An identity-based signature from gap Diffie-Hellman groups JC Choon, J Hee Cheon International workshop on public key cryptography, 18-30, 2003 | 1403 | 2003 |
Homomorphic encryption for arithmetic of approximate numbers JH Cheon, A Kim, M Kim, Y Song International Conference on the Theory and Application of Cryptology and …, 2017 | 692 | 2017 |
New public-key cryptosystem using braid groups KH Ko, SJ Lee, JH Cheon, JW Han, J Kang, C Park Annual International Cryptology Conference, 166-183, 2000 | 651 | 2000 |
Batch fully homomorphic encryption over the integers JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint, M Tibouchi, A Yun Annual International Conference on the Theory and Applications of …, 2013 | 426 | 2013 |
Security analysis of the strong Diffie-Hellman problem JH Cheon Annual International Conference on the Theory and Applications of …, 2006 | 309 | 2006 |
Cryptanalysis of the multilinear map over the integers JH Cheon, K Han, C Lee, H Ryu, D Stehlé Annual International Conference on the Theory and Applications of …, 2015 | 297 | 2015 |
Batch verifications with ID-based signatures HJ Yoon, JH Cheon, Y Kim International Conference on Information Security and Cryptology, 233-248, 2004 | 272* | 2004 |
Improved impossible differential cryptanalysis of Rijndael and Crypton JH Cheon, MJ Kim, K Kim, L Jung-Yeun, SW Kang International Conference on Information Security and Cryptology, 39-49, 2001 | 177 | 2001 |
Bootstrapping for approximate homomorphic encryption JH Cheon, K Han, A Kim, M Kim, Y Song Annual International Conference on the Theory and Applications of …, 2018 | 170 | 2018 |
An efficient implementation of braid groups JC Cha, KH Ko, SJ Lee, JW Han, JH Cheon International Conference on the Theory and Application of Cryptology and …, 2001 | 156 | 2001 |
An analysis of proxy signatures: Is a secure channel necessary? JY Lee, JH Cheon, S Kim Cryptographers’ Track at the RSA Conference, 68-79, 2003 | 154 | 2003 |
Homomorphic computation of edit distance JH Cheon, M Kim, K Lauter International Conference on Financial Cryptography and Data Security, 194-212, 2015 | 143 | 2015 |
Logistic regression model training based on the approximate homomorphic encryption A Kim, Y Song, M Kim, K Lee, JH Cheon BMC medical genomics 11 (4), 23-31, 2018 | 142 | 2018 |
Fully homomophic encryption over the integers revisited JH Cheon, D Stehlé Annual International Conference on the Theory and Applications of …, 2015 | 127 | 2015 |
An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero JH Cheon, J Jeong, C Lee LMS Journal of Computation and Mathematics 19 (A), 255-266, 2016 | 123 | 2016 |
A full RNS variant of approximate homomorphic encryption JH Cheon, K Han, A Kim, M Kim, Y Song International Conference on Selected Areas in Cryptography, 347-368, 2018 | 118 | 2018 |
A polynomial time algorithm for the braid Diffie-Hellman conjugacy problem JH Cheon, B Jun Annual International Cryptology Conference, 212-225, 2003 | 115 | 2003 |
Encrypting controller using fully homomorphic encryption for security of cyber-physical systems J Kim, C Lee, H Shim, JH Cheon, A Kim, M Kim, Y Song IFAC-PapersOnLine 49 (22), 175-180, 2016 | 108 | 2016 |
Lizard: Cut off the tail! A practical post-quantum public-key encryption from LWE and LWR JH Cheon, D Kim, J Lee, Y Song International Conference on Security and Cryptography for Networks, 160-177, 2018 | 94 | 2018 |
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma A Bagherzandi, JH Cheon, S Jarecki Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 89 | 2008 |