Numerical Method for Comparison on Homomorphically Encrypted Numbers. JH Cheon, D Kim, D Kim, HH Lee, K Lee International Conference on the Theory and Application of Cryptology and …, 2019 | 157 | 2019 |
Efficient homomorphic comparison methods with optimal complexity JH Cheon, D Kim, D Kim International Conference on the Theory and Application of Cryptology and …, 2020 | 152 | 2020 |
Lizard: Cut off the tail! A practical post-quantum public-key encryption from LWE and LWR JH Cheon, D Kim, J Lee, Y Song International Conference on Security and Cryptography for Networks, 160-177, 2018 | 135 | 2018 |
Ensemble method for privacy-preserving logistic regression based on homomorphic encryption JH Cheon, D Kim, Y Kim, Y Song IEEE Access 6, 46938-46948, 2018 | 87 | 2018 |
Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation M Kim, AO Harmanci, JP Bossuat, S Carpov, JH Cheon, I Chillotti, W Cho, ... Cell systems 12 (11), 1108-1120. e4, 2021 | 74 | 2021 |
Remark on the security of ckks scheme in practice JH Cheon, S Hong, D Kim Cryptology ePrint Archive, 2020 | 48 | 2020 |
Towards a Practical Cluster Analysis over Encrypted Data JH Cheon, D Kim, JH Park International Conference on Selected Areas in Cryptography, 227-249, 2019 | 40* | 2019 |
RLizard: Post-quantum key encapsulation mechanism for IoT devices J Lee, D Kim, H Lee, Y Lee, JH Cheon IEEE Access 7, 2080-2091, 2018 | 32 | 2018 |
Privacy-preserving approximate GWAS computation based on homomorphic encryption D Kim, Y Son, D Kim, A Kim, S Hong, JH Cheon BMC Medical Genomics 13, 1-12, 2020 | 31 | 2020 |
Lattice-based secure biometric authentication for hamming distance JH Cheon, D Kim, D Kim, J Lee, J Shin, Y Song Information Security and Privacy: 26th Australasian Conference, ACISP 2021 …, 2021 | 28* | 2021 |
Toward Practical Lattice-based Proof of Knowledge from Hint-MLWE D Kim, D Lee, J Seo, Y Song Annual International Cryptology Conference, 549-580, 2023 | 24 | 2023 |
Approximate homomorphic encryption over the conjugate-invariant ring D Kim, Y Song Information Security and Cryptology–ICISC 2018: 21st International …, 2019 | 20 | 2019 |
Lizard JH Cheon, S Park, J Lee, D Kim, Y Song, S Hong, D Kim, J Kim, SM Hong, ... Technical report, National Institute of Standards and Technology. Available …, 2017 | 18* | 2017 |
Faster amortized FHEW bootstrapping using ring automorphisms G De Micheli, D Kim, D Micciancio, A Suhl IACR International Conference on Public-Key Cryptography, 322-353, 2024 | 15 | 2024 |
Homomorphic Encryption as a secure PHM outsourcing solution for small and medium manufacturing enterprise HED Kang, D Kim, S Kim, DD Kim, JH Cheon, BW Anthony Journal of Manufacturing Systems 61, 856-865, 2021 | 15 | 2021 |
Faster Bootstrapping of FHE over the Integers JH Cheon, K Han, D Kim International Conference on Information Security and Cryptology, 242-259, 2019 | 15 | 2019 |
Terminal device performing homomorphic encryption, server device processing ciphertext and methods thereof JH Cheon, D Kim, Y Song, K Han US Patent 10,778,409, 2020 | 14 | 2020 |
A new trapdoor over module-NTRU lattice and its application to ID-based encryption JH Cheon, D Kim, T Kim, Y Son Cryptology ePrint Archive, 2019 | 11 | 2019 |
Faster Bootstrapping of FHE over the Integers JH Cheon, K Han, D Kim Cryptology ePrint Archive, 2017 | 9 | 2017 |
Security Guidelines for Implementing Homomorphic Encryption JP Bossuat, R Cammarota, JH Cheon, I Chillotti, BR Curtis, W Dai, ... Cryptology ePrint Archive, 2024 | 7 | 2024 |