关注
Wonhee Cho
Wonhee Cho
在 snu.ac.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation
M Kim, AO Harmanci, JP Bossuat, S Carpov, JH Cheon, I Chillotti, W Cho, ...
Cell systems 12 (11), 1108-1120. e4, 2021
702021
Hardware architecture of a number theoretic transform for a bootstrappable RNS-based homomorphic encryption scheme
S Kim, K Lee, W Cho, Y Nam, JH Cheon, RA Rutenbar
2020 IEEE 28th Annual International Symposium on Field-Programmable Custom …, 2020
582020
FPGA-based accelerators of fully pipelined modular multipliers for homomorphic encryption
S Kim, K Lee, W Cho, JH Cheon, RA Rutenbar
2019 International Conference on ReConFigurable Computing and FPGAs …, 2019
482019
Meta-bts: Bootstrapping precision beyond the limit
Y Bae, JH Cheon, W Cho, J Kim, T Kim
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
272022
Secure tumor classification by shallow neural network using homomorphic encryption
S Hong, JH Park, W Cho, H Choe, JH Cheon
BMC genomics 23 (1), 284, 2022
21*2022
Statistical zeroizing attack: cryptanalysis of candidates of BP obfuscation over GGH15 multilinear map
JH Cheon, W Cho, M Hhan, J Kim, C Lee
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
102019
Adventures in crypto dark matter: attacks and fixes for weak pseudorandom functions
JH Cheon, W Cho, JH Kim, J Kim
IACR International Conference on Public-Key Cryptography, 739-760, 2021
92021
Algorithms for CRT-variant of approximate greatest common divisor problem
JH Cheon, W Cho, M Hhan, J Kim, C Lee
Journal of Mathematical Cryptology 14 (1), 397-413, 2020
72020
Improved Universal Thresholdizer from Iterative Shamir Secret Sharing
JH Cheon, W Cho, J Kim
Cryptology ePrint Archive, 2023
4*2023
Homomorphic Multiple Precision Multiplication for CKKS and Reduced Modulus Consumption
JH Cheon, W Cho, J Kim, D Stehlé
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
32023
Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants
W Cho, J Kim, C Lee
IET Information Security 15 (6), 417-427, 2021
22021
Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions
JH Cheon, W Cho, JH Kim, J Kim
Designs, Codes and Cryptography 90 (8), 1735-1760, 2022
12022
(In) security of concrete instantiation of Lin17’s functional encryption scheme from noisy multilinear maps
W Cho, J Kim, C Lee
Designs, Codes and Cryptography 89, 973-1016, 2021
12021
Electronic device and controlling method for increasing an operation speed of homomorphic encrypted data
JH Cheon, CHO Wonhee, T Kim
US Patent App. 18/421,363, 2024
2024
Accelerating Homomorphic Comparison Operations for Thresholding Using an Asymmetric Input Range and Input Scaling
S Kim, W Cho
Proceedings of the Great Lakes Symposium on VLSI 2024, 427-432, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–15