Privacy-preserving machine learning with fully homomorphic encryption for deep neural network JW Lee, HC Kang, Y Lee, W Choi, J Eom, M Deryabin, E Lee, J Lee, ... iEEE Access 10, 30039-30054, 2022 | 224 | 2022 |
Openfhe: Open-source fully homomorphic encryption library A Al Badawi, J Bates, F Bergamaschi, DB Cousins, S Erabelli, N Genise, ... proceedings of the 10th workshop on encrypted computing & applied …, 2022 | 152 | 2022 |
High-precision bootstrapping of RNS-CKKS homomorphic encryption using optimal minimax polynomial approximation and inverse sine function JW Lee, E Lee, Y Lee, YS Kim, JS No Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021 | 87 | 2021 |
High-precision bootstrapping for approximate homomorphic encryption by error variance minimization Y Lee, JW Lee, YS Kim, Y Kim, JS No, HC Kang Annual International Conference on the Theory and Applications of …, 2022 | 55 | 2022 |
Efficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption Y Lee, D Micciancio, A Kim, R Choi, M Deryabin, J Eom, D Yoo Annual International Conference on the Theory and Applications of …, 2023 | 50 | 2023 |
General bootstrapping approach for RLWE-based homomorphic encryption A Kim, M Deryabin, J Eom, R Choi, Y Lee, W Ghang, D Yoo IEEE Transactions on Computers, 2023 | 33 | 2023 |
Near-optimal polynomial for modulus reduction using l2-norm for approximate homomorphic encryption Y Lee, JW Lee, YS Kim, JS No IEEE Access 8, 144321-144330, 2020 | 26 | 2020 |
Modified pqsigRM: RM code-based signature scheme Y Lee, W Lee, YS Kim, JS No IEEE Access 8, 177506-177518, 2020 | 22 | 2020 |
SRV, K AA Badawi, J Bates, F Bergamaschi, DB Cousins, S Erabelli, N Genise, ... Rohloff, J. Saylor, D. Suponitsky, M. Triplett, V. Vaikuntanathan, and V …, 2022 | 21 | 2022 |
Medha: Microcoded hardware accelerator for computing on encrypted data AC Mert, S Kwon, Y Shin, D Yoo, Y Lee, SS Roy arXiv preprint arXiv:2210.05476, 2022 | 17 | 2022 |
Iterative coding scheme satisfying gc balance and run-length constraints for dna storage with robustness to error propagation SJ Park, Y Lee, JS No Journal of Communications and Networks 24 (3), 283-291, 2022 | 15 | 2022 |
Post quantum signature scheme based on modified Reed-Muller code pqsigRM W Lee, YS Kim, YW Lee, JS No First round submission to the NIST postquantum cryptography call, 2017 | 12 | 2017 |
Cryptanalysis of the Ivanov-Kabatiansky-Krouk-Rumenko Cryptosystems Y Lee, J Cho, YS Kim, JS No IEEE Communications Letters 24 (12), 2678-2681, 2020 | 11 | 2020 |
Ciphertext-only attack on linear feedback shift register-based Esmaeili-Gulliver cryptosystem Y Lee, YS Kim, JS No IEEE Communications Letters 21 (5), 971-974, 2017 | 11 | 2017 |
Enhanced pqsigRM: code-based digital signature scheme with short signature and fast verification for post-quantum cryptography J Cho, JS No, Y Lee, Z Koo, YS Kim Cryptology ePrint Archive, 2022 | 9 | 2022 |
LFHE: fully homomorphic encryption with bootstrapping key size less than a megabyte A Kim, Y Lee, M Deryabin, J Eom, R Choi Cryptology ePrint Archive, 2023 | 7 | 2023 |
{ELASM}:{Error-Latency-Aware} Scale Management for Fully Homomorphic Encryption Y Lee, S Cheon, D Kim, D Lee, H Kim 32nd USENIX Security Symposium (USENIX Security 23), 4697-4714, 2023 | 5 | 2023 |
Post quantum signature scheme based on modified Reed-Muller code pqsigRM. first round submission to the NIST postquantum cryptography call W Lee, YS Kim, YW Lee, JS No November, 2017 | 4 | 2017 |
Optimizing layerwise polynomial approximation for efficient private inference on fully homomorphic encryption: a dynamic programming approach J Lee, E Lee, YS Kim, Y Lee, JW Lee, Y Kim, JS No arXiv preprint arXiv:2310.10349, 2023 | 3 | 2023 |
Bootstrapping on SEAL HC Kang, JW Lee, Y Lee, YS Kim, JS No Cryptology ePrint Archive, 2020 | 3 | 2020 |