Hyang-Sook Lee

Professor

Calculated based on number of publications stored in Pure and citations from Scopus
1995 …2022

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2019

    On the non-repudiation of isogeny based signature scheme

    Eom, S., Lee, H. S. & Lim, S., 2019, Information Security Theory and Practice - 12th IFIP WG 11.2 International Conference, WISTP 2018, Revised Selected Papers. Yeun, C. Y. & Blazy, O. (eds.). Springer Verlag, p. 63-77 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11469 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • On the Security of Multikey Homomorphic Encryption

    Lee, H. S. & Park, J., 2019, Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings. Albrecht, M. (ed.). Springer, p. 236-251 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11929 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2018

    A lattice attack on homomorphic NTRU with non-invertible public keys

    Ahn, S., Lee, H. S., Lim, S. & Yie, I., 2018, Information and Communications Security - 19th International Conference, ICICS 2017, Proceedings. Qing, S., Liu, D., Mitchell, C. & Chen, L. (eds.). Springer Verlag, p. 248-254 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10631 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Towards round-optimal secure multiparty computations: Multikey FHE without a CRS

    Kim, E., Lee, H. S. & Park, J., 2018, Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings. Susilo, W. & Yang, G. (eds.). Springer Verlag, p. 101-113 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10946 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations
  • 2017

    On pairing inversion of the self-bilinear map on unknown order groups

    Lee, H. S., Lim, S. & Yie, I., 2017, Cyber Security Cryptography and Machine Learning - 1st International Conference, CSCML 2017, Proceedings. Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 86-95 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10332 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2014

    Information Security and Cryptology - ICISC 2013: 16th International Conference Seoul, Korea, November 27-29, 2013 Revised Selected Papers

    Lee, H. S. & Han, D. G., 2014, Information Security and Cryptology - ICISC 2013 - 16th International Conference, Revised Selected Papers. Lee, H-S. & Han, D-G. (eds.). Springer Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8565).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2009

    Generating Pairing-friendly curves with the cm equation of degree 1

    Lee, H. S. & Park, C. M., 2009, Pairing-Based Cryptography - Pairing 2009 - Third International Conference, Proceedings. p. 66-77 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5671 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    8 Scopus citations
  • 2007

    Eta pairing computation on general divisors over hyperelliptic curves y2 = x7 - X ± 1

    Lee, E., Lee, H. S. & Lee, Y., 2007, Pairing-Based Cryptography - Pairing 2007 - First International Conference, Proceedings. p. 349-366 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4575 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
Your message has successfully been sent.
Your message was not sent due to an error.