The following pages link to Jung Hee Cheon (Q244221):
Displaying 50 items.
- Probability that the \(k\)-gcd of products of positive integers is \(B\)-friable (Q301413) (← links)
- Accelerating Pollard's rho algorithm on finite fields (Q431795) (← links)
- Fixed argument pairing inversion on elliptic curves (Q499662) (← links)
- Cryptanalyses of branching program obfuscations over GGH13 multilinear map from the NTRU problem (Q775962) (← links)
- Efficient identity-based encryption from LWR (Q776369) (← links)
- Faster bootstrapping of FHE over the integers (Q776371) (← links)
- Towards a practical cluster analysis over encrypted data (Q778921) (← links)
- Analysis of low Hamming weight products (Q947106) (← links)
- Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme (Q1045913) (← links)
- (Q1275219) (redirect page) (← links)
- Explicit valuations of division polynomials of an elliptic curve (Q1275221) (← links)
- Division polynomials of elliptic curves over finite fields (Q1357046) (← links)
- Bootstrapping for approximate homomorphic encryption (Q1648805) (← links)
- An efficient affine equivalence algorithm for multiple S-boxes and a structured affine layer (Q1698644) (← links)
- A full RNS variant of approximate homomorphic encryption (Q1726685) (← links)
- CRT-based fully homomorphic encryption over the integers (Q1749613) (← links)
- The polynomial approximate common divisor problem and its application to the fully homomorphic encryption (Q1750401) (← links)
- A reusable fuzzy extractor with practical storage size: modifying Canetti et al.'s construction (Q1784434) (← links)
- Lizard: cut off the tail -- a practical post-quantum public-key encryption from LWE and LWR (Q1796787) (← links)
- Elliptic curve lifting problem and its applications (Q1976861) (← links)
- Algorithms for CRT-variant of approximate greatest common divisor problem (Q2025331) (← links)
- Adventures in crypto dark matter: attacks and fixes for weak pseudorandom functions (Q2061985) (← links)
- Mhz2K: MPC from HE over \(\mathbb{Z}_{2^k}\) with new packing, simpler reshare, and better ZKP (Q2128571) (← links)
- Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions (Q2161418) (← links)
- Limits of polynomial packings for \(\mathbb{Z}_{p^k}\) and \(\mathbb{F}_{p^k}\) (Q2170012) (← links)
- Numerical method for comparison on homomorphically encrypted numbers (Q2176658) (← links)
- Statistical zeroizing attack: cryptanalysis of candidates of BP obfuscation over GGH15 multilinear map (Q2304922) (← links)
- Homomorphic encryption for arithmetic of approximate numbers (Q2412881) (← links)
- Cryptanalysis of the CLT13 multilinear map (Q2423847) (← links)
- Efficient homomorphic comparison methods with optimal complexity (Q2692383) (← links)
- (Q2729682) (← links)
- (Q2762893) (← links)
- Cryptanalysis of the New CLT Multilinear Map over the Integers (Q2820495) (← links)
- CONSTANT-ROUND PRIVACY PRESERVING MULTISET UNION (Q2872170) (← links)
- Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures (Q2891480) (← links)
- Constant-Round Multi-party Private Set Union Using Reversed Laurent Series (Q2900231) (← links)
- Cryptanalysis of the Multilinear Map over the Integers (Q2948321) (← links)
- Fully Homomophic Encryption over the Integers Revisited (Q2948342) (← links)
- A Group Action on $${\mathbb Z}_p^{\times }$$ and the Generalized DLP with Auxiliary Inputs (Q2949525) (← links)
- An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero (Q2971014) (← links)
- A Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$ (Q2988333) (← links)
- On the Final Exponentiation in Tate Pairing Computations (Q2989229) (← links)
- Correcting Errors in Private Keys Obtained from Cold Boot Attacks (Q3168618) (← links)
- Invertible Polynomial Representation for Private Set Operations (Q3193269) (← links)
- A new approach to the discrete logarithm problem with auxiliary inputs (Q3467665) (← links)
- Timed-Release and Key-Insulated Public Key Encryption (Q3524139) (← links)
- Security Analysis of the Strong Diffie-Hellman Problem (Q3593084) (← links)
- Speeding Up the Pollard Rho Method on Prime Fields (Q3600392) (← links)
- Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption (Q3604907) (← links)
- Subset-Restricted Random Walks for Pollard rho Method on ${\mathbf{F}_{p^m}}$ (Q3617512) (← links)