[go: up one dir, main page]

Follow
Joohee Lee
Joohee Lee
Assistant Professor, Sungshin Women's University
Verified email at sungshin.ac.kr - Homepage
Title
Cited by
Cited by
Year
Lizard: Cut off the tail! A practical post-quantum public-key encryption from LWE and LWR
JH Cheon, D Kim, J Lee, Y Song
International Conference on Security and Cryptography for Networks, 160-177, 2018
152*2018
Single-trace attacks on message encoding in lattice-based KEMs
BY Sim, J Kwon, J Lee, IJ Kim, TH Lee, J Han, H Yoon, J Cho, DG Han
IEEE Access 8, 183175-183191, 2020
1022020
Transciphering framework for approximate homomorphic encryption
J Cho, J Ha, S Kim, BH Lee, J Lee, J Lee, D Moon, H Yoon
International Conference on the Theory and Application of Cryptology and …, 2021
912021
HE-friendly algorithm for privacy-preserving SVM training
S Park, J Byun, J Lee, JH Cheon, J Lee
IEEE Access 8, 57414-57425, 2020
682020
Privacy-preserving computations of predictive medical models with minimax approximation and non-adjacent form
JH Cheon, J Jeong, J Lee, K Lee
International Conference on Financial Cryptography and Data Security, 53-74, 2017
482017
RLizard: Post-quantum key encapsulation mechanism for IoT devices
J Lee, D Kim, H Lee, Y Lee, JH Cheon
IEEE Access 7, 2080-2091, 2018
412018
Privacy-Preserving Fair Learning of Support Vector Machine with Homomorphic Encryption
S Park, J Byun, J Lee
Proceedings of the ACM Web Conference 2022, 3572-3583, 2022
332022
Instant privacy-preserving biometric authentication for hamming distance
J Lee, D Kim, D Kim, Y Song, J Shin, JH Cheon
Cryptology ePrint Archive, 2018
312018
Round-reduced modular construction of asymmetric password-authenticated key exchange
JY Hwang, S Jarecki, T Kwon, J Lee, JS Shin, J Xu
International Conference on Security and Cryptography for Networks, 485-504, 2018
302018
AIM: Symmetric Primitive for Shorter Signatures with Stronger Security
S Kim, J Ha, M Son, B Lee, D Moon, J Lee, S Lee, J Kwon, J Cho, H Yoon, ...
ACM CCS 2023: ACM Conference on Computer and Communications Security, 2023
282023
Lattice-based secure biometric authentication for hamming distance
JH Cheon, D Kim, D Kim, J Lee, J Shin, Y Song
Australasian Conference on Information Security and Privacy, 653-672, 2021
212021
Lizard
JH Cheon, S Park, J Lee, D Kim, Y Song, S Hong, D Kim, J Kim, SM Hong, ...
NIST PQC Round 1, 2018
20*2018
Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling
J Han, T Lee, J Kwon, J Lee, IJ Kim, J Cho, DG Han, BY Sim
IEEE Access 9, 166283-166292, 2021
192021
Security-preserving Support Vector Machine with Fully Homomorphic Encryption.
S Park, J Lee, JH Cheon, J Lee, J Kim, J Byun
SafeAI@ AAAI 2301, 2019
182019
Privacy-preserving embedding via look-up table evaluation with fully homomorphic encryption
J Kim, S Park, J Lee, JH Cheon
Forty-first International Conference on Machine Learning, 2024
82024
The aimer signature scheme
S Kim, J Ha, M Son, B Lee, D Moon, J Lee, S Lee, J Kwon, J Cho, H Yoon, ...
Technical report. NIST, 2023
52023
An efficient affine equivalence algorithm for multiple S-boxes and a structured affine layer
JH Cheon, H Hong, J Lee, J Lee
International Conference on Selected Areas in Cryptography, 299-316, 2016
52016
Cryptanalysis on “NTRU+: Compact Construction of NTRU Using Simple Encoding Method
J Lee, H Ryu, M Lee, J Park
IEEE Transactions on Information Forensics and Security, 2024
32024
Efficient Continuous Key Agreement With Reduced Bandwidth From a Decomposable KEM
J Lee, J Kwon, JS Shin
IEEE Access 11, 33224-33235, 2023
32023
Apparatus and method for encryption, apparatus and method for converting ciphertext
JH Lee, DJ Moon, HJ Yoon, JH Cho, EK Kim, SK Kim, JY Lee, JC Ha, ...
US Patent 11,558,171, 2023
32023
The system can't perform the operation now. Try again later.
Articles 1–20