Jung Hee Cheon
Jung Hee Cheon
Professor of Department of Mathematical Sciences, Seoul National University
Adresse e-mail validée de
Citée par
Citée par
An identity-based signature from gap Diffie-Hellman groups
JC Choon, J Hee Cheon
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
Homomorphic encryption for arithmetic of approximate numbers
JH Cheon, A Kim, M Kim, Y Song
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
New public-key cryptosystem using braid groups
KH Ko, SJ Lee, JH Cheon, JW Han, J Kang, C Park
Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000
Batch fully homomorphic encryption over the integers
JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint, M Tibouchi, A Yun
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
Security analysis of the strong Diffie-Hellman problem
JH Cheon
Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference …, 2006
Cryptanalysis of the multilinear map over the integers
JH Cheon, K Han, C Lee, H Ryu, D Stehlé
Advances in Cryptology--EUROCRYPT 2015: 34th Annual International Conference …, 2015
Batch verifications with ID-based signatures
HJ Yoon, JH Cheon, Y Kim
Information Security and Cryptology–ICISC 2004: 7th International Conference …, 2005
Bootstrapping for approximate homomorphic encryption
JH Cheon, K Han, A Kim, M Kim, Y Song
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
Improved impossible differential cryptanalysis of Rijndael and Crypton
JH Cheon, MJ Kim, K Kim, L Jung-Yeun, SW Kang
Information Security and Cryptology—ICISC 2001: 4th International …, 2002
A full RNS variant of approximate homomorphic encryption
JH Cheon, K Han, A Kim, M Kim, Y Song
Selected Areas in Cryptography–SAC 2018: 25th International Conference …, 2019
Logistic regression model training based on the approximate homomorphic encryption
A Kim, Y Song, M Kim, K Lee, JH Cheon
BMC medical genomics 11 (4), 23-31, 2018
An analysis of proxy signatures: Is a secure channel necessary?
JY Lee, JH Cheon, S Kim
Topics in Cryptology—CT-RSA 2003: The Cryptographers’ Track at the RSA …, 2003
An efficient implementation of braid groups
JC Cha, KH Ko, SJ Lee, JW Han, JH Cheon
Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the …, 2001
Homomorphic computation of edit distance
JH Cheon, M Kim, K Lauter
Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015
An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero
JH Cheon, J Jeong, C Lee
LMS Journal of Computation and Mathematics 19 (A), 255-266, 2016
Fully homomophic encryption over the integers revisited
JH Cheon, D Stehlé
Advances in Cryptology--EUROCRYPT 2015: 34th Annual International Conference …, 2015
Encrypting controller using fully homomorphic encryption for security of cyber-physical systems
J Kim, C Lee, H Shim, JH Cheon, A Kim, M Kim, Y Song
IFAC-PapersOnLine 49 (22), 175-180, 2016
A polynomial time algorithm for the braid Diffie-Hellman conjugacy problem
JH Cheon, B Jun
Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology …, 2003
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma
A Bagherzandi, JH Cheon, S Jarecki
Proceedings of the 15th ACM conference on Computer and communications …, 2008
Lizard: Cut off the tail! A practical post-quantum public-key encryption from LWE and LWR
JH Cheon, D Kim, J Lee, Y Song
Security and Cryptography for Networks: 11th International Conference, SCN …, 2018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20