Jung Hee Cheon

From MaRDI portal
Person:244221

Available identifiers

zbMath Open cheon.jung-heeDBLP64/5207WikidataQ20010724 ScholiaQ20010724MaRDI QIDQ244221

List of research outcomes





PublicationDate of PublicationType
Plaintext-ciphertext matrix multiplication and FHE bootstrapping: fast and fused2024-12-13Paper
Bootstrapping bits with CKKS2024-11-12Paper
\textsf{SMAUG}: pushing lattice-based key encapsulation mechanisms to the limits2024-10-16Paper
HERMES: efficient ring packing using MLWE ciphertexts and application to transciphering2024-02-06Paper
Lattice-Based Secure Biometric Authentication for Hamming Distance2023-04-13Paper
Efficient homomorphic comparison methods with optimal complexity2023-03-21Paper
Limits of polynomial packings for \(\mathbb{Z}_{p^k}\) and \(\mathbb{F}_{p^k}\)2022-08-30Paper
Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions2022-08-04Paper
On the Scaled Inverse of $(x^i-x^j)$ modulo Cyclotomic Polynomial of the form $\Phi_{p^s}(x)$ or $\Phi_{p^s q^t}(x)$2022-05-06Paper
Mhz2K: MPC from HE over \(\mathbb{Z}_{2^k}\) with new packing, simpler reshare, and better ZKP2022-04-22Paper
https://portal.mardi4nfdi.de/entity/Q50349142022-02-21Paper
Adventures in crypto dark matter: attacks and fixes for weak pseudorandom functions2021-12-21Paper
Algorithms for CRT-variant of approximate greatest common divisor problem2021-05-12Paper
Towards a practical cluster analysis over encrypted data2020-07-21Paper
Efficient identity-based encryption from LWR2020-07-08Paper
Faster bootstrapping of FHE over the integers2020-07-08Paper
Cryptanalyses of branching program obfuscations over GGH13 multilinear map from the NTRU problem2020-06-30Paper
Numerical method for comparison on homomorphically encrypted numbers2020-05-05Paper
Statistical zeroizing attack: cryptanalysis of candidates of BP obfuscation over GGH15 multilinear map2020-03-09Paper
Cryptanalysis of the CLT13 multilinear map2019-06-20Paper
A full RNS variant of approximate homomorphic encryption2019-02-20Paper
Lizard: cut off the tail -- a practical post-quantum public-key encryption from LWE and LWR2018-10-17Paper
A reusable fuzzy extractor with practical storage size: modifying Canetti et al.'s construction2018-09-26Paper
Bootstrapping for approximate homomorphic encryption2018-07-09Paper
The polynomial approximate common divisor problem and its application to the fully homomorphic encryption2018-05-22Paper
CRT-based fully homomorphic encryption over the integers2018-05-17Paper
Homomorphic encryption for arithmetic of approximate numbers2018-04-06Paper
An efficient affine equivalence algorithm for multiple S-boxes and a structured affine layer2018-02-16Paper
Fast Exponentiation Using Split Exponents2017-07-27Paper
Parameterized Splitting Systems for the Discrete Logarithm2017-07-27Paper
On Homomorphic Signatures for Network Coding2017-07-27Paper
On the Final Exponentiation in Tate Pairing Computations2017-06-08Paper
A Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$2017-05-19Paper
An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero2017-04-04Paper
Cryptanalysis of the New CLT Multilinear Map over the Integers2016-09-09Paper
Probability that the \(k\)-gcd of products of positive integers is \(B\)-friable2016-06-30Paper
A new approach to the discrete logarithm problem with auxiliary inputs2016-02-04Paper
Invertible Polynomial Representation for Private Set Operations2015-10-16Paper
A Group Action on $${\mathbb Z}_p^{\times }$$ and the Generalized DLP with Auxiliary Inputs2015-10-01Paper
Fixed argument pairing inversion on elliptic curves2015-09-30Paper
Cryptanalysis of the Multilinear Map over the Integers2015-09-30Paper
Fully Homomophic Encryption over the Integers Revisited2015-09-30Paper
Computing prime divisors in an interval2015-01-30Paper
Analysis on a generalized algorithm for the strong discrete logarithm problem with auxiliary inputs2014-06-04Paper
Constant-round privacy preserving multiset union2014-01-14Paper
Private Over-Threshold Aggregation Protocols2013-06-04Paper
Batch Fully Homomorphic Encryption over the Integers2013-05-31Paper
COMPRESS MULTIPLE CIPHERTEXTS USING ELGAMAL ENCRYPTION SCHEMES2013-05-14Paper
Correcting Errors in Private Keys Obtained from Cold Boot Attacks2012-11-01Paper
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series2012-07-20Paper
Accelerating Pollard's rho algorithm on finite fields2012-07-03Paper
Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures2012-06-15Paper
Discrete logarithm problems with auxiliary inputs2010-09-21Paper
Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme2009-12-18Paper
ANALYSIS OF PRIVACY-PRESERVING ELEMENT REDUCTION OF A MULTISET2009-05-05Paper
Subset-Restricted Random Walks for Pollard rho Method on ${\mathbf{F}_{p^m}}$2009-03-24Paper
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption2009-02-24Paper
Speeding Up the Pollard Rho Method on Prime Fields2009-02-10Paper
Analysis of low Hamming weight products2008-09-29Paper
Timed-Release and Key-Insulated Public Key Encryption2008-09-09Paper
Efficient Broadcast Encryption Using Multiple Interpolation Methods2008-03-17Paper
Batch Verifications with ID-Based Signatures2008-03-17Paper
A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents2008-03-05Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Security Analysis of the Strong Diffie-Hellman Problem2007-09-24Paper
Fast Batch Verification of Multiple Signatures2007-09-04Paper
https://portal.mardi4nfdi.de/entity/Q47374932004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44741702004-08-04Paper
Nonlinearity of Boolean Functions and Hyperelliptic Curves2004-01-08Paper
https://portal.mardi4nfdi.de/entity/Q44185272003-08-10Paper
An Identity-Based Signature from Gap Diffie-Hellman Groups2003-07-27Paper
https://portal.mardi4nfdi.de/entity/Q47855012003-06-30Paper
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation)2002-11-12Paper
https://portal.mardi4nfdi.de/entity/Q45366362002-10-10Paper
https://portal.mardi4nfdi.de/entity/Q45368002002-10-07Paper
https://portal.mardi4nfdi.de/entity/Q27628932002-01-13Paper
On remarks of lifting problems for elliptic curves2001-10-29Paper
Division polynomials of elliptic curves over finite fields2001-04-01Paper
Elliptic curve lifting problem and its applications2000-11-20Paper
https://portal.mardi4nfdi.de/entity/Q49550422000-06-12Paper
The orders of the reductions of a point in the Mordell-Weil group of an elliptic curve2000-03-26Paper
https://portal.mardi4nfdi.de/entity/Q47041151999-12-02Paper
https://portal.mardi4nfdi.de/entity/Q38400941999-06-29Paper
Explicit valuations of division polynomials of an elliptic curve1999-03-23Paper
https://portal.mardi4nfdi.de/entity/Q42507681999-01-01Paper

Research outcomes over time

This page was built for person: Jung Hee Cheon