Deep abstraction and weighted feature selection for Wi-Fi impersonation detection ME Aminanto, R Choi, HC Tanuwidjaja, PD Yoo, K Kim IEEE Transactions on Information Forensics and Security 13 (3), 621-636, 2017 | 247 | 2017 |
Privacy-preserving deep learning on machine learning as a service—a comprehensive survey HC Tanuwidjaja, R Choi, S Baek, K Kim IEEE Access 8, 167425-167447, 2020 | 102 | 2020 |
Efficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption Y Lee, D Micciancio, A Kim, R Choi, M Deryabin, J Eom, D Yoo Annual International Conference on the Theory and Applications of …, 2023 | 60 | 2023 |
A survey on deep learning techniques for privacy-preserving HC Tanuwidjaja, R Choi, K Kim Machine Learning for Cyber Security: Second International Conference, ML4CS …, 2019 | 53 | 2019 |
General bootstrapping approach for RLWE-based homomorphic encryption A Kim, M Deryabin, J Eom, R Choi, Y Lee, W Ghang, D Yoo IEEE Transactions on Computers, 2023 | 34 | 2023 |
Security analysis of end-to-end encryption in Telegram J Lee, R Choi, S Kim, K Kim Simposio en Criptografía Seguridad Informática, Naha, Japón. Disponible en …, 2017 | 20 | 2017 |
Lattice-based multi-signature with linear homomorphism R Choi, K Kim 2016 Symposium on Cryptography and Information Security (SCIS 2016), 2016 | 12 | 2016 |
LFHE: fully homomorphic encryption with bootstrapping key size less than a megabyte A Kim, Y Lee, M Deryabin, J Eom, R Choi Cryptology ePrint Archive, 2023 | 9 | 2023 |
Design and implementation of constant-round dynamic group key exchange from RLWE R Choi, D Hong, S Han, S Baek, W Kang, K Kim IEEE Access 8, 94610-94630, 2020 | 9 | 2020 |
Constant-round dynamic group key exchange from RLWE assumption R Choi, D Hong, K Kim Cryptology ePrint Archive, 2020 | 9 | 2020 |
AtLast: Another three-party lattice-based PAKE scheme R Choi, H An, K Kim Proceedings of the 2018 Symposium on Cryptography and Information Security …, 2018 | 7 | 2018 |
Blockchain-based decentralized key management system with quantum resistance H An, R Choi, K Kim Information Security Applications: 19th International Conference, WISA 2018 …, 2019 | 5 | 2019 |
Performance evaluation of liboqs in open quantum safe project (part i) H An, R Choi, J Lee, K Kim Proc. Symposium on Cryptography and Information Security SCIS 2018, 2018 | 5 | 2018 |
Lattice-based threshold signature with message block sharing R Choi, K Kim Proc. of The 31st Symposium on Cryptography and Information Security, 1-7, 2014 | 5 | 2014 |
Implementation of tree-based dynamic group key exchange with newhope R Choi, D Hong, K Kim IEICE Technical Committee on Information Security, 1-8, 2020 | 3 | 2020 |
Limitations of privacy-preserving for confidential data training by deep learning HC Tanuwidjaja, R Choi, K Kim 2019 symposium on cryptography and information security (SCIS 2019). IEICE …, 2019 | 2 | 2019 |
양자 컴퓨터 공격에 안전한 격자 기반 키 교환 방식의 비교 최락용, 안형철, 이지은, 김성숙, 김광조 한국통신학회논문지 42 (11), 2200-2207, 2017 | 2 | 2017 |
Encryption key generating method, appratus, ciphertext operation method and apparatus using the generated encryption key EOM Jieun, M Deriabin, A Kim, Y Lee, C Rakyong, W Ghang, D Yoo US Patent App. 17/744,258, 2022 | 1 | 2022 |
System and method for generating scalable group key based on homomorphic encryption with trust server K Kim, C Rakyong US Patent 11,411,715, 2022 | 1 | 2022 |
Adding authenticity into tree-based group key agreement by public ledger S Han, R Choi, K Kim 2019 Symposium on Cryptography and Information Security (SCIS 2019). IEICE …, 2019 | 1 | 2019 |