| Search-and-compute on encrypted data JH Cheon, M Kim, M Kim International Conference on Financial Cryptography and Data Security, 142-159, 2015 | 90 | 2015 |
| Optimized search-and-compute circuits and their application to query evaluation on encrypted data JH Cheon, M Kim, M Kim IEEE Transactions on Information Forensics and Security 11 (1), 188-199, 2015 | 85 | 2015 |
| A secure smart-metering protocol over power-line communication S Kim, EY Kwon, M Kim, JH Cheon, S Ju, Y Lim, M Choi IEEE Transactions on Power Delivery 26 (4), 2370-2379, 2011 | 85 | 2011 |
| Bulletproofs+: Shorter proofs for a privacy-enhanced distributed ledger H Chung, K Han, C Ju, M Kim, JH Seo Ieee Access 10, 42081-42096, 2022 | 69 | 2022 |
| Key management method using hierarchical node topology, and method of registering and deregistering user using the same S Han, B Kim, M Kim, Y Yoon, S Lee, JH Lee US Patent 8,983,071, 2015 | 69 | 2015 |
| Mutual authentication method between devices using mediation module and system therefor H Ju, M Kim, JY Moon US Patent App. 11/865,821, 2008 | 62 | 2008 |
| Ghostshell: Secure biometric authentication using integrity-based homomorphic evaluations JH Cheon, HW Chung, M Kim, KW Lee Cryptology ePrint Archive, 2016 | 57 | 2016 |
| Home network system and method therefor YJ Jang, M Kim, S Nam, JH Lee US Patent 7,979,913, 2011 | 57 | 2011 |
| Multi-media device having function of backing up broadcasting contents in home network environment and method of backing up the broadcasting contents B Kim, M Kim, S Nam, S Choi US Patent App. 11/234,416, 2006 | 55 | 2006 |
| On the efficiency of FHE-based private queries M Kim, HT Lee, S Ling, H Wang IEEE Transactions on Dependable and Secure Computing 15 (2), 357-363, 2016 | 54 | 2016 |
| Method of constructing domain based on public key and implementing the domain through universal plug and play (UPnP) S Han, M Kim, J Cho, Y Choi US Patent 7,424,613, 2008 | 53 | 2008 |
| A new identification scheme based on the bilinear Diffie-Hellman problem M Kim, K Kim Australasian Conference on Information Security and Privacy, 362-378, 2002 | 45 | 2002 |
| Method and apparatus for checking proximity between devices using hash chain JH Lee, M Kim, S Han, Y Yoon, S Lee, B Kim US Patent 8,122,487, 2012 | 43 | 2012 |
| Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs A Mohaien, DF Kune, EY Vasserman, M Kim, Y Kim IEEE Transactions on Dependable and Secure Computing 10 (6), 380-393, 2013 | 39 | 2013 |
| Private compound wildcard queries using fully homomorphic encryption M Kim, HT Lee, S Ling, BHM Tan, H Wang IEEE Transactions on Dependable and Secure Computing 16 (5), 743-756, 2017 | 36 | 2017 |
| Method of controlling content access and method of obtaining content key using the same S Han, M Kim, Y Yoon, S Lee, B Kim, JH Lee US Patent 8,341,402, 2012 | 31 | 2012 |
| Mutual private set intersection with linear complexity M Kim, HT Lee, JH Cheon International Workshop on Information Security Applications, 219-231, 2011 | 30 | 2011 |
| Method of authenticating device using certificate, and digital content processing device for performing device authentication using the same Y You, M Kim, YJ Jang US Patent App. 10/927,239, 2005 | 28 | 2005 |
| Better security for queries on encrypted databases M Kim, HT Lee, S Ling, SQ Ren, BHM Tan, H Wang Cryptology ePrint Archive, 2016 | 26 | 2016 |
| Method of creating domain based on public key cryptography Y You, M Kim, Y Choi, YJ Jang US Patent 7,996,322, 2011 | 26 | 2011 |