Homomorphic encryption for arithmetic of approximate numbers JH Cheon, A Kim, M Kim, Y Song Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017 | 1797 | 2017 |
Bootstrapping for Approximate Homomorphic Encryption JH Cheon, K Han, A Kim, M Kim, Y Song Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018 | 326 | 2018 |
Secure outsourced matrix computation and application to neural networks X Jiang, M Kim, K Lauter, Y Song Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 297 | 2018 |
A full rns variant of approximate homomorphic encryption JH Cheon, K Han, A Kim, M Kim, Y Song International Conference on Selected Areas in Cryptography. Springer, 2018 | 293 | 2018 |
Secure logistic regression based on homomorphic encryption: design and evaluation M Kim, Y Song, S Wang, Y Xia, X Jiang JMIR medical informatics, 2018 | 289 | 2018 |
Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference H Chen, W Dai, M Kim, Y Song Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 236 | 2019 |
Logistic regression model training based on the approximate homomorphic encryption A Kim, Y Song, M Kim, K Lee, JH Cheon BMC medical genomics, 2018 | 226 | 2018 |
Homomorphic computation of edit distance JH Cheon, M Kim, K Lauter Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015 | 186 | 2015 |
Private genome analysis through homomorphic encryption M Kim, K Lauter BMC medical informatics and decision making 15 (5), S3, 2015 | 173 | 2015 |
Encrypting controller using fully homomorphic encryption for security of cyber-physical systems J Kim, C Lee, H Shim, JH Cheon, A Kim, M Kim, Y Song IFAC-PapersOnLine 49 (22), 175-180, 2016 | 154 | 2016 |
HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS S Wang, Y Zhang, W Dai, K Lauter, M Kim, Y Tang, H Xiong, X Jiang Bioinformatics 32 (2), 211-218, 2016 | 153 | 2016 |
Search-and-compute on encrypted data JH Cheon, M Kim, M Kim Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015 | 78 | 2015 |
Optimized search-and-compute circuits and their application to query evaluation on encrypted data JH Cheon, M Kim, M Kim IEEE Transactions on Information Forensics and Security 11 (1), 188-199, 2015 | 74 | 2015 |
Secure and differentially private logistic regression for horizontally distributed data M Kim, J Lee, L Ohno-Machado, X Jiang IEEE Transactions on Information Forensics and Security 15, 695-710, 2019 | 64 | 2019 |
Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation M Kim, AO Harmanci, JP Bossuat, S Carpov, JH Cheon, I Chillotti, W Cho, ... Cell systems 12 (11), 1108-1120. e4, 2021 | 63 | 2021 |
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning H Chen, M Kim, I Razenshteyn, D Rotaru, Y Song, S Wagh Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 56 | 2020 |
Efficient homomorphic conversion between (ring) LWE ciphertexts H Chen, W Dai, M Kim, Y Song International Conference on Applied Cryptography and Network Security, 460-479, 2021 | 55 | 2021 |
Semi-parallel logistic regression for GWAS on encrypted data M Kim, Y Song, B Li, D Micciancio BMC medical genomics 13, 1-13, 2020 | 55 | 2020 |
Secure human action recognition by encrypted neural network inference M Kim, X Jiang, K Lauter, E Ismayilzada, S Shams Nature communications 13 (1), 4799, 2022 | 39* | 2022 |
SCOR: A secure international informatics infrastructure to investigate COVID-19 JL Raisaro, F Marino, J Troncoso-Pastoriza, R Beau-Lejdstrom, R Bellazzi, ... Journal of the American Medical Informatics Association 27 (11), 1721-1726, 2020 | 38 | 2020 |