Order-preserving symmetric encryption A Boldyreva, N Chenette, Y Lee, A O’neill Advances in Cryptology-EUROCRYPT 2009, 224-241, 2009 | 1333 | 2009 |
Over 100x faster bootstrapping in fully homomorphic encryption through memory-centric optimization with GPUs W Jung, S Kim, JH Ahn, JH Cheon, Y Lee IACR Transactions on Cryptographic Hardware and Embedded Systems, 114-148, 2021 | 187 | 2021 |
Trust evaluation model for wireless sensor networks J Hur, Y Lee, H Yoon, D Choi, S Jin Advanced Communication Technology, 2005, ICACT 2005. The 7th International …, 2005 | 104 | 2005 |
A new data hiding scheme for binary image authentication with small image distortion Y Lee, H Kim, Y Park Information Sciences 179 (22), 3866-3884, 2009 | 65 | 2009 |
Real-time analysis of intrusion detection alerts via correlation S Lee, B Chung, H Kim, Y Lee, C Park, H Yoon Computers & Security 25 (3), 169-183, 2006 | 62 | 2006 |
Trust management for resilient wireless sensor networks J Hur, Y Lee, SM Hong, H Yoon Information Security and Cryptology-ICISC 2005, 56-68, 2005 | 42 | 2005 |
RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices J Lee, D Kim, H Lee, Y Lee, JH Cheon IEEE Access 7, 2080-2091, 2019 | 35 | 2019 |
Efficient machine learning over encrypted data with non-interactive communication H Park, P Kim, H Kim, KW Park, Y Lee Computer Standards & Interfaces 58, 87-108, 2018 | 34 | 2018 |
Efficient Sorting of Homomorphic Encrypted Data With k-Way Sorting Network S Hong, S Kim, J Choi, Y Lee, JH Cheon IEEE Transactions on Information Forensics and Security 16, 4389-4404, 2021 | 31 | 2021 |
Improved multi-precision squaring for low-end RISC microcontrollers Y Lee, IH Kim, Y Park Journal of Systems and Software 86 (1), 60-71, 2013 | 31 | 2013 |
Parallelized Scalar Multiplication on Elliptic Curves Defined over Optimal Extension Field. J Lee, H Kim, Y Lee, SM Hong, H Yoon IJ Network Security 4 (1), 99-106, 2007 | 30 | 2007 |
Privacy-Preserving Deep Sequential Model with Matrix Homomorphic Encryption J Jang, Y Lee, A Kim, B Na, D Yhee, B Lee, JH Cheon, S Yoon Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 27 | 2022 |
On-demand secure routing protocol for ad hoc network using id based cryptosystem YH Lee, H Kim, B Chung, J Lee, H Yoon Parallel and Distributed Computing, Applications and Technologies, 2003 …, 2003 | 27 | 2003 |
Secure Ordered Bucketization Y Lee IEEE Transactions on Dependable and Secure Computing 11 (3), 292-303, 2014 | 22 | 2014 |
A robust and flexible digital rights management system for home networks H Kim, Y Lee, Y Park Journal of Systems and Software 83 (12), 2431-2440, 2010 | 22 | 2010 |
Digital rights management with right delegation for home networks H Kim, Y Lee, B Chung, H Yoon, J Lee, KI Jung Information Security and Cryptology–ICISC 2006, 233-245, 2006 | 22 | 2006 |
Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung Pay D Choi, Y Lee 10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016 | 21 | 2016 |
A new binary image authentication scheme with small distortion and low false negative rates LEE Younho, HUR Junbeom, KIM Heeyoul, P Yongsu IEICE transactions on communications 90 (11), 3259-3262, 2007 | 19 | 2007 |
An Efficient Encrypted Floating-Point Representation Using HEAAN and TFHE S Moon, Y Lee Security and Communication Networks 2020, 2020 | 18 | 2020 |
Eavesdropping of Magnetic Secure Transmission Signals and Its Security Implications for a Mobile Payment Protocol D Choi, Y Lee IEEE Access 6, 42687-42701, 2018 | 18 | 2018 |