[go: up one dir, main page]

Follow
Jiseung Kim
Jiseung Kim
Jeonbuk National University
Verified email at jbnu.ac.kr
Title
Cited by
Cited by
Year
Adventures in crypto dark matter: Attacks and fixes for weak pseudorandom functions
JH Cheon, W Cho, JH Kim, J Kim
IACR International Conference on Public-Key Cryptography, 739-760, 2021
222021
Improved universal thresholdizer from iterative shamir secret sharing
JH Cheon, W Cho, J Kim
Journal of Cryptology 38 (1), 15, 2025
19*2025
A polynomial time algorithm for breaking NTRU encryption with multiple keys
J Kim, C Lee
Designs, Codes and Cryptography 91 (8), 2779-2789, 2023
162023
Statistical zeroizing attack: cryptanalysis of candidates of BP obfuscation over GGH15 multilinear map
JH Cheon, W Cho, M Hhan, J Kim, C Lee
Annual International Cryptology Conference, 253-283, 2019
162019
Cryptanalyses of branching program obfuscations over GGH13 multilinear map from the NTRU problem
JH Cheon, M Hhan, J Kim, C Lee
Annual International Cryptology Conference, 184-210, 2018
14*2018
Algorithms for CRT-variant of approximate greatest common divisor problem
JH Cheon, W Cho, M Hhan, J Kim, C Lee
Journal of Mathematical Cryptology 14 (1), 397-413, 2020
82020
Cryptanalysis on the HHSS obfuscation arising from absence of safeguards
JH Cheon, M Hhan, J Kim, C Lee
IEEE Access 6, 40096-40104, 2018
72018
Revisiting shuffle-based private set unions with reduced communication
J Kim, HT Lee, Y Son
Cryptology ePrint Archive, 2024
52024
Amortized efficient zk-SNARK from linear-only RLWE encodings
H Chung, D Kim, JH Kim, J Kim
Journal of Communications and Networks 25 (3), 271-284, 2023
52023
Let's Meet Ternary Keys on Babai's Plane: A Hybrid of Lattice-reduction and Meet-LWE
M Hhan, J Kim, C Lee, Y Son
Cryptology ePrint Archive, 2022
5*2022
Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants
W Cho, J Kim, C Lee
IET Information Security 15 (6), 417-427, 2021
42021
(In) Security of Threshold Fully Homomorphic Encryption based on Shamir Secret Sharing
W Cho, J Kim, C Lee
Cryptology ePrint Archive, 2024
32024
Reduce and Prange: Revisiting Prange's Information Set Decoding for LPN and RSD.
J Kim, C Lee
IACR Cryptol. ePrint Arch. 2024, 276, 2024
32024
Fully Encrypted Machine Learning Protocol using Functional Encryption
S Hong, J Kim, C Lee, M Seo
Cryptology ePrint Archive, 2024
12024
Security Analysis on TiGER KEM in KpqC Round 1 Competition Using Meet-LWE Attack
J Lee, E Lee, J Kim
Journal of the Korea Institute of Information Security & Cryptology 33 (5 …, 2023
12023
(In) security of concrete instantiation of Lin17’s functional encryption scheme from noisy multilinear maps
W Cho, J Kim, C Lee
Designs, Codes and Cryptography 89 (5), 973-1016, 2021
12021
Worst-case Analysis of Lattice Enumeration Algorithm over Modules
J Kim, C Lee, Y Son
Cryptology ePrint Archive, 2025
2025
Finding small roots for bivariate polynomials over the ring of integers
J Kim, C Lee
Advances in Mathematics of Communications 18 (3), 614-623, 2024
2024
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
J Kim, C Lee
IET Information Security 16 (3), 208-219, 2022
2022
Mathematical Analysis of the Indistinguishability Obfuscations
김지승
서울대학교 대학원, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20