Follow
Duhyeong Kim
Title
Cited by
Cited by
Year
Lizard: Cut off the tail! A practical post-quantum public-key encryption from LWE and LWR
JH Cheon, D Kim, J Lee, Y Song
International Conference on Security and Cryptography for Networks, 160-177, 2018
1312018
Numerical Method for Comparison on Homomorphically Encrypted Numbers.
JH Cheon, D Kim, D Kim, HH Lee, K Lee
International Conference on the Theory and Application of Cryptology and …, 2019
1292019
Efficient homomorphic comparison methods with optimal complexity
JH Cheon, D Kim, D Kim
International Conference on the Theory and Application of Cryptology and …, 2020
1132020
Ensemble method for privacy-preserving logistic regression based on homomorphic encryption
JH Cheon, D Kim, Y Kim, Y Song
IEEE Access 6, 46938-46948, 2018
782018
Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation
M Kim, AO Harmanci, JP Bossuat, S Carpov, JH Cheon, I Chillotti, W Cho, ...
Cell systems 12 (11), 1108-1120. e4, 2021
632021
Remark on the security of ckks scheme in practice
JH Cheon, S Hong, D Kim
Cryptology ePrint Archive, 2020
412020
Towards a Practical Cluster Analysis over Encrypted Data
JH Cheon, D Kim, JH Park
International Conference on Selected Areas in Cryptography, 227-249, 2019
36*2019
RLizard: Post-quantum key encapsulation mechanism for IoT devices
J Lee, D Kim, H Lee, Y Lee, JH Cheon
IEEE Access 7, 2080-2091, 2018
292018
Privacy-preserving approximate GWAS computation based on homomorphic encryption
D Kim, Y Son, D Kim, A Kim, S Hong, JH Cheon
BMC Medical Genomics 13, 1-12, 2020
282020
Instant privacy-preserving biometric authentication for hamming distance
J Lee, D Kim, D Kim, Y Song, J Shin, JH Cheon
IACR Cryptol. ePrint Arch. 2018, 1214, 2018
222018
Approximate homomorphic encryption over the conjugate-invariant ring
D Kim, Y Song
Information Security and Cryptology–ICISC 2018: 21st International …, 2019
172019
Lizard
JH Cheon, S Park, J Lee, D Kim, Y Song, S Hong, D Kim, J Kim, SM Hong, ...
Technical report, National Institute of Standards and Technology. Available …, 2017
17*2017
Homomorphic Encryption as a secure PHM outsourcing solution for small and medium manufacturing enterprise
HED Kang, D Kim, S Kim, DD Kim, JH Cheon, BW Anthony
Journal of Manufacturing Systems 61, 856-865, 2021
142021
Faster Bootstrapping of FHE over the Integers
JH Cheon, K Han, D Kim
International Conference on Information Security and Cryptology, 242-259, 2019
142019
Terminal device performing homomorphic encryption, server device processing ciphertext and methods thereof
JH Cheon, D Kim, Y Song, K Han
US Patent 10,778,409, 2020
132020
Toward Practical Lattice-based Proof of Knowledge from Hint-MLWE
D Kim, D Lee, J Seo, Y Song
Annual International Cryptology Conference, 549-580, 2023
122023
A new trapdoor over module-NTRU lattice and its application to ID-based encryption
JH Cheon, D Kim, T Kim, Y Son
Cryptology ePrint Archive, 2019
92019
Faster Bootstrapping of FHE over the Integers
JH Cheon, K Han, D Kim
Cryptology ePrint Archive, 2017
82017
Faster amortized FHEW bootstrapping using ring automorphisms
G De Micheli, D Kim, D Micciancio, A Suhl
IACR International Conference on Public-Key Cryptography, 322-353, 2024
72024
Lattice-based secure biometric authentication for hamming distance
JH Cheon, D Kim, D Kim, J Lee, J Shin, Y Song
Information Security and Privacy: 26th Australasian Conference, ACISP 2021 …, 2021
52021
The system can't perform the operation now. Try again later.
Articles 1–20