Dongwoo Kim
Dongwoo Kim
College of AI Convergence, Dongguk University
Verified email at - Homepage
Cited by
Cited by
Numerical method for comparison on homomorphically encrypted numbers
JH Cheon, D Kim, D Kim, HH Lee, K Lee
International conference on the theory and application of cryptology and …, 2019
Efficient Homomorphic Comparison Methods with Optimal Complexity
JH Cheon, D Kim, D Kim
International Conference on the Theory and Application of Cryptology and …, 2020
Flexible and efficient verifiable computation on encrypted data
A Bois, I Cascudo, D Fiore, D Kim
IACR International Conference on Public-Key Cryptography, 528-558, 2021
A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.’s Construction
JH Cheon, J Jeong, D Kim, J Lee
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018
Privacy-preserving approximate GWAS computation based on homomorphic encryption
D Kim, Y Son, D Kim, A Kim, S Hong, JH Cheon
BMC Medical Genomics 13, 1-12, 2020
Optimized privacy-preserving cnn inference with fully homomorphic encryption
D Kim, C Guyot
IEEE Transactions on Information Forensics and Security 18, 2175-2187, 2023
Lattice-based secure biometric authentication for hamming distance
JH Cheon, D Kim, D Kim, J Lee, J Shin, Y Song
Information Security and Privacy: 26th Australasian Conference, ACISP 2021 …, 2021
Comparison of encrypted control approaches and tutorial on dynamic systems using learning with errors-based homomorphic encryption
J Kim, D Kim, Y Song, H Shim, H Sandberg, KH Johansson
Annual Reviews in Control 54, 200-218, 2022
Interactive Proofs for Rounding Arithmetic
S Chen, JH Cheon, D Kim, D Park
IEEE Access 10, 122706-122725, 2022
MHz2k: MPC from HE over with New Packing, Simpler Reshare, and Better ZKP
JH Cheon, D Kim, K Lee
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
Authenticated computation of control signal from dynamic controllers
JH Cheon, D Kim, J Kim, S Lee, H Shim
2020 59th IEEE Conference on Decision and Control (CDC), 3249-3254, 2020
Lizard. Technical report
JH Cheon, S Park, J Lee, D Kim, Y Song, S Hong, D Kim, J Kim, SM Hong, ..., 2017
Amortized efficient zk-SNARK from linear-only RLWE encodings
H Chung, D Kim, JH Kim, J Kim
Journal of Communications and Networks, 2023
Calculation verification for approximate calculation
JH Cheon, D Kim, D Park
US Patent App. 17/422,278, 2022
On the Scaled Inverse of modulo Cyclotomic Polynomial of the form or
JH Cheon, D Kim, D Kim, K Lee
arXiv preprint arXiv:2106.01742, 2021
Apparatus and method for processing non-polynomial operation on encrypted messages
JH Cheon, D Kim, KIM Du Hyeong
US Patent 11,799,628, 2023
Efficient verifiable computation over quotient polynomial rings
JH Park, JH Cheon, D Kim
International Journal of Information Security 21 (5), 953-971, 2022
User device and electronic device for sharing data based on block chain and homomorphic encryption technology and methods thereof
JH Cheon, D Kim
US Patent 11,316,657, 2022
The system can't perform the operation now. Try again later.
Articles 1–18