Calculated based on number of publications stored in Pure and citations from Scopus
20042024

Research activity per year

Search results

  • 2024

    Quantum Complexity for Discrete Logarithms and Related Problems

    Hhan, M., Yamakawa, T. & Yun, A., 2024, Advances in Cryptology – CRYPTO 2024 - 44th Annual International Cryptology Conference, Proceedings. Reyzin, L. & Stebila, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 3-36 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14925 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2023

    On Insecure Uses of BGN for Privacy Preserving Data Aggregation Protocols

    Lee, H. S., Lim, S., Yie, I. & Yun, A., 2023, In: Fundamenta Informaticae. 188, 2, p. 91-101 11 p.

    Research output: Contribution to journalArticlepeer-review

  • Oracle Indistinguishability and Its Applications

    Yun, A., 2023, In: IEEE Access. 11, p. 85640-85655 16 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • 2021

    Secure Fully Homomorphic Authenticated Encryption

    Kim, J. & Yun, A., 2021, In: IEEE Access. 9, p. 107279-107297 19 p., 9500126.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    26 Scopus citations
  • 2019

    General Linear Group Action on Tensors: A Candidate for Post-quantum Cryptography

    Ji, Z., Qiao, Y., Song, F. & Yun, A., 2019, Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. Hofheinz, D. & Rosen, A. (eds.). Springer, p. 251-281 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11891 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    23 Scopus citations
  • 2017

    Discrete subgroups of the special linear group with thin limit sets

    Yun, A., 2017, In: Transactions of the American Mathematical Society. 369, 1, p. 365-407 43 p.

    Research output: Contribution to journalArticlepeer-review

  • Quantum security of NMAC and related constructions: PRF domain extension against quantum attacks

    Song, F. & Yun, A., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Katz, J. & Shacham, H. (eds.). Springer Verlag, p. 283-309 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10402 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    22 Scopus citations
  • 2016

    Preface

    Kwon, S. & Yun, A., 2016, In: Lecture Notes in Computer Science. 9558, p. v

    Research output: Contribution to journalEditorial

  • 2015

    CRT-based fully homomorphic encryption over the integers

    Cheon, J. H., Kim, J., Lee, M. S. & Yun, A., 20 Jul 2015, In: Information Sciences. 310, p. 149-162 14 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    40 Scopus citations
  • Generic hardness of the multiple discrete logarithm problem

    Yun, A., 2015, Advances in Cryptology - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 817-836 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9057).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    13 Scopus citations
  • 2014

    Homomorphic authenticated encryption secure against chosen-ciphertext attack

    Joo, C. & Yun, A., 2014, Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part II. Sarkar, P. & Iwata, T. (eds.). Springer Verlag, p. 173-192 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8874).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • 2013

    Batch fully homomorphic encryption over the integers

    Cheon, J. H., Coron, J. S., Kim, J., Lee, M. S., Lepoint, T., Tibouchi, M. & Yun, A., 2013, Advances in Cryptology, EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 315-335 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7881 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    247 Scopus citations
  • 2012

    A simple variant of the merkle-damgård scheme with a permutation

    Hirose, S., Park, J. H. & Yun, A., Apr 2012, In: Journal of Cryptology. 25, 2, p. 271-309 39 p.

    Research output: Contribution to journalReview articlepeer-review

    Open Access
    7 Scopus citations
  • 2011

    On Lai-Massey and quasi-Feistel ciphers

    Yun, A., Park, J. H. & Lee, J., Jan 2011, In: Designs, Codes, and Cryptography. 58, 1, p. 45-72 28 p.

    Research output: Contribution to journalArticlepeer-review

    19 Scopus citations
  • 2010

    Measuring the mixing time of social graphs

    Mohaisen, A., Yun, A. & Kim, Y., 2010, IMC'10 - Proceedings of the 2010 ACM Internet Measurement Conference. Association for Computing Machinery, p. 383-389 7 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    131 Scopus citations
  • On homomorphic signatures for network coding

    Yun, A., Cheon, J. H. & Kim, Y., 2010, In: IEEE Transactions on Computers. 59, 9, p. 1295-1296 2 p., 5441287.

    Research output: Contribution to journalArticlepeer-review

    38 Scopus citations
  • 2009

    Anonymous signatures revisited

    Saraswat, V. & Yun, A., 2009, Provable Security - Third International Conference, ProvSec 2009, Proceedings. p. 140-153 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5848 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • On protecting integrity and confidentiality of cryptographic file system for outsourced storage

    Yun, A., Shi, C. & Kim, Y., 2009, Proceedings of the 2009 ACM Workshop on Cloud Computing Security, CCSW '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09. p. 67-75 9 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    56 Scopus citations
  • 2007

    A simple variant of the Merkle-Damgård Scheme with a permutation

    Hirose, S., Park, J. H. & Yun, A., 2007, Advances in Cryptology - ASIACRYPT 2007 - 13th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag, p. 113-129 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4833 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    56 Scopus citations
  • 2006

    Collision search attack for 53-step HAS-160

    Cho, H. S., Park, S., Sung, S. H. & Yun, A., 2006, Information Security and Cryptology - ICISC 2006: 9th International Conference, Proceedings. Springer Verlag, p. 286-295 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4296 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    13 Scopus citations
  • Cryptanalysis of the full HAVAL with 4 and 5 passes

    Yu, H., Wang, X., Yun, A. & Park, S., 2006, Fast Software Encryption - 13th International Workshop, FSE 2006, Revised Selected Papers. Springer Verlag, p. 89-110 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4047 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    21 Scopus citations
  • Finding collision on 45-Step HAS-160

    Yun, A., Sung, S. H., Park, S., Chang, D., Hong, S. & Cho, H. S., 2006, Information Security and Cryptology, ICISC 2005 - 8th International Conference, Revised Selected Papers. Springer Verlag, p. 146-155 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3935 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • 2004

    Cryptanalysis of a divisor class group based public-key cryptosystem

    Yun, A., Kim, J. & Lee, D. H., 2004, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Buell, D. (ed.). Springer Verlag, p. 442-450 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3076).

    Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Your message has successfully been sent.
Your message was not sent due to an error.