Takip et
Rakyong Choi
Rakyong Choi
Samsung Advanced Institute of Technology
samsung.com üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Deep abstraction and weighted feature selection for Wi-Fi impersonation detection
ME Aminanto, R Choi, HC Tanuwidjaja, PD Yoo, K Kim
IEEE Transactions on Information Forensics and Security 13 (3), 621-636, 2017
2522017
Privacy-preserving deep learning on machine learning as a service—a comprehensive survey
HC Tanuwidjaja, R Choi, S Baek, K Kim
Ieee Access 8, 167425-167447, 2020
1322020
Efficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption
Y Lee, D Micciancio, A Kim, R Choi, M Deryabin, J Eom, D Yoo
Annual International Conference on the Theory and Applications of …, 2023
892023
A survey on deep learning techniques for privacy-preserving
HC Tanuwidjaja, R Choi, K Kim
Machine learning for cyber security: second international conference, ML4CS …, 2019
592019
General bootstrapping approach for RLWE-based homomorphic encryption
A Kim, M Deryabin, J Eom, R Choi, Y Lee, W Ghang, D Yoo
IEEE Transactions on Computers 73 (1), 86-96, 2023
462023
Security analysis of end-to-end encryption in Telegram
J Lee, R Choi, S Kim, K Kim
Simposio en Criptografía Seguridad Informática, Naha, Japón. Disponible en …, 2017
212017
Lattice-based multi-signature with linear homomorphism
R Choi, K Kim
2016 Symposium on Cryptography and Information Security (SCIS 2016), 2016
132016
LFHE: fully homomorphic encryption with bootstrapping key size less than a megabyte
A Kim, Y Lee, M Deryabin, J Eom, R Choi
Cryptology ePrint Archive, 2023
112023
Constant-round dynamic group key exchange from RLWE assumption
R Choi, D Hong, K Kim
Cryptology ePrint Archive, 2020
112020
Design and implementation of constant-round dynamic group key exchange from RLWE
R Choi, D Hong, S Han, S Baek, W Kang, K Kim
IEEE Access 8, 94610-94630, 2020
102020
AtLast: Another three-party lattice-based PAKE scheme
R Choi, H An, K Kim
Proceedings of the 2018 Symposium on Cryptography and Information Security …, 2018
72018
Blockchain-based decentralized key management system with quantum resistance
H An, R Choi, K Kim
Information Security Applications: 19th International Conference, WISA 2018 …, 2019
62019
Performance evaluation of liboqs in open quantum safe project (part i)
H An, R Choi, J Lee, K Kim
Proc. Symp. Cryptography Inf. Security (SCIS), 2, 2018
62018
Lattice-based threshold signature with message block sharing
R Choi, K Kim
Proc. of The 31st Symposium on Cryptography and Information Security, 1-7, 2014
52014
Implementation of tree-based dynamic group key exchange with newhope
R Choi, D Hong, K Kim
IEICE Technical Committee on Information Security, 1-8, 2020
42020
System and method for generating scalable group key based on homomorphic encryption with trust server
K Kim, C Rakyong
US Patent 11,411,715, 2022
32022
Limitations of privacy-preserving for confidential data training by deep learning
HC Tanuwidjaja, R Choi, K Kim
2019 symposium on cryptography and information security (SCIS 2019). IEICE …, 2019
22019
Encryption key generating method, apparatus, ciphertext operation method and apparatus using the generated encryption key
EOM Jieun, M Deriabin, A Kim, Y Lee, C Rakyong, W Ghang, D Yoo
US Patent 12,184,771, 2024
12024
Adding authenticity into tree-based group key agreement by public ledger
S Han, R Choi, K Kim
2019 Symposium on Cryptography and Information Security (SCIS 2019). IEICE …, 2019
12019
A novel non-interactive multi-party key exchange from homomorphic encryption
R Choi, K Kim
ProvSec Workshop 2018, 2018
12018
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20