor TL-OTP Protocol,\u201d WTA\u201913, 2013. 9\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Taehae Kim, Howon Kim, \u201cA Three Dimensional Location based Two Factor TL-OTP Protocol,\u201d WTA\u201913, 2013. 9<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=51\" title=\"Jihyun Kim, Howon Kim, \u201cAnalysis for Memory Reduction of the UOV Scheme with the Application fo PRNG\u201d, International Journal of Computer and Communication Engineering, Vol. 2, No. 3, pp.363-367 , 2013. 5 \"><span class=\"mb-latest-item-title-text\">Jihyun Kim, Howon Kim, \u201cAnalysis for Memory Reduction of the UOV Scheme with the Application fo PRNG\u201d, International Journal of Computer and Communication Engineering, Vol. 2, No. 3, pp.363-367 , 2013. 5 <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=50\" title=\"Jongseok Choi, Howon Kim, \u201cEnhanced Attribute-Based Proxy Re-Encryption for Home Network\u201d, International Journal of Computer and Communication Engineering, Vol. 2, No. 3, pp. 299-303, 2013. 5\"><span class=\"mb-latest-item-title-text\">Jongseok Choi, Howon Kim, \u201cEnhanced Attribute-Based Proxy Re-Encryption for Home Network\u201d, International Journal of Computer and Communication Engineering, Vol. 2, No. 3, pp. 299-303, 2013. 5<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=49\" title=\"Yunjin Lee, Howon Kim, \u201cInsider Attack Resistant OTP(One-Time-Password) Based on Bilinear Maps\u201d, International Journal of Computer and Communication Engineering, Vol. 2, No. 3, pp. 304-308, 2013. 5\"><span class=\"mb-latest-item-title-text\">Yunjin Lee, Howon Kim, \u201cInsider Attack Resistant OTP(One-Time-Password) Based on Bilinear Maps\u201d, International Journal of Computer and Communication Engineering, Vol. 2, No. 3, pp. 304-308, 2013. 5<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=48\" title=\"Hwajeong Seo, Howon Kim, \u201cOptimized Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors\u201d, International Journal of Computer and Communication Engineering, Vol. 2, No. 3, pp. 255-259, 2013. 5 \"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Howon Kim, \u201cOptimized Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors\u201d, International Journal of Computer and Communication Engineering, Vol. 2, No. 3, pp. 255-259, 2013. 5 <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=47\" title=\"Dynamic Tag Identity-Based Encryption Scheme for Logistics System\"><span class=\"mb-latest-item-title-text\">Dynamic Tag Identity-Based Encryption Scheme for Logistics System<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=46\" title=\"Jihyun Kim, Yanghyun Kwon, Yunjin Lee, Jungtaek Seo, and Howon Kim, \u201cAccess Control Mechanism supporting Scalability, Interoperability and Flexibility of Multi-Domain Smart Grid System\u201d, Information Science and Industrial Applications, 2012. 6 \"><span class=\"mb-latest-item-title-text\">Jihyun Kim, Yanghyun Kwon, Yunjin Lee, Jungtaek Seo, and Howon Kim, \u201cAccess Control Mechanism supporting Scalability, Interoperability and Flexibility of Multi-Domain Smart Grid System\u201d, Information Science and Industrial Applications, 2012. 6 <\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=45\" title=\"Jongseok Choi and Howon Kim, \u201cDesigning Secure SMS Scheme on Android OS\u201d, ISA 2012, 2012.4\"><span class=\"mb-latest-item-title-text\">Jongseok Choi and Howon Kim, \u201cDesigning Secure SMS Scheme on Android OS\u201d, ISA 2012, 2012.4<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=44\" title=\"Jongseok Choi and Howon Kim, \u201cBroadcast-Based Anonymous Authentication\u201d, CCA2012, 2012.3\"><span class=\"mb-latest-item-title-text\">Jongseok Choi and Howon Kim, \u201cBroadcast-Based Anonymous Authentication\u201d, CCA2012, 2012.3<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=43\" title=\"Hwajeong Seo, Howon Kim, \u201cThree-dimensional Localization System for Logistics Part,\u201d International Conference on IML 2012, 2012. 2\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Howon Kim, \u201cThree-dimensional Localization System for Logistics Part,\u201d International Conference on IML 2012, 2012. 2<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=42\" title=\"Hwajeong Seo, Howon Kim, \u201cZigbee Security for Visitors in Home Automation using Attribute Based Proxy Re-encryption\u201d, International Symposium on Consumer Electronics, 2011. 6\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Howon Kim, \u201cZigbee Security for Visitors in Home Automation using Attribute Based Proxy Re-encryption\u201d, International Symposium on Consumer Electronics, 2011. 6<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=41\" title=\"Hwajeong Seo, CheolSoo Kim, Howon Kim, \u201cZigBee Security For Home Automation Using Attribute-based Cryptography,\u201d,2011 IEEE International Conference on Consumer Electronics, pp 375-376, 2011, 01\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, CheolSoo Kim, Howon Kim, \u201cZigBee Security For Home Automation Using Attribute-based Cryptography,\u201d,2011 IEEE International Conference on Consumer Electronics, pp 375-376, 2011, 01<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=40\" title=\"Hwajeong Seo, Ahreum Hwang, Cheol Soo Kim, Howon Kim, \u201cSpeed Optimized Implementation of Hummingbird Cryptographic Algorithm on 16-Bit Microcontrollers,\u201d ICONI &amp; APIC-IST 2010 , 2010. 12\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Ahreum Hwang, Cheol Soo Kim, Howon Kim, \u201cSpeed Optimized Implementation of Hummingbird Cryptographic Algorithm on 16-Bit Microcontrollers,\u201d ICONI &amp; APIC-IST 2010 , 2010. 12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=39\" title=\"Seongyun Kim, Sangho Chu, Donggeon Lee, Howon Kim,\u201cOHLCAP based RFID Secure Protocol with Forward Secrecy\u201d, ICONI &amp; APIC-IST 2010, 2010. 12\"><span class=\"mb-latest-item-title-text\">Seongyun Kim, Sangho Chu, Donggeon Lee, Howon Kim,\u201cOHLCAP based RFID Secure Protocol with Forward Secrecy\u201d, ICONI &amp; APIC-IST 2010, 2010. 12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=38\" title=\"Hwajeong Seo, Cheol Soo Kim, Howon Kim,\u201dPerformance Enhancement of TinyECC based on the Multiplication Optimizations\u201dICONI &amp; APIC-IST 2010 , 2010. 12\"><span class=\"mb-latest-item-title-text\">Hwajeong Seo, Cheol Soo Kim, Howon Kim,\u201dPerformance Enhancement of TinyECC based on the Multiplication Optimizations\u201dICONI &amp; APIC-IST 2010 , 2010. 12<\/span><\/a><\/td><\/tr><tr><td class=\"mb-latest-item-title\"><a href=\"https:\/\/infosec.pusan.ac.kr\/index.php\/sub41_list\/?category1=\uad6d\uc81c\ud559\ud68c&#038;vid=37\" title=\"Dong-geon Lee, Seongyun Kim, Howon Kim,\u201cMobile Platform for Networked RFID Applications\u201d, ITNG 2010 Seventh International Conference on Information Technology : New Generations, 2010. 04\"><span class=\"mb-latest-item-title-text\">Dong-geon Lee, Seongyun Kim, Howon Kim,\u201cMobile Platform for Networked RFID Applications\u201d, ITNG 2010 Seventh International Conference on Information Technology : New Generations, 2010. 04<\/span><\/a><\/td><\/tr><\/tbody><\/table><\/div><\/div><\/div><\/div>\n<\/div>\n<div class=\"clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>SCI 60 \ud2b9\ud5c8 66 \ud504\ub85c\uc81d\ud2b8 44 SCI \uad6d\uc81c\ud559\uc220\ub300\ud68c \uad6d\ub0b4\ub17c\ubb38 \ubc0f \uad6d\ub0b4\ud559\uc220\ub300\ud68c \ud2b9\ud5c8\uc2e4\uc801 \ud504\ub85c\uc81d\ud2b8 \uad6d\uc81c\ud559\uc220\ub300\ud68c<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-sub4.php","meta":{"footnotes":""},"class_list":["post-8389","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages\/8389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/comments?post=8389"}],"version-history":[{"count":6,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages\/8389\/revisions"}],"predecessor-version":[{"id":8970,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/pages\/8389\/revisions\/8970"}],"wp:attachment":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/media?parent=8389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}