Batch fully homomorphic encryption over the integers JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint, M Tibouchi, A Yun Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013 | 498 | 2013 |
Measuring the mixing time of social graphs A Mohaisen, A Yun, Y Kim Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 383-389, 2010 | 240 | 2010 |
Quantum Security of NMAC and Related Constructions: PRF Domain Extension Against Quantum attacks F Song, A Yun Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017 | 198 | 2017 |
On protecting integrity and confidentiality of cryptographic file system for outsourced storage A Yun, C Shi, Y Kim Proceedings of the 2009 ACM workshop on Cloud computing security, 67-76, 2009 | 112 | 2009 |
A simple variant of the Merkle-Damgård scheme with a permutation S Hirose, JH Park, A Yun International Conference on the Theory and Application of Cryptology and …, 2007 | 96 | 2007 |
On homomorphic signatures for network coding A Yun, JH Cheon, Y Kim IEEE Transactions on Computers 59 (9), 1295-1296, 2010 | 78 | 2010 |
CRT-based fully homomorphic encryption over the integers J Kim, MS Lee, A Yun, JH Cheon Cryptology ePrint Archive, 2013 | 57 | 2013 |
CRT-based fully homomorphic encryption over the integers JH Cheon, J Kim, MS Lee, A Yun Information Sciences 310, 149-162, 2015 | 51 | 2015 |
General linear group action on tensors: A candidate for post-quantum cryptography Z Ji, Y Qiao, F Song, A Yun Theory of cryptography conference, 251-281, 2019 | 45 | 2019 |
Homomorphic authenticated encryption secure against chosen-ciphertext attack C Joo, A Yun Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 45 | 2014 |
Cryptanalysis of the Full HAVAL with 4 and 5 Passes H Yu, X Wang, A Yun, S Park Fast Software Encryption: 13th International Workshop, FSE 2006, Graz …, 2006 | 41 | 2006 |
On lai–massey and quasi-feistel ciphers A Yun, JH Park, J Lee Designs, Codes and Cryptography 58, 45-72, 2011 | 32 | 2011 |
Secure fully homomorphic authenticated encryption J Kim, A Yun IEEE Access 9, 107279-107297, 2021 | 29 | 2021 |
Generic hardness of the multiple discrete logarithm problem A Yun Annual International Conference on the Theory and Applications of …, 2015 | 28 | 2015 |
Finding collision on 45-step HAS-160 A Yun, SH Sung, S Park, D Chang, S Hong, HS Cho Information Security and Cryptology-ICISC 2005: 8th International Conference …, 2006 | 25 | 2006 |
Collision search attack for 53-step HAS-160 HS Cho, S Park, SH Sung, A Yun Information Security and Cryptology–ICISC 2006: 9th International Conference …, 2006 | 24 | 2006 |
Anonymous signatures revisited V Saraswat, A Yun Provable Security: Third International Conference, ProvSec 2009, Guangzhou …, 2009 | 20 | 2009 |
Lai-Massey scheme and quasi-Feistel networks A Yun, JH Park, J Lee Cryptology ePrint Archive, 2007 | 12 | 2007 |
A Simple Variant of the Merkle–Damgård Scheme with a Permutation S Hirose, JH Park, A Yun Journal of cryptology 25, 271-309, 2012 | 10 | 2012 |
Quantum complexity for discrete logarithms and related problems M Hhan, T Yamakawa, A Yun arXiv preprint arXiv:2307.03065, 2023 | 5 | 2023 |