Yong Ho Hwang

Computer Science Department
Johns Hopkins University
E-mail: yhhwang at cs jhu edu
Office: 401 Wyman Park Building
Phone: (410) 516 7517
Fax: (410) 516 8457

Brief Bio.

I am a post-doctoral researcher in SPAR Lab./Computer Science at the Johns Hopkins University (JHU) with Prof. Giuseppe Ateniese. I obtained my Ph.D. and then worked as post-doc. in Electronic and Electrical Engineering from POSTECH (KOREA), where I was adived by Prof. Pil Joong Lee. My research interests are in the area of applied cryptography and Network security. Especially, I am interested in design and analysis of efficient and provably secure cryptographic schemes and protocols. My resume/CV is here.


Publication List

The copyrights for journal and conference proceedings papers generally belong to the publisher of the journal or proceedings. All papers may be downloaded for personal or research purposes only. Also check my DBLP entry
  1. Public Key Encryption with Conjunctive Keyword Search and its Extension to a Multi-User System
    by Yong Ho Hwang and Pil Joong Lee
    Pairing-based Cryptography - Pairing 2007, LNCS, 2007 (to appear).

  2. Efficient Broadcast Encryption Scheme with Log-Key Storage
    by Yong Ho Hwang and Pil Joong Lee
    Financial Cryptography and Data Security - FC 2006, LNCS vol.4107, pp.281-295, 2006.

  3. Efficient Public Key Broadcast Encryption using Identifier of Receivers
    by Jung Wook Lee, Yong Ho Hwang, and Pil Joong Lee
    Information Security Practice and Experience Conference - ISPEC 2006, LNCS vol.3903, pp.153-164, 2006.

  4. Timed-Release Encryption with Pre-open Capability and Its application to Certified E-mail System
    by Yong Ho Hwang, Dae Hyun Yum, and Pil Joong Lee
    Information Security - ISC 2005, LNCS vol.3650, pp.344-358, 2005.

  5. Practical Pay-TV Scheme using Traitor Tracing Scheme for Multiple Channels
    by Chong Hee Kim, Yong Ho Hwang, and Pil Joong Lee
    WISA 2004, LNCS vol.3325, pp.265-279, 2004.

  6. System for Preventing Counterfeiting of Retail Items using RFID tags
    by Sung Ho Yoo, Yong Ho Hwang, and Pil Joong Lee
    Pre-proceeding of Workshop on Information Security Applications 2004, pp.593-604

  7. TTS without Revocation Capability Secure against CCA2
    by Chong Hee Kim, Yong Ho Hwang, and Pil Joong Lee,
    Information Security and Privacy - ACISP 2004, LNCS vol.3108, pp.36-49, 2004.

  8. An Efficient Revocation Scheme for Stateless Receivers
    by Yong Ho Hwang, Chong Hee Kim, and Pil Joong Lee
    Public Key Infrastructure - EuroPKI 2004, LNCS vol.3093, pp.322-334, 2004.

  9. Bit-Serial Multipliers for Exponentiation and Division in GF(2^m) using Irreducible AOP
    by Yong Ho Hwang, Sang Gyoo Sim, and Pil Joong Lee
    Computational Science and Its Applications - ICCSA 2004, LNCS vol.3043, pp.442-450, 2004.

  10. An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
    by Chong Hee Kim, Yong Ho Hwang, and Pil Joong Lee
    Advances in Cryptology - ASIACRYPT 2003, LNCS vol.2894, pp.359-373, 2003.

  11. EPA: An Efficient Password-based Protocol for Authenticated key exchange
    by Yong Ho Hwang, Dae Hyun Yum, and Pil Joong Lee
    Information Security and Privacy - ACISP 2003, LNCS vol.2727, pp.452-463, 2003.

  12. An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers
    by Yong Ho Hwang, Chong Hee Kim, and Pil Joong Lee
    Information Security and Privacy - ACISP 2003, LNCS vol.2727, pp.377-386, 2003.

Last Updated: April 10, 2007