Jung Hee Cheon

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Plaintext-ciphertext matrix multiplication and FHE bootstrapping: fast and fused
 
2024-12-13Paper
Bootstrapping bits with CKKS
 
2024-11-12Paper
\textsf{SMAUG}: pushing lattice-based key encapsulation mechanisms to the limits
 
2024-10-16Paper
HERMES: efficient ring packing using MLWE ciphertexts and application to transciphering
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Lattice-Based Secure Biometric Authentication for Hamming Distance
 
2023-04-13Paper
Efficient homomorphic comparison methods with optimal complexity
 
2023-03-21Paper
Limits of polynomial packings for \(\mathbb{Z}_{p^k}\) and \(\mathbb{F}_{p^k}\)
 
2022-08-30Paper
Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions
Designs, Codes and Cryptography
2022-08-04Paper
On the scaled inverse of \((x^i-x^j)\) modulo cyclotomic polynomial of the form \(\Phi_{p^s}(x)\) or \(\Phi_{p^s q^t}(x)\)
 
2022-05-06Paper
Mhz2K: MPC from HE over \(\mathbb{Z}_{2^k}\) with new packing, simpler reshare, and better ZKP
 
2022-04-22Paper
Practical FHE parameters against lattice attacks
 
2022-02-21Paper
Adventures in crypto dark matter: attacks and fixes for weak pseudorandom functions
 
2021-12-21Paper
Algorithms for CRT-variant of approximate greatest common divisor problem
Journal of Mathematical Cryptology
2021-05-12Paper
Towards a practical cluster analysis over encrypted data
 
2020-07-21Paper
Efficient identity-based encryption from LWR
 
2020-07-08Paper
Faster bootstrapping of FHE over the integers
 
2020-07-08Paper
Cryptanalyses of branching program obfuscations over GGH13 multilinear map from the NTRU problem
 
2020-06-30Paper
Numerical method for comparison on homomorphically encrypted numbers
 
2020-05-05Paper
Statistical zeroizing attack: cryptanalysis of candidates of BP obfuscation over GGH15 multilinear map
 
2020-03-09Paper
Cryptanalysis of the CLT13 multilinear map
Journal of Cryptology
2019-06-20Paper
A full RNS variant of approximate homomorphic encryption
 
2019-02-20Paper
Lizard: cut off the tail -- a practical post-quantum public-key encryption from LWE and LWR
 
2018-10-17Paper
A reusable fuzzy extractor with practical storage size: modifying Canetti et al.'s construction
 
2018-09-26Paper
Bootstrapping for approximate homomorphic encryption
 
2018-07-09Paper
The polynomial approximate common divisor problem and its application to the fully homomorphic encryption
Information Sciences
2018-05-22Paper
CRT-based fully homomorphic encryption over the integers
Information Sciences
2018-05-17Paper
Homomorphic encryption for arithmetic of approximate numbers
 
2018-04-06Paper
An efficient affine equivalence algorithm for multiple S-boxes and a structured affine layer
 
2018-02-16Paper
Fast Exponentiation Using Split Exponents
IEEE Transactions on Information Theory
2017-07-27Paper
Parameterized Splitting Systems for the Discrete Logarithm
IEEE Transactions on Information Theory
2017-07-27Paper
On Homomorphic Signatures for Network Coding
IEEE Transactions on Computers
2017-07-27Paper
On the Final Exponentiation in Tate Pairing Computations
IEEE Transactions on Information Theory
2017-06-08Paper
A practical post-quantum public-key cryptosystem based on spLWE
Information Security and Cryptology – ICISC 2016
2017-05-19Paper
An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero
LMS Journal of Computation and Mathematics
2017-04-04Paper
Cryptanalysis of the new CLT multilinear map over the integers
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Probability that the \(k\)-gcd of products of positive integers is \(B\)-friable
Journal of Number Theory
2016-06-30Paper
A new approach to the discrete logarithm problem with auxiliary inputs
LMS Journal of Computation and Mathematics
2016-02-04Paper
Invertible polynomial representation for private set operations
Information Security and Cryptology -- ICISC 2013
2015-10-16Paper
A group action on \({\mathbb Z}_p^{\times}\) and the generalized DLP with auxiliary inputs
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Fixed argument pairing inversion on elliptic curves
Designs, Codes and Cryptography
2015-09-30Paper
Cryptanalysis of the multilinear map over the integers
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Fully homomophic encryption over the integers revisited
Advances in Cryptology -- EUROCRYPT 2015
2015-09-30Paper
Computing prime divisors in an interval
Mathematics of Computation
2015-01-30Paper
Analysis on a generalized algorithm for the strong discrete logarithm problem with auxiliary inputs
Mathematics of Computation
2014-06-04Paper
Constant-round privacy preserving multiset union
Bulletin of the Korean Mathematical Society
2014-01-14Paper
Private over-threshold aggregation protocols
Lecture Notes in Computer Science
2013-06-04Paper
Batch fully homomorphic encryption over the integers
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Compress multiple ciphertexts using ElGamal encryption schemes
Journal of the Korean Mathematical Society
2013-05-14Paper
Correcting errors in private keys obtained from cold boot attacks
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series
Public Key Cryptography – PKC 2012
2012-07-20Paper
Accelerating Pollard's rho algorithm on finite fields
Journal of Cryptology
2012-07-03Paper
Beyond the limitation of prime-order bilinear groups, and round optimal blind signatures
Theory of Cryptography
2012-06-15Paper
Discrete logarithm problems with auxiliary inputs
Journal of Cryptology
2010-09-21Paper
Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme
Information Processing Letters
2009-12-18Paper
ANALYSIS OF PRIVACY-PRESERVING ELEMENT REDUCTION OF A MULTISET
Journal of the Korean Mathematical Society
2009-05-05Paper
Subset-Restricted Random Walks for Pollard rho Method on ${\mathbf{F}_{p^m}}$
Public Key Cryptography – PKC 2009
2009-03-24Paper
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption
IEEE Transactions on Information Theory
2009-02-24Paper
Speeding Up the Pollard Rho Method on Prime Fields
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Analysis of low Hamming weight products
Discrete Applied Mathematics
2008-09-29Paper
Timed-Release and Key-Insulated Public Key Encryption
Financial Cryptography and Data Security
2008-09-09Paper
Efficient Broadcast Encryption Using Multiple Interpolation Methods
Lecture Notes in Computer Science
2008-03-17Paper
Batch Verifications with ID-Based Signatures
Lecture Notes in Computer Science
2008-03-17Paper
A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Security Analysis of the Strong Diffie-Hellman Problem
Advances in Cryptology - EUROCRYPT 2006
2007-09-24Paper
Fast Batch Verification of Multiple Signatures
Public Key Cryptography – PKC 2007
2007-09-04Paper
scientific article; zbMATH DE number 2086893 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2081063 (Why is no real title available?)
 
2004-08-04Paper
Nonlinearity of Boolean Functions and Hyperelliptic Curves
SIAM Journal on Discrete Mathematics
2004-01-08Paper
scientific article; zbMATH DE number 1962143 (Why is no real title available?)
 
2003-08-10Paper
An Identity-Based Signature from Gap Diffie-Hellman Groups
Public Key Cryptography — PKC 2003
2003-07-27Paper
scientific article; zbMATH DE number 1848308 (Why is no real title available?)
 
2003-06-30Paper
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)
Cryptography and Coding
2002-11-12Paper
scientific article; zbMATH DE number 1759642 (Why is no real title available?)
 
2002-10-10Paper
scientific article; zbMATH DE number 1759777 (Why is no real title available?)
 
2002-10-07Paper
scientific article; zbMATH DE number 1689598 (Why is no real title available?)
 
2002-01-13Paper
On remarks of lifting problems for elliptic curves
Advanced Studies in Contemporary Mathematics (Pusan)
2001-10-29Paper
Division polynomials of elliptic curves over finite fields
Proceedings of the Japan Academy. Series A
2001-04-01Paper
Elliptic curve lifting problem and its applications
Proceedings of the Japan Academy. Series A
2000-11-20Paper
scientific article; zbMATH DE number 1457622 (Why is no real title available?)
 
2000-06-12Paper
The orders of the reductions of a point in the Mordell-Weil group of an elliptic curve
Acta Arithmetica
2000-03-26Paper
scientific article; zbMATH DE number 1373426 (Why is no real title available?)
 
1999-12-02Paper
scientific article; zbMATH DE number 1186879 (Why is no real title available?)
 
1999-06-29Paper
Explicit valuations of division polynomials of an elliptic curve
Manuscripta Mathematica
1999-03-23Paper
scientific article; zbMATH DE number 1304078 (Why is no real title available?)
 
1999-01-01Paper


Research outcomes over time


This page was built for person: Jung Hee Cheon