Joohee Lee
Orcid: 0000-0002-1901-2410
According to our database1,
Joohee Lee
authored at least 28 papers
between 1996 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Verifiable computation over encrypted data via MPC-in-the-head zero-knowledge proofs.
Int. J. Inf. Sec., February, 2025
2024
IEEE Trans. Inf. Forensics Secur., 2024
Privacy-Preserving Embedding via Look-up Table Evaluation with Fully Homomorphic Encryption.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
2023
Direct comparison of diagnostic and clinical values between Tc-99 m DPD and Tc-99 m PYP scintigraphy in patients with cardiac amyloidosis.
BMC Medical Imaging, December, 2023
IEEE Access, 2023
Security Evaluation on KpqC Round 1 Lattice-Based Algorithms Using Lattice Estimator.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Privacy-Preserving Fair Learning of Support Vector Machine with Homomorphic Encryption.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
2021
Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling.
IEEE Access, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Cogn. Technol. Work., 2020
2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
2017
Privacy-Preserving Computations of Predictive Medical Models with Minimax Approximation and Non-Adjacent Form.
Proceedings of the Financial Cryptography and Data Security, 2017
2016
Lizard: Cut off the Tail! // Practical Post-Quantum Public-Key Encryption from LWE and LWR.
IACR Cryptol. ePrint Arch., 2016
An Efficient Affine Equivalence Algorithm for Multiple S-Boxes and a Structured Affine Layer.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
2014
1996
Proceedings of the 7th IEEE International Symposium on Personal, 1996