Privacy enhanced matrix factorization for recommendation with local differential privacy H Shin, S Kim, J Shin, X Xiao IEEE Transactions on Knowledge and Data Engineering 30 (9), 1770-1782, 2018 | 215 | 2018 |
A secure smart-metering protocol over power-line communication S Kim, EY Kwon, M Kim, JH Cheon, S Ju, Y Lim, M Choi IEEE Transactions on Power Delivery 26 (4), 2370-2379, 2011 | 78 | 2011 |
Efficient privacy-preserving matrix factorization via fully homomorphic encryption S Kim, J Kim, D Koo, Y Kim, H Yoon, J Shin Proceedings of the 11th ACM on Asia conference on computer and …, 2016 | 75 | 2016 |
Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption J Kim, D Koo, Y Kim, H Yoon, J Shin, S Kim ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-30, 2018 | 59 | 2018 |
A new approach to practical function-private inner product encryption S Kim, J Kim, JH Seo Theoretical Computer Science 783, 22-40, 2019 | 25 | 2019 |
Method and apparatus for encrypting data JW Seo, YH Hwang, S Kim US Patent 10,177,906, 2019 | 22 | 2019 |
Learning new words from keystroke data with local differential privacy S Kim, H Shin, C Baek, S Kim, J Shin IEEE Transactions on Knowledge and Data Engineering 32 (3), 479-491, 2018 | 19 | 2018 |
A new scale-invariant homomorphic encryption scheme J Kim, S Kim, JH Seo Information Sciences 422, 177-187, 2018 | 19 | 2018 |
Threshold signature schemes for ElGamal variants S Kim, J Kim, JH Cheon, S Ju Computer Standards & Interfaces 33 (4), 432-437, 2011 | 19 | 2011 |
On the final exponentiation in Tate pairing computations T Kim, S Kim, JH Cheon IEEE Transactions on Information Theory 59 (6), 4033-4041, 2013 | 16 | 2013 |
Enhancing differential privacy for federated learning at scale C Baek, S Kim, D Nam, J Park IEEE Access 9, 148090-148103, 2021 | 12 | 2021 |
Fast order-preserving encryption from uniform distribution sampling YH Hwang, S Kim, JW Seo Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 41-52, 2015 | 10 | 2015 |
Efficient zero-knowledge arguments in discrete logarithm setting: sublogarithmic proof or sublinear verifier S Kim, H Lee, JH Seo International Conference on the Theory and Application of Cryptology and …, 2022 | 8 | 2022 |
Fixed argument pairing inversion on elliptic curves S Kim, JH Cheon Designs, Codes and Cryptography 77, 143-152, 2015 | 5 | 2015 |
A parameterized splitting system and its application to the discrete logarithm problem with low Hamming weight product exponents S Kim, JH Cheon Public Key Cryptography–PKC 2008: 11th International Workshop on Practice …, 2008 | 5 | 2008 |
Multilinear map via scale-invariant FHE: Enhancing security and efficiency J Kim, S Kim, JH Seo Cryptology ePrint Archive, 2015 | 4 | 2015 |
Accelerating the final exponentiation in the computation of the tate pairings T Kim, S Kim, JH Cheon Cryptology ePrint Archive, 2012 | 4 | 2012 |
Efficient sum-check protocol for convolution C Ju, H Lee, H Chung, JH Seo, S Kim IEEE Access 9, 164047-164059, 2021 | 3 | 2021 |
Parameterized splitting systems for the discrete logarithm S Kim, JH Cheon IEEE transactions on information theory 56 (5), 2528-2535, 2010 | 3 | 2010 |
Leopard: Sublinear Verifier Inner Product Argument Under Discrete Logarithm Assumption S Kim, G Lee, H Lee, JH Seo IEEE Transactions on Information Forensics and Security, 2023 | 1 | 2023 |