Batch fully homomorphic encryption over the integers JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint, M Tibouchi, A Yun Annual International Conference on the Theory and Applications of …, 2013 | 426 | 2013 |
Measuring the mixing time of social graphs A Mohaisen, A Yun, Y Kim Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 383-389, 2010 | 228 | 2010 |
Quantum security of NMAC and related constructions F Song, A Yun Annual International Cryptology Conference, 283-309, 2017 | 125 | 2017 |
On protecting integrity and confidentiality of cryptographic file system for outsourced storage A Yun, C Shi, Y Kim Proceedings of the 2009 ACM workshop on Cloud computing security, 67-76, 2009 | 105 | 2009 |
CRT-based fully homomorphic encryption over the integers JH Cheon, J Kim, MS Lee, A Yun Information Sciences 310, 149-162, 2015 | 86 | 2015 |
A simple variant of the Merkle-Damgård scheme with a permutation S Hirose, JH Park, A Yun International Conference on the Theory and Application of Cryptology and …, 2007 | 85 | 2007 |
On homomorphic signatures for network coding A Yun, JH Cheon, Y Kim IEEE Transactions on Computers 59 (9), 1295-1296, 2010 | 67 | 2010 |
Cryptanalysis of the Full HAVAL with 4 and 5 Passes H Yu, X Wang, A Yun, S Park International Workshop on Fast Software Encryption, 89-110, 2006 | 39 | 2006 |
Homomorphic authenticated encryption secure against chosen-ciphertext attack C Joo, A Yun International Conference on the Theory and Application of Cryptology and …, 2014 | 35 | 2014 |
Finding collision on 45-step HAS-160 A Yun, SH Sung, S Park, D Chang, S Hong, HS Cho International Conference on Information Security and Cryptology, 146-155, 2005 | 23 | 2005 |
Collision search attack for 53-step HAS-160 HS Cho, S Park, SH Sung, A Yun International Conference on Information Security and Cryptology, 286-295, 2006 | 22 | 2006 |
On lai–massey and quasi-feistel ciphers A Yun, JH Park, J Lee Designs, Codes and Cryptography 58 (1), 45-72, 2011 | 21 | 2011 |
Generic hardness of the multiple discrete logarithm problem A Yun Annual International Conference on the Theory and Applications of …, 2015 | 18 | 2015 |
Anonymous signatures revisited V Saraswat, A Yun International Conference on Provable Security, 140-153, 2009 | 17 | 2009 |
Lai-Massey scheme and quasi-Feistel networks A Yun, JH Park, J Lee Cryptology ePrint Archive, 2007 | 11 | 2007 |
General linear group action on tensors: A candidate for post-quantum cryptography Z Ji, Y Qiao, F Song, A Yun Theory of Cryptography Conference, 251-281, 2019 | 9 | 2019 |
A Simple Variant of the Merkle–Damgård Scheme with a Permutation S Hirose, JH Park, A Yun Journal of cryptology 25 (2), 271-309, 2012 | 9 | 2012 |
Secure network coding for a P2P system HJ Kang, A Yun, EY Vasserman, HT Lee, JH Cheon, Y Kim ACM Conference on Computer and Communications Security, Poster, 2009 | 5 | 2009 |
Secure Fully Homomorphic Authenticated Encryption J Kim, A Yun IEEE Access 9, 107279-107297, 2021 | 3 | 2021 |
A strongly unforgeable homomorphic mac over integers C Joo, A Yun Journal of the Korea Institute of Information Security & Cryptology 24 (3 …, 2014 | 1 | 2014 |