Deep abstraction and weighted feature selection for Wi-Fi impersonation detection ME Aminanto, R Choi, HC Tanuwidjaja, PD Yoo, K Kim IEEE Transactions on Information Forensics and Security 13 (3), 621-636, 2017 | 252 | 2017 |
Privacy-preserving deep learning on machine learning as a service—a comprehensive survey HC Tanuwidjaja, R Choi, S Baek, K Kim Ieee Access 8, 167425-167447, 2020 | 132 | 2020 |
Efficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption Y Lee, D Micciancio, A Kim, R Choi, M Deryabin, J Eom, D Yoo Annual International Conference on the Theory and Applications of …, 2023 | 89 | 2023 |
A survey on deep learning techniques for privacy-preserving HC Tanuwidjaja, R Choi, K Kim Machine learning for cyber security: second international conference, ML4CS …, 2019 | 59 | 2019 |
General bootstrapping approach for RLWE-based homomorphic encryption A Kim, M Deryabin, J Eom, R Choi, Y Lee, W Ghang, D Yoo IEEE Transactions on Computers 73 (1), 86-96, 2023 | 46 | 2023 |
Security analysis of end-to-end encryption in Telegram J Lee, R Choi, S Kim, K Kim Simposio en Criptografía Seguridad Informática, Naha, Japón. Disponible en …, 2017 | 21 | 2017 |
Lattice-based multi-signature with linear homomorphism R Choi, K Kim 2016 Symposium on Cryptography and Information Security (SCIS 2016), 2016 | 13 | 2016 |
LFHE: fully homomorphic encryption with bootstrapping key size less than a megabyte A Kim, Y Lee, M Deryabin, J Eom, R Choi Cryptology ePrint Archive, 2023 | 11 | 2023 |
Constant-round dynamic group key exchange from RLWE assumption R Choi, D Hong, K Kim Cryptology ePrint Archive, 2020 | 11 | 2020 |
Design and implementation of constant-round dynamic group key exchange from RLWE R Choi, D Hong, S Han, S Baek, W Kang, K Kim IEEE Access 8, 94610-94630, 2020 | 10 | 2020 |
AtLast: Another three-party lattice-based PAKE scheme R Choi, H An, K Kim Proceedings of the 2018 Symposium on Cryptography and Information Security …, 2018 | 7 | 2018 |
Blockchain-based decentralized key management system with quantum resistance H An, R Choi, K Kim Information Security Applications: 19th International Conference, WISA 2018 …, 2019 | 6 | 2019 |
Performance evaluation of liboqs in open quantum safe project (part i) H An, R Choi, J Lee, K Kim Proc. Symp. Cryptography Inf. Security (SCIS), 2, 2018 | 6 | 2018 |
Lattice-based threshold signature with message block sharing R Choi, K Kim Proc. of The 31st Symposium on Cryptography and Information Security, 1-7, 2014 | 5 | 2014 |
Implementation of tree-based dynamic group key exchange with newhope R Choi, D Hong, K Kim IEICE Technical Committee on Information Security, 1-8, 2020 | 4 | 2020 |
System and method for generating scalable group key based on homomorphic encryption with trust server K Kim, C Rakyong US Patent 11,411,715, 2022 | 3 | 2022 |
Limitations of privacy-preserving for confidential data training by deep learning HC Tanuwidjaja, R Choi, K Kim 2019 symposium on cryptography and information security (SCIS 2019). IEICE …, 2019 | 2 | 2019 |
Encryption key generating method, apparatus, ciphertext operation method and apparatus using the generated encryption key EOM Jieun, M Deriabin, A Kim, Y Lee, C Rakyong, W Ghang, D Yoo US Patent 12,184,771, 2024 | 1 | 2024 |
Adding authenticity into tree-based group key agreement by public ledger S Han, R Choi, K Kim 2019 Symposium on Cryptography and Information Security (SCIS 2019). IEICE …, 2019 | 1 | 2019 |
A novel non-interactive multi-party key exchange from homomorphic encryption R Choi, K Kim ProvSec Workshop 2018, 2018 | 1 | 2018 |