关注
Yongwoo Lee
Yongwoo Lee
在 inha.ac.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
Privacy-preserving machine learning with fully homomorphic encryption for deep neural network
JW Lee, HC Kang, Y Lee, W Choi, J Eom, M Deryabin, E Lee, J Lee, ...
iEEE Access 10, 30039-30054, 2022
2242022
Openfhe: Open-source fully homomorphic encryption library
A Al Badawi, J Bates, F Bergamaschi, DB Cousins, S Erabelli, N Genise, ...
proceedings of the 10th workshop on encrypted computing & applied …, 2022
1522022
High-precision bootstrapping of RNS-CKKS homomorphic encryption using optimal minimax polynomial approximation and inverse sine function
JW Lee, E Lee, Y Lee, YS Kim, JS No
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
872021
High-precision bootstrapping for approximate homomorphic encryption by error variance minimization
Y Lee, JW Lee, YS Kim, Y Kim, JS No, HC Kang
Annual International Conference on the Theory and Applications of …, 2022
552022
Efficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption
Y Lee, D Micciancio, A Kim, R Choi, M Deryabin, J Eom, D Yoo
Annual International Conference on the Theory and Applications of …, 2023
502023
General bootstrapping approach for RLWE-based homomorphic encryption
A Kim, M Deryabin, J Eom, R Choi, Y Lee, W Ghang, D Yoo
IEEE Transactions on Computers, 2023
332023
Near-optimal polynomial for modulus reduction using l2-norm for approximate homomorphic encryption
Y Lee, JW Lee, YS Kim, JS No
IEEE Access 8, 144321-144330, 2020
262020
Modified pqsigRM: RM code-based signature scheme
Y Lee, W Lee, YS Kim, JS No
IEEE Access 8, 177506-177518, 2020
222020
SRV, K
AA Badawi, J Bates, F Bergamaschi, DB Cousins, S Erabelli, N Genise, ...
Rohloff, J. Saylor, D. Suponitsky, M. Triplett, V. Vaikuntanathan, and V …, 2022
212022
Medha: Microcoded hardware accelerator for computing on encrypted data
AC Mert, S Kwon, Y Shin, D Yoo, Y Lee, SS Roy
arXiv preprint arXiv:2210.05476, 2022
172022
Iterative coding scheme satisfying gc balance and run-length constraints for dna storage with robustness to error propagation
SJ Park, Y Lee, JS No
Journal of Communications and Networks 24 (3), 283-291, 2022
152022
Post quantum signature scheme based on modified Reed-Muller code pqsigRM
W Lee, YS Kim, YW Lee, JS No
First round submission to the NIST postquantum cryptography call, 2017
122017
Cryptanalysis of the Ivanov-Kabatiansky-Krouk-Rumenko Cryptosystems
Y Lee, J Cho, YS Kim, JS No
IEEE Communications Letters 24 (12), 2678-2681, 2020
112020
Ciphertext-only attack on linear feedback shift register-based Esmaeili-Gulliver cryptosystem
Y Lee, YS Kim, JS No
IEEE Communications Letters 21 (5), 971-974, 2017
112017
Enhanced pqsigRM: code-based digital signature scheme with short signature and fast verification for post-quantum cryptography
J Cho, JS No, Y Lee, Z Koo, YS Kim
Cryptology ePrint Archive, 2022
92022
LFHE: fully homomorphic encryption with bootstrapping key size less than a megabyte
A Kim, Y Lee, M Deryabin, J Eom, R Choi
Cryptology ePrint Archive, 2023
72023
{ELASM}:{Error-Latency-Aware} Scale Management for Fully Homomorphic Encryption
Y Lee, S Cheon, D Kim, D Lee, H Kim
32nd USENIX Security Symposium (USENIX Security 23), 4697-4714, 2023
52023
Post quantum signature scheme based on modified Reed-Muller code pqsigRM. first round submission to the NIST postquantum cryptography call
W Lee, YS Kim, YW Lee, JS No
November, 2017
42017
Optimizing layerwise polynomial approximation for efficient private inference on fully homomorphic encryption: a dynamic programming approach
J Lee, E Lee, YS Kim, Y Lee, JW Lee, Y Kim, JS No
arXiv preprint arXiv:2310.10349, 2023
32023
Bootstrapping on SEAL
HC Kang, JW Lee, Y Lee, YS Kim, JS No
Cryptology ePrint Archive, 2020
32020
系统目前无法执行此操作,请稍后再试。
文章 1–20