متابعة
Rakyong Choi
Rakyong Choi
Samsung Advanced Institute of Technology
بريد إلكتروني تم التحقق منه على samsung.com
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
Deep abstraction and weighted feature selection for Wi-Fi impersonation detection
ME Aminanto, R Choi, HC Tanuwidjaja, PD Yoo, K Kim
IEEE Transactions on Information Forensics and Security 13 (3), 621-636, 2017
2532017
Privacy-preserving deep learning on machine learning as a service—a comprehensive survey
HC Tanuwidjaja, R Choi, S Baek, K Kim
IEEE Access 8, 167425-167447, 2020
1292020
Efficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption
Y Lee, D Micciancio, A Kim, R Choi, M Deryabin, J Eom, D Yoo
Annual International Conference on the Theory and Applications of …, 2023
842023
A survey on deep learning techniques for privacy-preserving
HC Tanuwidjaja, R Choi, K Kim
Machine Learning for Cyber Security: Second International Conference, ML4CS …, 2019
592019
General bootstrapping approach for RLWE-based homomorphic encryption
A Kim, M Deryabin, J Eom, R Choi, Y Lee, W Ghang, D Yoo
IEEE Transactions on Computers, 2023
432023
Security analysis of end-to-end encryption in Telegram
J Lee, R Choi, S Kim, K Kim
Simposio en Criptografía Seguridad Informática, Naha, Japón. Disponible en …, 2017
222017
Lattice-based multi-signature with linear homomorphism
R Choi, K Kim
2016 Symposium on Cryptography and Information Security (SCIS 2016), 2016
122016
Constant-round dynamic group key exchange from RLWE assumption
R Choi, D Hong, K Kim
Cryptology ePrint Archive, 2020
112020
LFHE: fully homomorphic encryption with bootstrapping key size less than a megabyte
A Kim, Y Lee, M Deryabin, J Eom, R Choi
Cryptology ePrint Archive, 2023
102023
Design and implementation of constant-round dynamic group key exchange from RLWE
R Choi, D Hong, S Han, S Baek, W Kang, K Kim
IEEE Access 8, 94610-94630, 2020
92020
AtLast: Another three-party lattice-based PAKE scheme
R Choi, H An, K Kim
Proceedings of the 2018 Symposium on Cryptography and Information Security …, 2018
72018
Blockchain-based decentralized key management system with quantum resistance
H An, R Choi, K Kim
Information Security Applications: 19th International Conference, WISA 2018 …, 2019
52019
Performance evaluation of liboqs in open quantum safe project (part i)
H An, R Choi, J Lee, K Kim
Proc. Symposium on Cryptography and Information Security SCIS 2018, 2018
52018
Lattice-based threshold signature with message block sharing
R Choi, K Kim
Proc. of The 31st Symposium on Cryptography and Information Security, 1-7, 2014
52014
Implementation of tree-based dynamic group key exchange with newhope
R Choi, D Hong, K Kim
IEICE Technical Committee on Information Security, 1-8, 2020
42020
System and method for generating scalable group key based on homomorphic encryption with trust server
K Kim, C Rakyong
US Patent 11,411,715, 2022
32022
Limitations of privacy-preserving for confidential data training by deep learning
HC Tanuwidjaja, R Choi, K Kim
2019 symposium on cryptography and information security (SCIS 2019). IEICE …, 2019
22019
양자 컴퓨터 공격에 안전한 격자 기반키 교환 방식의 비교
최락용, 안형철, 이지은, 김성숙, 김광조
한국통신학회논문지 42 (11), 2200-2207, 2017
22017
Encryption key generating method, apparatus, ciphertext operation method and apparatus using the generated encryption key
EOM Jieun, M Deriabin, A Kim, Y Lee, C Rakyong, W Ghang, D Yoo
US Patent 12,184,771, 2024
12024
Adding authenticity into tree-based group key agreement by public ledger
S Han, R Choi, K Kim
2019 Symposium on Cryptography and Information Security (SCIS 2019). IEICE …, 2019
12019
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20