Extended tower number field sieve: A new complexity for the medium prime case T Kim, R Barbulescu Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016 | 251 | 2016 |
Extended tower number field sieve: A new complexity for the medium prime case T Kim, R Barbulescu Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016 | 251 | 2016 |
Extended tower number field sieve with application to finite fields of arbitrary composite extension degree T Kim, J Jeong Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017 | 68* | 2017 |
Lattice reductions over euclidean rings with applications to cryptanalysis T Kim, C Lee Cryptography and Coding: 16th IMA International Conference, IMACC 2017 …, 2017 | 22 | 2017 |
Improved elliptic curve hashing and point representation M Tibouchi, T Kim Designs, Codes and Cryptography 82, 161-177, 2017 | 20 | 2017 |
On the final exponentiation in Tate pairing computations T Kim, S Kim, JH Cheon IEEE Transactions on Information Theory 59 (6), 4033-4041, 2013 | 12 | 2013 |
Invalid curve attacks in a GLS setting T Kim, M Tibouchi Advances in Information and Computer Security: 10th International Workshop …, 2015 | 10 | 2015 |
Bit-flip faults on elliptic curve base fields, revisited T Kim, M Tibouchi Applied Cryptography and Network Security: 12th International Conference …, 2014 | 10 | 2014 |
Asymptotically faster multi-key homomorphic encryption from homomorphic gadget decomposition T Kim, H Kwak, D Lee, J Seo, Y Song Cryptology ePrint Archive, 2022 | 9 | 2022 |
A new trapdoor over module-NTRU lattice and its application to ID-based encryption JH Cheon, D Kim, T Kim, Y Son Cryptology ePrint Archive, 2019 | 7 | 2019 |
A new approach to the discrete logarithm problem with auxiliary inputs JH Cheon, T Kim LMS Journal of Computation and Mathematics 19 (1), 1-15, 2016 | 7 | 2016 |
A Group Action on and the Generalized DLP with Auxiliary Inputs JH Cheon, T Kim, YS Song Selected Areas in Cryptography--SAC 2013: 20th International Conference …, 2014 | 7 | 2014 |
Multiple discrete logarithm problems with auxiliary inputs T Kim Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2016 | 6 | 2016 |
A new approach to the discrete logarithm problem with auxiliary inputs T Kim, JH Cheon Cryptology ePrint Archive, 2012 | 6 | 2012 |
Discrete logarithm with auxiliary inputs JH Cheon, T Kim MSJ-KMS Joint Meeting 2012, 2012 | 5 | 2012 |
Equidistribution among cosets of elliptic curve points in intervals, 2019 T Kim, M Tibouchi Number-Theoretic Methods in Cryptography (NutMic), 2019 | 4 | 2019 |
Accelerating the final exponentiation in the computation of the tate pairings T Kim, S Kim, JH Cheon Cryptology ePrint Archive, 2012 | 4 | 2012 |
Bit-flip faults on elliptic curve base fields T Kim, M Tibouchi Applied Cryptography and Network Security, 12th International Conference, 10-13, 2014 | 2 | 2014 |
Security Analysis of Group Action Inverse Problem with Auxiliary Inputs with Application to CSIDH Parameters T Kim Information Security and Cryptology–ICISC 2019: 22nd International …, 2020 | 1 | 2020 |
Equidistribution among cosets of elliptic curve points in intervals T Kim, M Tibouchi Journal of Mathematical Cryptology 14 (1), 339-345, 2020 | 1 | 2020 |