Howon Kim

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Quantum circuits for high-degree and half-multiplication for post-quantum analysis2024-05-31Paper
Efficient Software Implementation of Ring-LWE Encryption on IoT Processors
IEEE Transactions on Computers
2020-10-02Paper
Secure number theoretic transform and speed record for Ring-LWE encryption on embedded processors2018-06-15Paper
Secure GCM implementation on AVR
Discrete Applied Mathematics
2018-04-10Paper
Efficient ring-LWE encryption on 8-bit AVR processors2018-02-14Paper
Improved Computation of Square Roots in Specific Finite Fields
IEEE Transactions on Computers
2017-08-08Paper
Faster ECC over \(\mathbb {F}_{2^{521}-1}\) (feat. NEON)
Information Security and Cryptology - ICISC 2015
2016-05-19Paper
Parallel implementations of LEA
Information Security and Cryptology -- ICISC 2013
2015-10-16Paper
Montgomery modular multiplication on ARM-NEON revisited
Information Security and Cryptology - ICISC 2014
2015-09-11Paper
Efficient implementation of NIST-compliant elliptic curve cryptography for sensor nodes
Information and Communications Security
2014-09-29Paper
Multi-precision squaring for public-key cryptography on embedded microprocessors
Lecture Notes in Computer Science
2014-01-14Paper
An extension of TYT algorithm for \(GF((2^n)^m)\) using precomputation
Information Processing Letters
2009-08-27Paper
Secure Signed Radix-r Recoding Methods for Constrained-Embedded Devices
Information Security Practice and Experience
2009-04-02Paper
Compressed XTR
Applied Cryptography and Network Security
2009-03-10Paper
Efficient Exponentiation in GF(p m ) Using the Frobenius Map
Computational Science and Its Applications - ICCSA 2006
2009-02-12Paper
New Security Problem in RFID Systems “Tag Killing”
Computational Science and Its Applications - ICCSA 2006
2009-02-10Paper
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Cryptology and Network Security
2009-01-09Paper


Research outcomes over time


This page was built for person: Howon Kim