Numerical method for comparison on homomorphically encrypted numbers JH Cheon, D Kim, D Kim, HH Lee, K Lee International conference on the theory and application of cryptology and …, 2019 | 151 | 2019 |
Efficient Homomorphic Comparison Methods with Optimal Complexity JH Cheon, D Kim, D Kim International Conference on the Theory and Application of Cryptology and …, 2020 | 138 | 2020 |
Flexible and efficient verifiable computation on encrypted data A Bois, I Cascudo, D Fiore, D Kim IACR International Conference on Public-Key Cryptography, 528-558, 2021 | 52 | 2021 |
Optimized privacy-preserving cnn inference with fully homomorphic encryption D Kim, C Guyot IEEE Transactions on Information Forensics and Security 18, 2175-2187, 2023 | 38 | 2023 |
A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.’s Construction JH Cheon, J Jeong, D Kim, J Lee Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018 | 33 | 2018 |
Privacy-preserving approximate GWAS computation based on homomorphic encryption D Kim, Y Son, D Kim, A Kim, S Hong, JH Cheon BMC Medical Genomics 13, 1-12, 2020 | 31 | 2020 |
Lattice-based secure biometric authentication for hamming distance JH Cheon, D Kim, D Kim, J Lee, J Shin, Y Song Information Security and Privacy: 26th Australasian Conference, ACISP 2021 …, 2021 | 27* | 2021 |
Comparison of encrypted control approaches and tutorial on dynamic systems using learning with errors-based homomorphic encryption J Kim, D Kim, Y Song, H Shim, H Sandberg, KH Johansson Annual Reviews in Control 54, 200-218, 2022 | 22 | 2022 |
Interactive Proofs for Rounding Arithmetic S Chen, JH Cheon, D Kim, D Park IEEE Access 10, 122706-122725, 2022 | 18* | 2022 |
MHz2k: MPC from HE over with New Packing, Simpler Reshare, and Better ZKP JH Cheon, D Kim, K Lee Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021 | 16 | 2021 |
Authenticated computation of control signal from dynamic controllers JH Cheon, D Kim, J Kim, S Lee, H Shim 2020 59th IEEE Conference on Decision and Control (CDC), 3249-3254, 2020 | 7 | 2020 |
Lizard. Technical report JH Cheon, S Park, J Lee, D Kim, Y Song, S Hong, D Kim, J Kim, SM Hong, ... https://csrc.nist.gov/projects/post-quantum-cryptography/round-1-submissions, 2017 | 7* | 2017 |
User device and electronic device for sharing data based on block chain and homomorphic encryption technology and methods thereof JH Cheon, D Kim US Patent 11,316,657, 2022 | 5 | 2022 |
Amortized efficient zk-SNARK from linear-only RLWE encodings H Chung, D Kim, JH Kim, J Kim Journal of Communications and Networks 25 (3), 271-284, 2023 | 2 | 2023 |
Calculation verification for approximate calculation JH Cheon, D Kim, D Park US Patent App. 17/422,278, 2022 | 2 | 2022 |
On the Scaled Inverse of modulo Cyclotomic Polynomial of the form or JH Cheon, D Kim, D Kim, K Lee arXiv preprint arXiv:2106.01742, 2021 | 1 | 2021 |
Apparatus and method for processing non-polynomial operation on encrypted messages JH Cheon, D Kim, KIM Du Hyeong US Patent 11,799,628, 2023 | | 2023 |
Efficient verifiable computation over quotient polynomial rings JH Park, JH Cheon, D Kim International Journal of Information Security 21 (5), 953-971, 2022 | | 2022 |