关注
Jinsu Kim
Jinsu Kim
Security 2Lab, Software Center, Samsung Electronics
在 snu.ac.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
Batch fully homomorphic encryption over the integers
JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint, M Tibouchi, A Yun
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
4982013
A hybrid scheme of public-key encryption and somewhat homomorphic encryption
JH Cheon, J Kim
IEEE transactions on information forensics and security 10 (5), 1052-1063, 2015
942015
Efficient privacy-preserving matrix factorization via fully homomorphic encryption
S Kim, J Kim, D Koo, Y Kim, H Yoon, J Shin
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
742016
Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption
J Kim, D Koo, Y Kim, H Yoon, J Shin, S Kim
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-30, 2018
592018
CRT-based fully homomorphic encryption over the integers
JH Cheon, J Kim, MS Lee, A Yun
Information Sciences 310, 149-162, 2015
512015
A new approach to practical function-private inner product encryption
S Kim, J Kim, JH Seo
Theoretical Computer Science 783, 22-40, 2019
252019
A new scale-invariant homomorphic encryption scheme
J Kim, S Kim, JH Seo
Information Sciences 422, 177-187, 2018
192018
Homomorphic encryption and decryption methods using ring isomorphism, and apparatuses using the same
JH Cheon, J Kim, MS Lee
US Patent App. 14/127,478, 2015
142015
An Approach to Reduce Storage for Homomorphic Computations
JH Cheon, J Kim
Cryptology ePrint Archive, 2013
52013
Data protection method and apparatus
K Lee, J Cheon, K Eunyoung, KIM Bumhan, J Kim, KIM Hongtae, ...
US Patent 9,509,495, 2016
42016
Multilinear map via scale-invariant FHE: Enhancing security and efficiency
J Kim, S Kim, JH Seo
Cryptology ePrint Archive, 2015
42015
A Public Shuffle without Private Permutations
M Kim, J Kim, JH Cheon
Cryptology ePrint Archive, 2012
12012
系统目前无法执行此操作,请稍后再试。
文章 1–12