Jung Hee Cheon
Orcid: 0000-0002-7085-2220Affiliations:
- Seoul National University
According to our database1,
Jung Hee Cheon
authored at least 196 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
HEaaN-STAT: A Privacy-Preserving Statistical Analysis Toolkit for Large-Scale Numerical, Ordinal, and Categorical Data.
IEEE Trans. Dependable Secur. Comput., 2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
J. Comput. Biol., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Privacy-Preserving Embedding via Look-up Table Evaluation with Fully Homomorphic Encryption.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
2023
High-Throughput Deep Convolutional Neural Networks on Fully Homomorphic Encryption Using Channel-By-Channel Packing.
IACR Cryptol. ePrint Arch., 2023
Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus Consumption.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
HERMES: Efficient Ring Packing using MLWE Ciphertexts and Application to Transciphering.
IACR Cryptol. ePrint Arch., 2023
High-precision RNS-CKKS on fixed but smaller word-size architectures: theory and application.
IACR Cryptol. ePrint Arch., 2023
Toward Practical Privacy-Preserving Convolutional Neural Networks Exploiting Fully Homomorphic Encryption.
CoRR, 2023
2022
IEEE Trans. Inf. Forensics Secur., 2022
Int. J. Inf. Sec., 2022
Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions.
Des. Codes Cryptogr., 2022
Privacy-Preserving Text Classification on BERT Embeddings with Homomorphic Encryption.
Proceedings of the 2022 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
J. Math. Cryptol., 2021
Limits of Polynomial Packings for ℤ<sub>p<sup>k</sup></sub> and 픽<sub>p<sup>k</sup></sub>.
IACR Cryptol. ePrint Arch., 2021
MHz2k: MPC from HE over ℤ<sub>2<sup>k</sup></sub> with New Packing, Simpler Reshare, and Better ZKP.
IACR Cryptol. ePrint Arch., 2021
Accelerating Fully Homomorphic Encryption Through Architecture-Centric Analysis and Optimization.
IEEE Access, 2021
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Accelerating Fully Homomorphic Encryption Through Microarchitecture-Aware Analysis and Optimization.
Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software, 2021
MHz2k: MPC from HE over $\mathbb {Z}_{2^k}$ with New Packing, Simpler Reshare, and Better ZKP.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
J. Math. Cryptol., 2020
Adventures in Crypto Dark Matter: Attacks, Fixes and Analysis for Weak Pseudorandom Function Candidates.
IACR Cryptol. ePrint Arch., 2020
HEAAN Demystified: Accelerating Fully Homomorphic Encryption Through Architecture-centric Analysis and Optimization.
CoRR, 2020
How to Securely Collaborate on Data: Decentralized Threshold HE and Secure Key Update.
IEEE Access, 2020
Hardware Architecture of a Number Theoretic Transform for a Bootstrappable RNS-based Homomorphic Encryption Scheme.
Proceedings of the 28th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2020
Proceedings of the 59th IEEE Conference on Decision and Control, 2020
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Cryptoanalysis on 'A round-optimal lattice-based blind signature scheme for cloud services'.
Future Gener. Comput. Syst., 2019
A secure SNP panel scheme using homomorphically encrypted K-mers without SNP calling on the user side.
BMC Genom., 2019
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019
FPGA-based Accelerators of Fully Pipelined Modular Multipliers for Homomorphic Encryption.
Proceedings of the 2019 International Conference on ReConFigurable Computing and FPGAs, 2019
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019
Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
Proceedings of the Workshop on Artificial Intelligence Safety 2019 co-located with the Thirty-Third AAAI Conference on Artificial Intelligence 2019 (AAAI-19), 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from NTRU Attack.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map.
IACR Cryptol. ePrint Arch., 2018
Ensemble Method for Privacy-Preserving Logistic Regression Based on Homomorphic Encryption.
IEEE Access, 2018
IEEE Access, 2018
Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption.
IEEE Access, 2018
Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Need for Controllers Having Integer Coefficients in Homomorphically Encrypted Dynamic System.
Proceedings of the 57th IEEE Conference on Decision and Control, 2018
A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Privacy-Preserving Computations of Predictive Medical Models with Minimax Approximation and Non-Adjacent Form.
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
IEEE Trans. Knowl. Data Eng., 2016
Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data.
IEEE Trans. Inf. Forensics Secur., 2016
An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero.
LMS J. Comput. Math., 2016
LMS J. Comput. Math., 2016
The polynomial approximate common divisor problem and its application to the fully homomorphic encryption.
Inf. Sci., 2016
IACR Cryptol. ePrint Arch., 2016
Lizard: Cut off the Tail! // Practical Post-Quantum Public-Key Encryption from LWE and LWR.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
An Algorithm for NTRU Problems and Cryptanalysis of the GGH Multilinear Map without an encoding of zero.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Ghostshell: Secure Biometric Authentication using Integrity-based Homomorphic Evaluations.
IACR Cryptol. ePrint Arch., 2016
An Efficient Affine Equivalence Algorithm for Multiple S-Boxes and a Structured Affine Layer.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
IACR Cryptol. ePrint Arch., 2015
Comput. Stand. Interfaces, 2015
Proceedings of the Static Analysis - 22nd International Symposium, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the 26th IEEE International Conference on Application-specific Systems, 2015
2014
Analysis on a generalized algorithm for the strong discrete logarithm problem with auxiliary inputs.
Math. Comput., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IEEE Trans. Inf. Theory, 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
A Group Action on ℤ<sub>p</sub><sup>˟</sup> and the Generalized DLP with Auxiliary Inputs.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Proceedings of the Advances in Cryptology, 2013
2012
J. Commun. Networks, 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
2011
Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
2010
IEEE Trans. Inf. Theory, 2010
J. Commun. Networks, 2010
2009
Proceedings of the Public Key Cryptography, 2009
2008
IEEE Trans. Inf. Theory, 2008
ACM Trans. Inf. Syst. Secur., 2008
A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents.
Proceedings of the Public Key Cryptography, 2008
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Public Key Cryptography, 2007
2006
IEEE Trans. Computers, 2006
Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme.
Inf. Process. Lett., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
2003
SIAM J. Discret. Math., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Topics in Cryptology, 2003
2002
A Universal Forgery of Hess's Second ID-based Signature against the Known-message Attack.
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Algorithmic Number Theory, 5th International Symposium, 2002
2001
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation).
Proceedings of the Cryptography and Coding, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Proceedings of the Information Security and Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Advances in Cryptology, 1999
1998
Proceedings of the Public Key Cryptography, 1998