Follow
Duhyeong Kim
Title
Cited by
Cited by
Year
Numerical Method for Comparison on Homomorphically Encrypted Numbers.
JH Cheon, D Kim, D Kim, HH Lee, K Lee
International Conference on the Theory and Application of Cryptology and …, 2019
1662019
Efficient homomorphic comparison methods with optimal complexity
JH Cheon, D Kim, D Kim
International Conference on the Theory and Application of Cryptology and …, 2020
1602020
Lizard: Cut off the tail! A practical post-quantum public-key encryption from LWE and LWR
JH Cheon, D Kim, J Lee, Y Song
International Conference on Security and Cryptography for Networks, 160-177, 2018
1372018
Ensemble method for privacy-preserving logistic regression based on homomorphic encryption
JH Cheon, D Kim, Y Kim, Y Song
IEEE Access 6, 46938-46948, 2018
882018
Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation
M Kim, AO Harmanci, JP Bossuat, S Carpov, JH Cheon, I Chillotti, W Cho, ...
Cell systems 12 (11), 1108-1120. e4, 2021
742021
Remark on the security of ckks scheme in practice
JH Cheon, S Hong, D Kim
Cryptology ePrint Archive, 2020
492020
Towards a Practical Cluster Analysis over Encrypted Data
JH Cheon, D Kim, JH Park
International Conference on Selected Areas in Cryptography, 227-249, 2019
40*2019
RLizard: Post-quantum key encapsulation mechanism for IoT devices
J Lee, D Kim, H Lee, Y Lee, JH Cheon
IEEE Access 7, 2080-2091, 2018
332018
Privacy-preserving approximate GWAS computation based on homomorphic encryption
D Kim, Y Son, D Kim, A Kim, S Hong, JH Cheon
BMC Medical Genomics 13, 1-12, 2020
312020
Lattice-based secure biometric authentication for hamming distance
JH Cheon, D Kim, D Kim, J Lee, J Shin, Y Song
Information Security and Privacy: 26th Australasian Conference, ACISP 2021 …, 2021
29*2021
Toward Practical Lattice-based Proof of Knowledge from Hint-MLWE
D Kim, D Lee, J Seo, Y Song
Annual International Cryptology Conference, 549-580, 2023
252023
Approximate homomorphic encryption over the conjugate-invariant ring
D Kim, Y Song
Information Security and Cryptology–ICISC 2018: 21st International …, 2019
212019
Lizard
JH Cheon, S Park, J Lee, D Kim, Y Song, S Hong, D Kim, J Kim, SM Hong, ...
Technical report, National Institute of Standards and Technology. Available …, 2017
18*2017
Faster amortized FHEW bootstrapping using ring automorphisms
G De Micheli, D Kim, D Micciancio, A Suhl
IACR International Conference on Public-Key Cryptography, 322-353, 2024
152024
Security guidelines for implementing homomorphic encryption
JP Bossuat, R Cammarota, I Chillotti, BR Curtis, W Dai, H Gong, E Hales, ...
Cryptology ePrint Archive, 2024
152024
Homomorphic Encryption as a secure PHM outsourcing solution for small and medium manufacturing enterprise
HED Kang, D Kim, S Kim, DD Kim, JH Cheon, BW Anthony
Journal of Manufacturing Systems 61, 856-865, 2021
152021
Faster Bootstrapping of FHE over the Integers
JH Cheon, K Han, D Kim
International Conference on Information Security and Cryptology, 242-259, 2019
152019
Terminal device performing homomorphic encryption, server device processing ciphertext and methods thereof
JH Cheon, D Kim, Y Song, K Han
US Patent 10,778,409, 2020
142020
A new trapdoor over module-NTRU lattice and its application to ID-based encryption
JH Cheon, D Kim, T Kim, Y Son
Cryptology ePrint Archive, 2019
122019
Faster Bootstrapping of FHE over the Integers
JH Cheon, K Han, D Kim
Cryptology ePrint Archive, 2017
92017
The system can't perform the operation now. Try again later.
Articles 1–20