Suivre
Taechan Kim
Taechan Kim
NTT Secure Platform Laboratories
Adresse e-mail validée de snu.ac.kr
Titre
Citée par
Citée par
Année
Extended tower number field sieve: A new complexity for the medium prime case
T Kim, R Barbulescu
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
2512016
Extended tower number field sieve: A new complexity for the medium prime case
T Kim, R Barbulescu
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
2512016
Extended tower number field sieve with application to finite fields of arbitrary composite extension degree
T Kim, J Jeong
Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017
68*2017
Lattice reductions over euclidean rings with applications to cryptanalysis
T Kim, C Lee
Cryptography and Coding: 16th IMA International Conference, IMACC 2017 …, 2017
222017
Improved elliptic curve hashing and point representation
M Tibouchi, T Kim
Designs, Codes and Cryptography 82, 161-177, 2017
202017
On the final exponentiation in Tate pairing computations
T Kim, S Kim, JH Cheon
IEEE Transactions on Information Theory 59 (6), 4033-4041, 2013
122013
Invalid curve attacks in a GLS setting
T Kim, M Tibouchi
Advances in Information and Computer Security: 10th International Workshop …, 2015
102015
Bit-flip faults on elliptic curve base fields, revisited
T Kim, M Tibouchi
Applied Cryptography and Network Security: 12th International Conference …, 2014
102014
Asymptotically faster multi-key homomorphic encryption from homomorphic gadget decomposition
T Kim, H Kwak, D Lee, J Seo, Y Song
Cryptology ePrint Archive, 2022
92022
A new trapdoor over module-NTRU lattice and its application to ID-based encryption
JH Cheon, D Kim, T Kim, Y Son
Cryptology ePrint Archive, 2019
72019
A new approach to the discrete logarithm problem with auxiliary inputs
JH Cheon, T Kim
LMS Journal of Computation and Mathematics 19 (1), 1-15, 2016
72016
A Group Action on and the Generalized DLP with Auxiliary Inputs
JH Cheon, T Kim, YS Song
Selected Areas in Cryptography--SAC 2013: 20th International Conference …, 2014
72014
Multiple discrete logarithm problems with auxiliary inputs
T Kim
Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2016
62016
A new approach to the discrete logarithm problem with auxiliary inputs
T Kim, JH Cheon
Cryptology ePrint Archive, 2012
62012
Discrete logarithm with auxiliary inputs
JH Cheon, T Kim
MSJ-KMS Joint Meeting 2012, 2012
52012
Equidistribution among cosets of elliptic curve points in intervals, 2019
T Kim, M Tibouchi
Number-Theoretic Methods in Cryptography (NutMic), 2019
42019
Accelerating the final exponentiation in the computation of the tate pairings
T Kim, S Kim, JH Cheon
Cryptology ePrint Archive, 2012
42012
Bit-flip faults on elliptic curve base fields
T Kim, M Tibouchi
Applied Cryptography and Network Security, 12th International Conference, 10-13, 2014
22014
Security Analysis of Group Action Inverse Problem with Auxiliary Inputs with Application to CSIDH Parameters
T Kim
Information Security and Cryptology–ICISC 2019: 22nd International …, 2020
12020
Equidistribution among cosets of elliptic curve points in intervals
T Kim, M Tibouchi
Journal of Mathematical Cryptology 14 (1), 339-345, 2020
12020
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20