Browsing by Titles
Showing results 1 to 6 of 6
- ;
- Kim, Young-Sik ;
- No, Jong-Seon
- 2025-08
- Journal of Cryptographic Engineering, v.15, no.3
- Springer Nature
- View : 5652
- Download : 13
Conference
High-Precision Bootstrapping for Approximate Homomorphic Encryption by Error Variance Minimization
- Lee, Yongwoo ;
- Lee, Joon-Woo ;
- Kim, Young-Sik ;
- ;
- No, Jong-Seon ;
- Kang, HyungChul
- 2022-06-01
- Lee, Yongwoo. (2022-06-01). High-Precision Bootstrapping for Approximate Homomorphic Encryption by Error Variance Minimization. International Conference on the Theory and Applications of Cryptographic Techniques, 551–580. doi: 10.1007/978-3-031-06944-4_19
- International Association for Cryptologic Research
- View : 340
- Download : 0
Article
Lazy Modular Reduction for NTT
- Kim, Geumtae ;
- ;
- Lee, Yongwoo ;
- Kim, Young-Sik ;
- No, Jong-Seon
- 2024-12
- Kim, Geumtae. (2024-12). Lazy Modular Reduction for NTT. Electronics, 13(24). doi: 10.3390/electronics13244887
- MDPI
- View : 274
- Download : 19
- Lee, Eunsang ;
- Lee, Joon-Woo ;
- Lee, Junghyun ;
- Kim, Young-Sik ;
- ;
- No, Jong-Seon ;
- Choi, Woosuk
- 2022-07-19
- IEEE International Conference on Machine Learning (spotlight), pp.12403 - 12422
- International Conference on Machine Learning (ICML)
- View : 307
- Download : 0
- Kim, Geumtae ;
- ;
- Lee, Yongwoo ;
- No, Jong-Seon
- 2024-10-17
- Kim, Geumtae. (2024-10-17). Masked Ciphertext Comparison without Masking Conversions using Register Rotation and Chinese Remainder Theorem. 15th International Conference on Information and Communication Technology Convergence, ICTC 2024, 1701–1706. doi: 10.1109/ICTC62082.2024.10826631
- IEEE Computer Society
- View : 276
- Download : 0
Conference
Rotation Key Reduction forClient-Server Systems ofDeep Neural Network onFully Homomorphic Encryption
- Lee, Joon-Woo ;
- Lee, Eunsang ;
- Kim, Young-Sik ;
- No, Jong-Seon
- 2023-12-06
- Lee, Joon-Woo. (2023-12-06). Rotation Key Reduction forClient-Server Systems ofDeep Neural Network onFully Homomorphic Encryption. International Conference on the Theory and Application of Cryptology and Information Security, 36–68. doi: 10.1007/978-981-99-8736-8_2
- International Association for Cryptologic Research
- View : 269
- Download : 0
1
