Hyung Tae Lee

Orcid: 0000-0002-0920-2026

According to our database1, Hyung Tae Lee authored at least 36 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Insecurity of Chait et al.'s RSA-Based Aggregate Signature Scheme.
IEEE Access, 2024

2023
On the security of functional encryption in the generic group model.
Des. Codes Cryptogr., September, 2023

Cryptanalysis of Zhu et al.'s Identity-Based Encryption With Equality Test Without Random Oracles.
IEEE Access, 2023

A Survey on Epoch-based In-Memory Database Systems.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

A Review on AI-Enabled Congestion Control Schemes for Content Centric Networks.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

UAV-Satellite Integration for Communication System: Potential Applications and Key Challenges.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

Experimental Analysis of the Recent Key Recovery Protocol with respect to Commitment Schemes.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

Unified Framework for End-User Authentication Protocol in Feature-as-a-Service Models.
Proceedings of the 14th International Conference on Information and Communication Technology Convergence, 2023

Code-Based Secret Handshake Scheme, Revisited.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Attack and improvement of the recent identity-based encryption with authorized equivalence test in cluster computing.
Clust. Comput., 2022

A Key Recovery Protocol for Multiparty Threshold ECDSA Schemes.
IEEE Access, 2022

Known Plaintext Attacks on the Omar and abed Homomorphic Encryption Scheme.
Proceedings of the 13th International Conference on Information and Communication Technology Convergence, 2022

2021
IronMask: Modular Architecture for Protecting Deep Face Template.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2021

2020
Provably Secure Group Signature Schemes From Code-Based Assumptions.
IEEE Trans. Inf. Theory, 2020

Public key encryption with equality test in the standard model.
Inf. Sci., 2020

Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al.
IACR Cryptol. ePrint Arch., 2020

2019
Private Compound Wildcard Queries Using Fully Homomorphic Encryption.
IEEE Trans. Dependable Secur. Comput., 2019

Efficient public key encryption with equality test in the standard model.
Theor. Comput. Sci., 2019

Fully homomorphic encryption over the integers for non-binary plaintexts without the sparse subset sum problem.
Theor. Comput. Sci., 2019

Public key encryption with equality test from generic assumptions in the random oracle model.
Inf. Sci., 2019

Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields.
IACR Cryptol. ePrint Arch., 2019

Search Condition-Hiding Query Evaluation on Encrypted Databases.
IEEE Access, 2019

Experimenting With Non-Interactive Range Proofs Based on the Strong RSA Assumption.
IEEE Access, 2019

2018
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017.
IACR Cryptol. ePrint Arch., 2018

2016
Analysis of Gong et al.'s CCA2-secure homomorphic encryption.
Theor. Comput. Sci., 2016

Semi-generic construction of public key encryption and identity-based encryption with equality test.
Inf. Sci., 2016

Better Security for Queries on Encrypted Databases.
IACR Cryptol. ePrint Arch., 2016

CCA2 Attack and Modification of Huang <i>et al</i>.'s Public Key Encryption with Authorized Equality Test.
Comput. J., 2016

2015
On the Efficiency of FHE-based Private Queries.
IACR Cryptol. ePrint Arch., 2015

A Provably Secure Group Signature Scheme from Code-Based Assumptions.
IACR Cryptol. ePrint Arch., 2015

2014
Security Analysis of Multilinear Maps over the Integers.
IACR Cryptol. ePrint Arch., 2014

A New Additive Homomorphic Encryption based on the co-ACD Problem.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2012
Invertible Polynomial Representation for Private Set Operations.
IACR Cryptol. ePrint Arch., 2012

2011
Analysis of Discrete Logarithm Algorithm using Pre-computation.
IACR Cryptol. ePrint Arch., 2011

Mutual Private Set Intersection with Linear Complexity.
IACR Cryptol. ePrint Arch., 2011

Correcting Errors in Private Keys Obtained from Cold Boot Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011


  Loading...