Jung Hee Cheon
Person information
- affiliation: Seoul National University
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2019
- [j33]Joohee Lee, Duhyeong Kim, Hyungkyu Lee, Younho Lee, Jung Hee Cheon:
RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices. IEEE Access 7: 2080-2091 (2019) - 2018
- [j32]Jung Hee Cheon, Kyoohyung Han, Seong-Min Hong, Hyoun Jin Kim, Junsoo Kim, Suseong Kim, Hosung Seo, Hyungbo Shim, Yongsoo Song:
Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption. IEEE Access 6: 24325-24339 (2018) - [j31]Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee:
Cryptanalysis on the HHSS Obfuscation Arising From Absence of Safeguards. IEEE Access 6: 40096-40104 (2018) - [j30]Jung Hee Cheon, Duhyeong Kim, Yongdai Kim, Yongsoo Song:
Ensemble Method for Privacy-Preserving Logistic Regression Based on Homomorphic Encryption. IEEE Access 6: 46938-46948 (2018) - [j29]Jung Hee Cheon, Changmin Lee, Hansol Ryu:
Cryptographic Multilinear Maps and Their Cryptanalysis. IEICE Transactions 101-A(1): 12-18 (2018) - [c52]Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee:
A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction. ACISP 2018: 28-44 - [c51]Jung Hee Cheon, Kyoohyung Han, Hyuntae Kim, Junsoo Kim, Hyungbo Shim:
Need for Controllers Having Integer Coefficients in Homomorphically Encrypted Dynamic System. CDC 2018: 5020-5025 - [c50]Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee:
Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem. CRYPTO (3) 2018: 184-210 - [c49]Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song:
Bootstrapping for Approximate Homomorphic Encryption. EUROCRYPT (1) 2018: 360-384 - [c48]Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song:
A Full RNS Variant of Approximate Homomorphic Encryption. SAC 2018: 347-368 - [c47]Jung Hee Cheon, Duhyeong Kim, Joohee Lee, Yongsoo Song:
Lizard: Cut Off the Tail! A Practical Post-quantum Public-Key Encryption from LWE and LWR. SCN 2018: 160-177 - [i57]Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song:
Bootstrapping for Approximate Homomorphic Encryption. IACR Cryptology ePrint Archive 2018: 153 (2018) - [i56]Andrey Kim, Yongsoo Song, Miran Kim, Keewoo Lee, Jung Hee Cheon:
Logistic Regression Model Training based on the Approximate Homomorphic Encryption. IACR Cryptology ePrint Archive 2018: 254 (2018) - [i55]Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee:
Cryptanalysis on the HHSS Obfuscation Arising from Absence of Safeguards. IACR Cryptology ePrint Archive 2018: 397 (2018) - [i54]Jung Hee Cheon, Minki Hhan, Jiseung Kim, Changmin Lee:
Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from NTRU Attack. IACR Cryptology ePrint Archive 2018: 408 (2018) - [i53]Jung Hee Cheon, Seungwan Hong, Changmin Lee, Yongha Son:
Polynomial Functional Encryption Scheme with Linear Ciphertext Size. IACR Cryptology ePrint Archive 2018: 585 (2018) - [i52]Kyoohyung Han, Seungwan Hong, Jung Hee Cheon, Daejun Park:
Efficient Logistic Regression on Large Encrypted Data. IACR Cryptology ePrint Archive 2018: 662 (2018) - [i51]Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee:
A Reusable Fuzzy Extractor with Practical Storage Size. IACR Cryptology ePrint Archive 2018: 681 (2018) - [i50]Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song:
A Full RNS Variant of Approximate Homomorphic Encryption. IACR Cryptology ePrint Archive 2018: 931 (2018) - [i49]Jung Hee Cheon, Kyoohyung Han, Minki Hhan:
Faster Homomorphic Discrete Fourier Transforms and Improved FHE Bootstrapping. IACR Cryptology ePrint Archive 2018: 1073 (2018) - [i48]Jung Hee Cheon, Wonhee Cho, Minki Hhan, Jiseung Kim, Changmin Lee:
Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map. IACR Cryptology ePrint Archive 2018: 1081 (2018) - [i47]Joohee Lee, Dongwoo Kim, Duhyeong Kim, Yongsoo Song, Junbum Shin, Jung Hee Cheon:
Instant Privacy-Preserving Biometric Authentication for Hamming Distance. IACR Cryptology ePrint Archive 2018: 1214 (2018) - [i46]Jung Hee Cheon, Andrey Kim, Donggeon Yhee:
Multi-dimensional Packing for HEAAN for Approximate Matrix Arithmetics. IACR Cryptology ePrint Archive 2018: 1245 (2018) - 2017
- [c46]Jung Hee Cheon, Andrey Kim, Miran Kim, Yong Soo Song:
Homomorphic Encryption for Arithmetic of Approximate Numbers. ASIACRYPT (1) 2017: 409-437 - [c45]Jung Hee Cheon, Jinhyuck Jeong, Joohee Lee, Keewoo Lee:
Privacy-Preserving Computations of Predictive Medical Models with Minimax Approximation and Non-Adjacent Form. Financial Cryptography Workshops 2017: 53-74 - [i45]Jung Hee Cheon, Kyoohyung Han, Duhyeong Kim:
Faster Bootstrapping of FHE over the Integers. IACR Cryptology ePrint Archive 2017: 79 (2017) - [i44]Jung Hee Cheon, Miran Kim, Yong Soo Song:
Secure Searching of Biomarkers Using Hybrid Homomorphic Encryption Scheme. IACR Cryptology ePrint Archive 2017: 294 (2017) - [i43]Jung Hee Cheon, Minki Hhan, Changmin Lee:
Cryptanalysis of the Overstretched NTRU Problem for General Modulus Polynomial. IACR Cryptology ePrint Archive 2017: 484 (2017) - 2016
- [j28]Jung Hee Cheon, Hyunsook Hong, Moon Sung Lee, Hansol Ryu:
The polynomial approximate common divisor problem and its application to the fully homomorphic encryption. Inf. Sci. 326: 41-58 (2016) - [j27]Chung Hun Baek, Jung Hee Cheon, Hyunsook Hong:
White-box AES implementation revisited. Journal of Communications and Networks 18(3): 273-287 (2016) - [j26]Jung Hee Cheon, Miran Kim, Myungsun Kim:
Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data. IEEE Trans. Information Forensics and Security 11(1): 188-199 (2016) - [j25]Myungsun Kim, Aziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Over-Threshold Aggregation Protocols over Distributed Datasets. IEEE Trans. Knowl. Data Eng. 28(9): 2467-2479 (2016) - [c44]Jung Hee Cheon, Pierre-Alain Fouque, Changmin Lee, Brice Minaud, Hansol Ryu:
Cryptanalysis of the New CLT Multilinear Map over the Integers. EUROCRYPT (1) 2016: 509-536 - [c43]Jung Hee Cheon, Kyoohyung Han, Jinsu Kim, Changmin Lee, Yongha Son:
A Practical Post-Quantum Public-Key Cryptosystem Based on \textsf spLWE. ICISC 2016: 51-74 - [c42]Jung Hee Cheon, Hyunsook Hong, Joohee Lee, Jooyoung Lee:
An Efficient Affine Equivalence Algorithm for Multiple S-Boxes and a Structured Affine Layer. SAC 2016: 299-316 - [e5]Jung Hee Cheon, Tsuyoshi Takagi:
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Lecture Notes in Computer Science 10031, 2016, ISBN 978-3-662-53886-9 [contents] - [e4]Jung Hee Cheon, Tsuyoshi Takagi:
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II. Lecture Notes in Computer Science 10032, 2016, ISBN 978-3-662-53889-0 [contents] - [i42]Jung Hee Cheon, Pierre-Alain Fouque, Changmin Lee, Brice Minaud, Hansol Ryu:
Cryptanalysis of the New CLT Multilinear Map over the Integers. IACR Cryptology ePrint Archive 2016: 135 (2016) - [i41]Jung Hee Cheon, Jinhyuck Jeong, Changmin Lee:
An Algorithm for NTRU Problems and Cryptanalysis of the GGH Multilinear Map without an encoding of zero. IACR Cryptology ePrint Archive 2016: 139 (2016) - [i40]Jung Hee Cheon, Duhyeong Kim:
Probability that the k-gcd of products of positive integers is B-smooth. IACR Cryptology ePrint Archive 2016: 334 (2016) - [i39]Jung Hee Cheon, Andrey Kim, Miran Kim, Yong Soo Song:
Floating-Point Homomorphic Encryption. IACR Cryptology ePrint Archive 2016: 421 (2016) - [i38]Jung Hee Cheon, HeeWon Chung, Myungsun Kim, Kang-Won Lee:
Ghostshell: Secure Biometric Authentication using Integrity-based Homomorphic Evaluations. IACR Cryptology ePrint Archive 2016: 484 (2016) - [i37]Jung Hee Cheon, Damien Stehlé:
Fully Homomorphic Encryption over the Integers Revisited. IACR Cryptology ePrint Archive 2016: 837 (2016) - [i36]Jung Hee Cheon, Kyoohyung Han, Jinsu Kim, Changmin Lee, Yongha Son:
A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE. IACR Cryptology ePrint Archive 2016: 1055 (2016) - [i35]Jung Hee Cheon, Duhyeong Kim, Joohee Lee, Yong Soo Song:
Lizard: Cut off the Tail! // Practical Post-Quantum Public-Key Encryption from LWE and LWR. IACR Cryptology ePrint Archive 2016: 1126 (2016) - 2015
- [j24]Jung Hee Cheon, Mun-Kyu Lee:
Improved batch verification of signatures using generalized sparse exponents. Computer Standards & Interfaces 40: 42-52 (2015) - [j23]Sungwook Kim, Jung Hee Cheon:
Fixed argument pairing inversion on elliptic curves. Des. Codes Cryptography 77(1): 143-152 (2015) - [j22]Jung Hee Cheon, Jinsu Kim, Moon Sung Lee, Aaram Yun:
CRT-based fully homomorphic encryption over the integers. Inf. Sci. 310: 149-162 (2015) - [j21]Minkyu Kim, Jung Hee Cheon:
Computing prime divisors in an interval. Math. Comput. 84(291): 339-354 (2015) - [j20]Jung Hee Cheon, Jinsu Kim:
A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption. IEEE Trans. Information Forensics and Security 10(5): 1052-1063 (2015) - [c41]Moon Sung Lee, Yongje Lee, Jung Hee Cheon, Yunheung Paek:
Accelerating bootstrapping in FHEW using GPUs. ASAP 2015: 128-135 - [c40]Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, Damien Stehlé:
Cryptanalysis of the Multilinear Map over the Integers. EUROCRYPT (1) 2015: 3-12 - [c39]Jung Hee Cheon, Damien Stehlé:
Fully Homomophic Encryption over the Integers Revisited. EUROCRYPT (1) 2015: 513-536 - [c38]Jung Hee Cheon, Miran Kim, Myungsun Kim:
Search-and-Compute on Encrypted Data. Financial Cryptography Workshops 2015: 142-159 - [c37]Jung Hee Cheon, Miran Kim, Kristin E. Lauter:
Homomorphic Computation of Edit Distance. Financial Cryptography Workshops 2015: 194-212 - [c36]Woosuk Lee, Hyunsook Hong, Kwangkeun Yi, Jung Hee Cheon:
Static Analysis with Set-Closure in Secrecy. SAS 2015: 18-35 - [e3]Tetsu Iwata, Jung Hee Cheon:
Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9452, Springer 2015, ISBN 978-3-662-48796-9 [contents] - [e2]Tetsu Iwata, Jung Hee Cheon:
Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9453, Springer 2015, ISBN 978-3-662-48799-0 [contents] - [i34]Jung Hee Cheon, Miran Kim, Kristin E. Lauter:
Homomorphic Computation of Edit Distance. IACR Cryptology ePrint Archive 2015: 132 (2015) - [i33]Jung Hee Cheon, Changmin Lee:
Cryptanalysis of the multilinear map on the ideal lattices. IACR Cryptology ePrint Archive 2015: 461 (2015) - [i32]Jung Hee Cheon, Changmin Lee, Hansol Ryu:
Cryptanalysis of the New CLT Multilinear Maps. IACR Cryptology ePrint Archive 2015: 934 (2015) - 2014
- [j19]Minkyu Kim, Jung Hee Cheon, In-Sok Lee:
Analysis on a generalized algorithm for the strong discrete logarithm problem with auxiliary inputs. Math. Comput. 83(288): 1993-2004 (2014) - [c35]Jung Hee Cheon, Hyung Tae Lee, Jae Hong Seo:
A New Additive Homomorphic Encryption based on the co-ACD Problem. ACM Conference on Computer and Communications Security 2014: 287-298 - [i31]Chung Hun Baek, Jung Hee Cheon, Hyunsook Hong:
Analytic Toolbox for White-Box Implementations: Limitation and Perspectives. IACR Cryptology ePrint Archive 2014: 688 (2014) - [i30]Jung Hee Cheon, Miran Kim, Myungsun Kim:
Search-and-compute on Encrypted Data. IACR Cryptology ePrint Archive 2014: 812 (2014) - [i29]Jung Hee Cheon, Kyoohyung Han, Changmin Lee, Hansol Ryu, Damien Stehlé:
Cryptanalysis of the Multilinear Map over the Integers. IACR Cryptology ePrint Archive 2014: 906 (2014) - 2013
- [j18]Taechan Kim, Sungwook Kim, Jung Hee Cheon:
On the Final Exponentiation in Tate Pairing Computations. IEEE Trans. Information Theory 59(6): 4033-4041 (2013) - [c34]Jung Hee Cheon, Jean-Sébastien Coron, Jinsu Kim, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi, Aaram Yun:
Batch Fully Homomorphic Encryption over the Integers. EUROCRYPT 2013: 315-335 - [c33]Jung Hee Cheon, Hyunsook Hong, Hyung Tae Lee:
Invertible Polynomial Representation for Private Set Operations. ICISC 2013: 277-292 - [c32]Jung Hee Cheon, Taechan Kim, Yong Soo Song:
A Group Action on ℤp˟ and the Generalized DLP with Auxiliary Inputs. Selected Areas in Cryptography 2013: 121-135 - [i28]Jinsu Kim, Moon Sung Lee, Aaram Yun, Jung Hee Cheon:
CRT-based Fully Homomorphic Encryption over the Integers. IACR Cryptology ePrint Archive 2013: 57 (2013) - [i27]Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Over-threshold Aggregation Protocols over Distributed Databases. IACR Cryptology ePrint Archive 2013: 545 (2013) - [i26]Jung Hee Cheon, Jinsu Kim:
An Approach to Reduce Storage for Homomorphic Computations. IACR Cryptology ePrint Archive 2013: 710 (2013) - 2012
- [j17]Jung Hee Cheon, Stanislaw Jarecki, Jae Hong Seo:
Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity. IEICE Transactions 95-A(8): 1366-1378 (2012) - [j16]Jung Hee Cheon, Jeongdae Hong, Gene Tsudik:
Reducing RFID reader load with the meet-in-the-middle strategy. Journal of Communications and Networks 14(1): 10-14 (2012) - [j15]Jung Hee Cheon, Jin Hong, Minkyu Kim:
Accelerating Pollard's Rho Algorithm on Finite Fields. J. Cryptology 25(2): 195-242 (2012) - [c31]Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Over-Threshold Aggregation Protocols. ICISC 2012: 472-486 - [c30]Jae Hong Seo, Jung Hee Cheon, Jonathan Katz:
Constant-Round Multi-party Private Set Union Using Reversed Laurent Series. Public Key Cryptography 2012: 398-412 - [c29]Jae Hong Seo, Jung Hee Cheon:
Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures. TCC 2012: 133-150 - [i25]Taechan Kim, Sungwook Kim, Jung Hee Cheon:
Accelerating the Final Exponentiation in the Computation of the Tate Pairings. IACR Cryptology ePrint Archive 2012: 119 (2012) - [i24]Jae Hong Seo, Jung Hee Cheon:
Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures. IACR Cryptology ePrint Archive 2012: 198 (2012) - [i23]Myungsun Kim, Jihye Kim, Jung Hee Cheon:
Compress Multiple Ciphertexts Using ElGamal Encryption Schemes. IACR Cryptology ePrint Archive 2012: 243 (2012) - [i22]Myungsun Kim, Jinsu Kim, Jung Hee Cheon:
A Public Shuffle without Private Permutations. IACR Cryptology ePrint Archive 2012: 301 (2012) - [i21]Hyung Tae Lee, Hyunsook Hong, Jung Hee Cheon:
Invertible Polynomial Representation for Private Set Operations. IACR Cryptology ePrint Archive 2012: 526 (2012) - [i20]Myungsun Kim, Abedelaziz Mohaisen, Jung Hee Cheon, Yongdae Kim:
Private Top-k Aggregation Protocols. IACR Cryptology ePrint Archive 2012: 538 (2012) - [i19]Taechan Kim, Jung Hee Cheon:
A New Approach to Discrete Logarithm Problem with Auxiliary Inputs. IACR Cryptology ePrint Archive 2012: 609 (2012) - [i18]Sungwook Kim, Jung Hee Cheon:
Fixed Argument Pairing Inversion on Elliptic Curves. IACR Cryptology ePrint Archive 2012: 657 (2012) - 2011
- [j14]Sungwook Kim, Jihye Kim, Jung Hee Cheon, Seong-ho Ju:
Threshold signature schemes for ElGamal variants. Computer Standards & Interfaces 33(4): 432-437 (2011) - [j13]Jung Hee Cheon, Stanislaw Jarecki, Taekyoung Kwon, Mun-Kyu Lee:
Fast Exponentiation Using Split Exponents. IEEE Trans. Information Theory 57(3): 1816-1826 (2011) - [c28]Hyung Tae Lee, HongTae Kim, Yoo-Jin Baek, Jung Hee Cheon:
Correcting Errors in Private Keys Obtained from Cold Boot Attacks. ICISC 2011: 74-87 - [c27]Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon:
Mutual Private Set Intersection with Linear Complexity. WISA 2011: 219-231 - [i17]Jae Hong Seo, Jung Hee Cheon:
Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. IACR Cryptology ePrint Archive 2011: 21 (2011) - [i16]Jeongdae Hong, Jung Woo Kim, Jihye Kim, Kunsoo Park, Jung Hee Cheon:
Constant-Round Privacy Preserving Multiset Union. IACR Cryptology ePrint Archive 2011: 138 (2011) - [i15]Hyung Tae Lee, Jung Hee Cheon, Jin Hong:
Analysis of Discrete Logarithm Algorithm using Pre-computation. IACR Cryptology ePrint Archive 2011: 187 (2011) - [i14]Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon:
Mutual Private Set Intersection with Linear Complexity. IACR Cryptology ePrint Archive 2011: 267 (2011) - 2010
- [j12]Woo-Hwan Kim, HyoJin Yoon, Jung Hee Cheon:
Metered signatures: How to restrict the signing capability. Journal of Communications and Networks 12(3): 201-208 (2010) - [j11]Jung Hee Cheon:
Discrete Logarithm Problems with Auxiliary Inputs. J. Cryptology 23(3): 457-476 (2010) - [j10]Aaram Yun, Jung Hee Cheon, Yongdae Kim:
On Homomorphic Signatures for Network Coding. IEEE Trans. Computers 59(9): 1295-1296 (2010) - [j9]Sungwook Kim, Jung Hee Cheon:
Parameterized splitting systems for the discrete logarithm. IEEE Trans. Information Theory 56(5): 2528-2535 (2010) - [i13]Jung Hee Cheon, Stanislaw Jarecki, Jae Hong Seo:
Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity. IACR Cryptology ePrint Archive 2010: 512 (2010)
2000 – 2009
- 2009
- [c26]Minkyu Kim, Jung Hee Cheon, Jin Hong:
Subset-Restricted Random Walks for Pollard rho Method on Fpm. Public Key Cryptography 2009: 54-67 - [e1]Pil Joong Lee, Jung Hee Cheon:
Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5461, Springer 2009, ISBN 978-3-642-00729-3 [contents] - [i12]Jung Hee Cheon, Jeongdae Hong, Gene Tsudik:
Reducing RFID Reader Load with the Meet-in-the-Middle Strategy. IACR Cryptology ePrint Archive 2009: 92 (2009) - 2008
- [j8]Jung Hee Cheon, HongTae Kim:
Analysis of Low Hamming Weight Products. Discrete Applied Mathematics 156(12): 2264-2269 (2008) - [j7]Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov:
Provably Secure Timed-Release Public Key Encryption. ACM Trans. Inf. Syst. Secur. 11(2): 4:1-4:44 (2008) - [j6]Jung Hee Cheon, Nam-Su Jho, Myung-Hwan Kim, Eun Sun Yoo:
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption. IEEE Trans. Information Theory 54(11): 5155-5171 (2008) - [c25]Jung Hee Cheon, Jin Hong, Minkyu Kim:
Speeding Up the Pollard Rho Method on Prime Fields. ASIACRYPT 2008: 471-488 - [c24]Ali Bagherzandi, Jung Hee Cheon, Stanislaw Jarecki:
Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma. ACM Conference on Computer and Communications Security 2008: 449-458 - [c23]Sungwook Kim, Jung Hee Cheon:
A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents. Public Key Cryptography 2008: 328-343 - 2007
- [c22]Jung Hee Cheon, Jeong Hyun Yi:
Fast Batch Verification of Multiple Signatures. Public Key Cryptography 2007: 442-457 - 2006
- [j5]Jung Hee Cheon, Dong Hoon Lee:
Quadratic Equations from APN Power Functions. IEICE Transactions 89-A(1): 19-27 (2006) - [j4]Jung Hee Cheon, Woo-Hwan Kim, Hyun Soo Nam:
Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme. Inf. Process. Lett. 97(3): 118-123 (2006) - [j3]Jung Hee Cheon, Dong Hoon Lee:
Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations. IEEE Trans. Computers 55(12): 1536-1542 (2006) - [c21]
- [c20]Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, Ivan Osipkov:
Timed-Release and Key-Insulated Public Key Encryption. Financial Cryptography 2006: 191-205 - [c19]Taekyoung Kwon, Jung Hee Cheon, Yongdae Kim, Jaeil Lee:
Privacy Protection in PKIs: A Separation-of-Authority Approach. WISA 2006: 297-311 - [i11]Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon, Dowon Hong:
Analysis of Privacy-Preserving Element Reduction of Multiset. IACR Cryptology ePrint Archive 2006: 418 (2006) - 2005
- [c18]Nam-Su Jho, Eun Sun Yoo, Jung Hee Cheon, Myung-Hwan Kim:
New broadcast encryption scheme using tree-based circle. Digital Rights Management Workshop 2005: 37-44 - [c17]Nam-Su Jho, Jung Yeon Hwang, Jung Hee Cheon, Myung-Hwan Kim, Dong Hoon Lee, Eun Sun Yoo:
One-Way Chain Based Broadcast Encryption Schemes. EUROCRYPT 2005: 559-574 - [i10]Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim, Eun Sun Yoo:
Broadcast Encryption π. IACR Cryptology ePrint Archive 2005: 73 (2005) - [i9]Jung Hee Cheon, Nam-Su Jho, Myung-Hwan Kim, Eun Sun Yoo:
Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption. IACR Cryptology ePrint Archive 2005: 136 (2005) - [i8]Jung Hee Cheon, Dong Hoon Lee:
Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations. IACR Cryptology ePrint Archive 2005: 276 (2005) - 2004
- [j2]Junbaek Ki, Jung Hee Cheon, Jeong-Uk Kang, Dogyun Kim:
Taxonomy of online game security. The Electronic Library 22(1): 65-73 (2004) - [c16]
- [c15]Eun Sun Yoo, Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim:
Efficient Broadcast Encryption Using Multiple Interpolation Methods. ICISC 2004: 87-103 - [c14]HyoJin Yoon, Jung Hee Cheon, Yongdae Kim:
Batch Verifications with ID-Based Signatures. ICISC 2004: 233-248