关注
Sungwook Kim
Sungwook Kim
Department of Information Security, Seoul Women's University
在 swu.ac.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
Privacy enhanced matrix factorization for recommendation with local differential privacy
H Shin, S Kim, J Shin, X Xiao
IEEE Transactions on Knowledge and Data Engineering 30 (9), 1770-1782, 2018
2152018
A secure smart-metering protocol over power-line communication
S Kim, EY Kwon, M Kim, JH Cheon, S Ju, Y Lim, M Choi
IEEE Transactions on Power Delivery 26 (4), 2370-2379, 2011
782011
Efficient privacy-preserving matrix factorization via fully homomorphic encryption
S Kim, J Kim, D Koo, Y Kim, H Yoon, J Shin
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
752016
Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption
J Kim, D Koo, Y Kim, H Yoon, J Shin, S Kim
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-30, 2018
592018
A new approach to practical function-private inner product encryption
S Kim, J Kim, JH Seo
Theoretical Computer Science 783, 22-40, 2019
252019
Method and apparatus for encrypting data
JW Seo, YH Hwang, S Kim
US Patent 10,177,906, 2019
222019
Learning new words from keystroke data with local differential privacy
S Kim, H Shin, C Baek, S Kim, J Shin
IEEE Transactions on Knowledge and Data Engineering 32 (3), 479-491, 2018
192018
A new scale-invariant homomorphic encryption scheme
J Kim, S Kim, JH Seo
Information Sciences 422, 177-187, 2018
192018
Threshold signature schemes for ElGamal variants
S Kim, J Kim, JH Cheon, S Ju
Computer Standards & Interfaces 33 (4), 432-437, 2011
192011
On the final exponentiation in Tate pairing computations
T Kim, S Kim, JH Cheon
IEEE Transactions on Information Theory 59 (6), 4033-4041, 2013
162013
Enhancing differential privacy for federated learning at scale
C Baek, S Kim, D Nam, J Park
IEEE Access 9, 148090-148103, 2021
122021
Fast order-preserving encryption from uniform distribution sampling
YH Hwang, S Kim, JW Seo
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 41-52, 2015
102015
Efficient zero-knowledge arguments in discrete logarithm setting: sublogarithmic proof or sublinear verifier
S Kim, H Lee, JH Seo
International Conference on the Theory and Application of Cryptology and …, 2022
82022
Fixed argument pairing inversion on elliptic curves
S Kim, JH Cheon
Designs, Codes and Cryptography 77, 143-152, 2015
52015
A parameterized splitting system and its application to the discrete logarithm problem with low Hamming weight product exponents
S Kim, JH Cheon
Public Key Cryptography–PKC 2008: 11th International Workshop on Practice …, 2008
52008
Multilinear map via scale-invariant FHE: Enhancing security and efficiency
J Kim, S Kim, JH Seo
Cryptology ePrint Archive, 2015
42015
Accelerating the final exponentiation in the computation of the tate pairings
T Kim, S Kim, JH Cheon
Cryptology ePrint Archive, 2012
42012
Efficient sum-check protocol for convolution
C Ju, H Lee, H Chung, JH Seo, S Kim
IEEE Access 9, 164047-164059, 2021
32021
Parameterized splitting systems for the discrete logarithm
S Kim, JH Cheon
IEEE transactions on information theory 56 (5), 2528-2535, 2010
32010
Leopard: Sublinear Verifier Inner Product Argument Under Discrete Logarithm Assumption
S Kim, G Lee, H Lee, JH Seo
IEEE Transactions on Information Forensics and Security, 2023
12023
系统目前无法执行此操作,请稍后再试。
文章 1–20