BibTeX records: Sam Kim

download as .bib file

@phdthesis{DBLP:phd/us/Kim21d,
  author       = {Sam Kim},
  title        = {Pseudorandom functions with new properties from hard lattice problems},
  school       = {Stanford University, {USA}},
  year         = {2021},
  url          = {https://searchworks.stanford.edu/view/13826060},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Kim21d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KimW21,
  author       = {Sam Kim and
                  David J. Wu},
  title        = {Watermarking Cryptographic Functionalities from Standard Lattice Assumptions},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {3},
  pages        = {28},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09391-2},
  doi          = {10.1007/S00145-021-09391-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KimW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GoyalKWW21,
  author       = {Rishab Goyal and
                  Sam Kim and
                  Brent Waters and
                  David J. Wu},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13092},
  pages        = {250--280},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92078-4\_9},
  doi          = {10.1007/978-3-030-92078-4\_9},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GoyalKWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-12032,
  author       = {Jason I. Hong and
                  Yuvraj Agarwal and
                  Matt Fredrikson and
                  Mike Czapik and
                  Shawn Hanna and
                  Swarup Sahoo and
                  Judy Chun and
                  Won{-}Woo Chung and
                  Aniruddh Iyer and
                  Ally Liu and
                  Shen Lu and
                  Rituparna Roychoudhury and
                  Qian Wang and
                  Shan Wang and
                  Siqi Wang and
                  Vida Zhang and
                  Jessica Zhao and
                  Yuan Jiang and
                  Haojian Jin and
                  Sam Kim and
                  Evelyn Kuo and
                  Tianshi Li and
                  Jinping Liu and
                  Yile Liu and
                  Robert Zhang},
  title        = {The Design of the User Interfaces for Privacy Enhancements for Android},
  journal      = {CoRR},
  volume       = {abs/2104.12032},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.12032},
  eprinttype    = {arXiv},
  eprint       = {2104.12032},
  timestamp    = {Mon, 03 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-12032.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KimW20,
  author       = {Sam Kim and
                  David J. Wu},
  title        = {Multi-theorem Preprocessing NIZKs from Lattices},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {3},
  pages        = {619--702},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-019-09324-0},
  doi          = {10.1007/S00145-019-09324-0},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KimW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KimW20,
  author       = {Sam Kim and
                  David J. Wu},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Collusion Resistant Trace-and-Revoke for Arbitrary Identities from
                  Standard Assumptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  pages        = {66--97},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64834-3\_3},
  doi          = {10.1007/978-3-030-64834-3\_3},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KimW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BonehEKS20,
  author       = {Dan Boneh and
                  Saba Eskandarian and
                  Sam Kim and
                  Maurice Shih},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Improving Speed and Security in Updatable Encryption Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12493},
  pages        = {559--589},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64840-4\_19},
  doi          = {10.1007/978-3-030-64840-4\_19},
  timestamp    = {Thu, 10 Dec 2020 10:11:44 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BonehEKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Kim20,
  author       = {Sam Kim},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Key-Homomorphic Pseudorandom Functions from {LWE} with Small Modulus},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12106},
  pages        = {576--607},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45724-2\_20},
  doi          = {10.1007/978-3-030-45724-2\_20},
  timestamp    = {Mon, 04 May 2020 14:32:28 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Kim20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehEKS20,
  author       = {Dan Boneh and
                  Saba Eskandarian and
                  Sam Kim and
                  Maurice Shih},
  title        = {Improving Speed and Security in Updatable Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehEKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kim20,
  author       = {Sam Kim},
  title        = {Key-Homomorphic Pseudorandom Functions from {LWE} with a Small Modulus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kim20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKWW20,
  author       = {Rishab Goyal and
                  Sam Kim and
                  Brent Waters and
                  David J. Wu},
  title        = {Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/316},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KimW19,
  author       = {Sam Kim and
                  David J. Wu},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Watermarking PRFs from Lattices: Stronger Security via Extractable
                  PRFs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {335--366},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_11},
  doi          = {10.1007/978-3-030-26954-8\_11},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KimW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalKMWW19,
  author       = {Rishab Goyal and
                  Sam Kim and
                  Nathan Manohar and
                  Brent Waters and
                  David J. Wu},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Watermarking Public-Key Cryptographic Primitives},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {367--398},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_12},
  doi          = {10.1007/978-3-030-26954-8\_12},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalKMWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kim19,
  author       = {Sam Kim},
  title        = {Multi-Authority Attribute-Based Encryption from {LWE} in the {OT}
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kim19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKMWW19,
  author       = {Rishab Goyal and
                  Sam Kim and
                  Nathan Manohar and
                  Brent Waters and
                  David J. Wu},
  title        = {Watermarking Public-Key Cryptographic Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {628},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/628},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKMWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimW19,
  author       = {Sam Kim and
                  David J. Wu},
  title        = {Collusion Resistant Trace-and-Revoke for Arbitrary Identities from
                  Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {984},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/984},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BonehGGJKRS18,
  author       = {Dan Boneh and
                  Rosario Gennaro and
                  Steven Goldfeder and
                  Aayush Jain and
                  Sam Kim and
                  Peter M. R. Rasmussen and
                  Amit Sahai},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Threshold Cryptosystems from Threshold Fully Homomorphic Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {565--596},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_19},
  doi          = {10.1007/978-3-319-96884-1\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BonehGGJKRS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KimW18,
  author       = {Sam Kim and
                  David J. Wu},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Multi-Theorem Preprocessing NIZKs from Lattices},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {733--765},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_25},
  doi          = {10.1007/978-3-319-96881-0\_25},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KimW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KimLMM0W18,
  author       = {Sam Kim and
                  Kevin Lewi and
                  Avradip Mandal and
                  Hart Montgomery and
                  Arnab Roy and
                  David J. Wu},
  editor       = {Dario Catalano and
                  Roberto De Prisco},
  title        = {Function-Hiding Inner Product Encryption Is Practical},
  booktitle    = {Security and Cryptography for Networks - 11th International Conference,
                  {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11035},
  pages        = {544--562},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98113-0\_29},
  doi          = {10.1007/978-3-319-98113-0\_29},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/KimLMM0W18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimW18,
  author       = {Sam Kim and
                  David J. Wu},
  title        = {Multi-Theorem Preprocessing NIZKs from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {272},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/272},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimW18a,
  author       = {Sam Kim and
                  David J. Wu},
  title        = {Watermarking PRFs from Lattices: Stronger Security via Extractable
                  PRFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {986},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/986},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimW18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BonehKN17,
  author       = {Dan Boneh and
                  Sam Kim and
                  Valeria Nikolaenko},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {Lattice-Based {DAPS} and Generalizations: Self-enforcement in Signature
                  Schemes},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {457--477},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_23},
  doi          = {10.1007/978-3-319-61204-1\_23},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BonehKN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KimW17,
  author       = {Sam Kim and
                  David J. Wu},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Access Control Encryption for General Policies from Standard Assumptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10624},
  pages        = {471--501},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70694-8\_17},
  doi          = {10.1007/978-3-319-70694-8\_17},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KimW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KimW17,
  author       = {Sam Kim and
                  David J. Wu},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Watermarking Cryptographic Functionalities from Standard Lattice Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10401},
  pages        = {503--536},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63688-7\_17},
  doi          = {10.1007/978-3-319-63688-7\_17},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KimW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BonehKM17,
  author       = {Dan Boneh and
                  Sam Kim and
                  Hart William Montgomery},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Private Puncturable PRFs from Standard Lattice Assumptions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10210},
  pages        = {415--445},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56620-7\_15},
  doi          = {10.1007/978-3-319-56620-7\_15},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BonehKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BonehKW17,
  author       = {Dan Boneh and
                  Sam Kim and
                  David J. Wu},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Constrained Keys for Invertible Pseudorandom Functions},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {237--263},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_9},
  doi          = {10.1007/978-3-319-70500-2\_9},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BonehKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehKM17,
  author       = {Dan Boneh and
                  Sam Kim and
                  Hart William Montgomery},
  title        = {Private Puncturable PRFs From Standard Lattice Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/100},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehKM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehGGK17,
  author       = {Dan Boneh and
                  Rosario Gennaro and
                  Steven Goldfeder and
                  Sam Kim},
  title        = {A Lattice-Based Universal Thresholdizer for Cryptographic Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehGGK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimW17,
  author       = {Sam Kim and
                  David J. Wu},
  title        = {Watermarking Cryptographic Functionalities from Standard Lattice Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {380},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/380},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimW17a,
  author       = {Sam Kim and
                  David J. Wu},
  title        = {Access Control Encryption for General Policies from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/467},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimW17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehKW17,
  author       = {Dan Boneh and
                  Sam Kim and
                  David J. Wu},
  title        = {Constrained Keys for Invertible Pseudorandom Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/477},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehKW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonehGGJKRS17,
  author       = {Dan Boneh and
                  Rosario Gennaro and
                  Steven Goldfeder and
                  Aayush Jain and
                  Sam Kim and
                  Peter M. R. Rasmussen and
                  Amit Sahai},
  title        = {Threshold Cryptosystems From Threshold Fully Homomorphic Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {956},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/956},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonehGGJKRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimLMMRW16,
  author       = {Sam Kim and
                  Kevin Lewi and
                  Avradip Mandal and
                  Hart William Montgomery and
                  Arnab Roy and
                  David J. Wu},
  title        = {Function-Hiding Inner Product Encryption is Practical},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {440},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/440},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimLMMRW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/ShinK05,
  author       = {Sung W. Shin and
                  Sam Kim},
  title        = {A new algorithm for detecting low-complexity regions in protein sequences},
  journal      = {Bioinform.},
  volume       = {21},
  number       = {2},
  pages        = {160--170},
  year         = {2005},
  url          = {https://doi.org/10.1093/bioinformatics/bth497},
  doi          = {10.1093/BIOINFORMATICS/BTH497},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/ShinK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccv/SkolnickKO88,
  author       = {Michael M. Skolnick and
                  Sam Kim and
                  Robert M. O'Bara},
  title        = {Morphological Algorithms For Computing Non-planar Point Neighborhoods
                  On Cellular Automata},
  booktitle    = {Second International Conference on Computer Vision, {ICCV} 1988. Tampa,
                  Florida, USA, 5-8 December, 1988, Proceedings},
  pages        = {106--111},
  publisher    = {{IEEE}},
  year         = {1988},
  url          = {https://doi.org/10.1109/CCV.1988.589978},
  doi          = {10.1109/CCV.1988.589978},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iccv/SkolnickKO88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics