Filter
Conference contribution

Search results

  • 2024

    Practical Randomized Lattice Gadget Decomposition with Application to FHE

    Jeon, S., Lee, H. S. & Park, J., 2024, Computer Security – ESORICS 2023 - 28th European Symposium on Research in Computer Security, 2023, Proceedings. Tsudik, G., Conti, M., Liang, K. & Smaragdakis, G. (eds.). Springer Science and Business Media Deutschland GmbH, p. 353-371 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14344 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2023

    On Singular Del Pezzo Hypersurfaces of Index 3

    Kim, I. K., Viswanathan, N. & Won, J., 2023, Birational Geometry, Kähler–Einstein Metrics and Degenerations. Cheltsov, I., Chen, X., Katzarkov, L. & Park, J. (eds.). Springer, p. 409-422 14 p. (Springer Proceedings in Mathematics and Statistics; vol. 409).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    EvalRound Algorithm in CKKS Bootstrapping

    Kim, S., Park, M., Kim, J., Kim, T. & Min, C., 2022, Advances in Cryptology – ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Agrawal, S. & Lin, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 161-187 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13792 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2021

    Accelerating Fully Homomorphic Encryption through Microarchitecture-Aware Analysis and Optimization

    Jung, W., Lee, E., Kim, S., Kim, N., Lee, K., Min, C., Cheon, J. H. & Ahn, J. H., Mar 2021, Proceedings - 2021 IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS 2021. Institute of Electrical and Electronics Engineers Inc., p. 237-239 3 p. 9408190. (Proceedings - 2021 IEEE International Symposium on Performance Analysis of Systems and Software, ISPASS 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2019

    On the non-repudiation of isogeny based signature scheme

    Eom, S., Lee, H. S. & Lim, S., 2019, Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Revised Selected Papers. Yeun, C. Y. & Blazy, O. (eds.). Springer Verlag, p. 63-77 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11469 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • On the Security of Multikey Homomorphic Encryption

    Lee, H. S. & Park, J., 2019, Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings. Albrecht, M. (ed.). Springer, p. 236-251 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11929 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • 2018

    A lattice attack on homomorphic NTRU with non-invertible public keys

    Ahn, S., Lee, H. S., Lim, S. & Yie, I., 2018, Information and Communications Security - 19th International Conference, ICICS 2017, Proceedings. Qing, S., Liu, D., Mitchell, C. & Chen, L. (eds.). Springer Verlag, p. 248-254 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10631 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Towards round-optimal secure multiparty computations: Multikey FHE without a CRS

    Kim, E., Lee, H. S. & Park, J., 2018, Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings. Susilo, W. & Yang, G. (eds.). Springer Verlag, p. 101-113 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10946 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    22 Scopus citations
  • 2017

    On pairing inversion of the self-bilinear map on unknown order groups

    Lee, H. S., Lim, S. & Yie, I., 2017, Cyber Security Cryptography and Machine Learning - 1st International Conference, CSCML 2017, Proceedings. Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 86-95 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10332 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2014

    Information Security and Cryptology - ICISC 2013: 16th International Conference Seoul, Korea, November 27-29, 2013 Revised Selected Papers

    Lee, H. S. & Han, D. G., 2014, Information Security and Cryptology - ICISC 2013 - 16th International Conference, Revised Selected Papers. Lee, H.-S. & Han, D.-G. (eds.). Springer Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8565).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2011

    Edge-directed image upsampling method based on directional kernel interpolation

    Yoon, J. & Lee, Y. J., 2011, Proc. of the IADIS Int. Conf, Computer Graphics, Visualization, Computer Vision and Image Processing 2011, Part of the IADIS Multi Conf. on Computer Science and Information Systems 2011, MCCSIS 2011. p. 340-342 3 p. (Proc. of the IADIS Int. Conf. Computer Graphics, Visualization, Computer Vision and Image Processing 2011, Part of the IADIS Multi Conf. on Computer Science and Information Systems 2011, MCCSIS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2010

    Semidefinite programming relaxations for sensor network localization

    Kim, S. & Kojima, M., 2010, 2010 IEEE International Symposium on Computer-Aided Control System Design, CACSD 2010. p. 19-23 5 p. 5612817. (Proceedings of the IEEE International Symposium on Computer-Aided Control System Design).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • 2009

    Construction of cubic self-dual codes

    Han, S., Kim, J. L., Lee, H. & Lee, Y., 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 2396-2399 4 p. 5206006. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Generating Pairing-friendly curves with the cm equation of degree 1

    Lee, H. S. & Park, C. M., 2009, Pairing-Based Cryptography - Pairing 2009 - Third International Conference, Proceedings. p. 66-77 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5671 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • Image deformation using radial basis function interpolation

    Kwon, J. H., Lee, B. G., Yoon, J. & Lee, J. J., 2009, 17th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, WSCG'2009 - In Co-operation with EUROGRAPHICS, Full Papers Proceedings. p. 9-12 4 p. (17th International Conference in Central Europe on Computer Graphics, Visualization and Computer Vision, WSCG'2009 - In Co-operation with EUROGRAPHICS, Full Papers Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Position error inspection for mounting wafer in cleaning device using the radial shape board

    Lee, J. W., Lee, B. G., Lee, J. J. & Yoon, J., 2009, Proceedings - 2009 2nd International Conference in Visualisation, VIZ 2009. p. 247-252 6 p. 5230757. (Proceedings - 2009 2nd International Conference in Visualisation, VIZ 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Self-dual codes using the building-up construction

    Kim, J. L. & Lee, Y., 2009, 2009 IEEE International Symposium on Information Theory, ISIT 2009. p. 2400-2402 3 p. 5206010. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Some new advances in level set methods with applications to multiphase flows

    Gibou, F., Min, C., Ng, Y. T. & Chen, H., 2009, 47th AIAA Aerospace Sciences Meeting including the New Horizons Forum and Aerospace Exposition. 2009-0371. (47th AIAA Aerospace Sciences Meeting including the New Horizons Forum and Aerospace Exposition).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2007

    A second order accurate finite difference scheme for the heat equation on irregular domains and adaptive grids

    Chen, H., Min, C. & Gibou, F., 2007, Amorphous and Polycrystalline Thin-Film Silicon Science and Technology - 2006. p. 123-128 6 p. (Materials Research Society Symposium Proceedings; vol. 910).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Eta pairing computation on general divisors over hyperelliptic curves y2 = x7 - X ± 1

    Lee, E., Lee, H. S. & Lee, Y., 2007, Pairing-Based Cryptography - Pairing 2007 - First International Conference, Proceedings. p. 349-366 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4575 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2006

    A new class of non-stationary interpolatory subdivision schemes based on exponential polynomials

    Choi, Y. J., Lee, Y. J., Yoon, J., Lee, B. G. & Kim, Y. J., 2006, Geometric Modeling and Processing, GMP 2006 - 4th International Conference, Proceedings. Springer Verlag, p. 563-570 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4077 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations