| Adventures in crypto dark matter: Attacks and fixes for weak pseudorandom functions JH Cheon, W Cho, JH Kim, J Kim IACR International Conference on Public-Key Cryptography, 739-760, 2021 | 22 | 2021 |
| Improved universal thresholdizer from iterative shamir secret sharing JH Cheon, W Cho, J Kim Journal of Cryptology 38 (1), 15, 2025 | 19* | 2025 |
| A polynomial time algorithm for breaking NTRU encryption with multiple keys J Kim, C Lee Designs, Codes and Cryptography 91 (8), 2779-2789, 2023 | 16 | 2023 |
| Statistical zeroizing attack: cryptanalysis of candidates of BP obfuscation over GGH15 multilinear map JH Cheon, W Cho, M Hhan, J Kim, C Lee Annual International Cryptology Conference, 253-283, 2019 | 16 | 2019 |
| Cryptanalyses of branching program obfuscations over GGH13 multilinear map from the NTRU problem JH Cheon, M Hhan, J Kim, C Lee Annual International Cryptology Conference, 184-210, 2018 | 14* | 2018 |
| Algorithms for CRT-variant of approximate greatest common divisor problem JH Cheon, W Cho, M Hhan, J Kim, C Lee Journal of Mathematical Cryptology 14 (1), 397-413, 2020 | 8 | 2020 |
| Cryptanalysis on the HHSS obfuscation arising from absence of safeguards JH Cheon, M Hhan, J Kim, C Lee IEEE Access 6, 40096-40104, 2018 | 7 | 2018 |
| Revisiting shuffle-based private set unions with reduced communication J Kim, HT Lee, Y Son Cryptology ePrint Archive, 2024 | 5 | 2024 |
| Amortized efficient zk-SNARK from linear-only RLWE encodings H Chung, D Kim, JH Kim, J Kim Journal of Communications and Networks 25 (3), 271-284, 2023 | 5 | 2023 |
| Let's Meet Ternary Keys on Babai's Plane: A Hybrid of Lattice-reduction and Meet-LWE M Hhan, J Kim, C Lee, Y Son Cryptology ePrint Archive, 2022 | 5* | 2022 |
| Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants W Cho, J Kim, C Lee IET Information Security 15 (6), 417-427, 2021 | 4 | 2021 |
| (In) Security of Threshold Fully Homomorphic Encryption based on Shamir Secret Sharing W Cho, J Kim, C Lee Cryptology ePrint Archive, 2024 | 3 | 2024 |
| Reduce and Prange: Revisiting Prange's Information Set Decoding for LPN and RSD. J Kim, C Lee IACR Cryptol. ePrint Arch. 2024, 276, 2024 | 3 | 2024 |
| Fully Encrypted Machine Learning Protocol using Functional Encryption S Hong, J Kim, C Lee, M Seo Cryptology ePrint Archive, 2024 | 1 | 2024 |
| Security Analysis on TiGER KEM in KpqC Round 1 Competition Using Meet-LWE Attack J Lee, E Lee, J Kim Journal of the Korea Institute of Information Security & Cryptology 33 (5 …, 2023 | 1 | 2023 |
| (In) security of concrete instantiation of Lin17’s functional encryption scheme from noisy multilinear maps W Cho, J Kim, C Lee Designs, Codes and Cryptography 89 (5), 973-1016, 2021 | 1 | 2021 |
| Worst-case Analysis of Lattice Enumeration Algorithm over Modules J Kim, C Lee, Y Son Cryptology ePrint Archive, 2025 | | 2025 |
| Finding small roots for bivariate polynomials over the ring of integers J Kim, C Lee Advances in Mathematics of Communications 18 (3), 614-623, 2024 | | 2024 |
| Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map J Kim, C Lee IET Information Security 16 (3), 208-219, 2022 | | 2022 |
| Mathematical Analysis of the Indistinguishability Obfuscations 김지승 서울대학교 대학원, 2020 | | 2020 |