Остановите войну!
for scientists:
default search action
Jihye Kim
Publications
- 2023
- [j35]Gweonho Jeong, Nuri Lee, Jihye Kim, Hyunok Oh:
Azeroth: Auditable Zero-Knowledge Transactions in Smart Contracts. IEEE Access 11: 56463-56480 (2023) - [j34]Hayoung Lee, Jihye Kim, Jongho Park, Sungho Kang:
STRAIT: Self-Test and Self-Recovery for AI Accelerator. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(9): 3092-3104 (2023) - [c49]Sanghoon Lee, Gwanghoon Jang, Chanhwi Kim, Se-Jeong Park, Kiwoong Yoo, Jihye Kim, Sunkyu Kim, Jaewoo Kang:
Enhancing Clinical Outcome Predictions through Auxiliary Loss and Sentence-Level Self-Attention. BIBM 2023: 1210-1217 - [c48]Sungwook Kim, Sungju Kim, Yulim Shin, Sunmi Kim, Jihye Kim, Hyunok Oh:
Efficient Transparent Polynomial Commitments for zk-SNARKs. ESORICS (3) 2023: 348-366 - 2022
- [c43]Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh:
Succinct Zero-Knowledge Batch Proofs for Set Accumulators. CCS 2022: 455-469 - [c42]Seong-Hwan Hyun, Jihye Kim, Keunwoo Kim, Wanjei Cho, Seong-Cheol Kim:
Joint Estimation of Vehicle's Position and Velocity With Distributed RSUs for OFDM Radar System. GLOBECOM 2022: 741-746 - [c41]Sohee Lim, Jaehoon Jung, Jihye Kim, Seong-Cheol Kim, Jeongsik Choi:
Enhanced Velocity Estimation Based on Joint Doppler Frequency and Range Rate Measurements. ICUFN 2022: 217-221 - [c40]Jihye Kim, Hayoung Lee, Jongho Park, Sungho Kang:
ZOS: Zero Overhead Scan for Systolic Array-based AI accelerator. ISOCC 2022: 360-361 - [c39]Jaehoon Jung, Sohee Lim, Jihye Kim, Jeong-Hoon Park, Seong-Cheol Kim:
Correction of I/Q Imbalance in FMCW Radar System Using Geometric Sequence Decomposition. VTC Spring 2022: 1-5 - [i17]Gweonho Jeong, Nuri Lee, Jihye Kim, Hyunok Oh:
Azeroth: Auditable Zero-knowledge Transactions in Smart Contracts. IACR Cryptol. ePrint Arch. 2022: 211 (2022) - 2021
- [j32]Jeonghyuk Lee, Jihye Kim, Hyunok Oh:
Forward-Secure Multi-User Aggregate Signatures Based on zk-SNARKs. IEEE Access 9: 97705-97717 (2021) - [j31]Jihye Kim, Ok-Ran Jeong:
Mirroring Vector Space Embedding for New Words. IEEE Access 9: 99954-99967 (2021) - [j30]Seokjun Jang, Jihye Kim, Sungho Kang:
Reconfigurable Scan Architecture for High Diagnostic Resolution. IEEE Access 9: 120537-120550 (2021) - [j28]Ki Chul Chun, Yong-Ki Kim, Yesin Ryu, Jaewon Park, Chi Sung Oh, Young-Yong Byun, So-Young Kim, Dong-Hak Shin, Jun Gyu Lee, Byung-Kyu Ho, Min-Sang Park, Seong-Jin Cho, Seunghan Woo, Byoung-Mo Moon, Beomyong Kil, Sungoh Ahn, Jae Hoon Lee, Sooyoung Kim, Seouk-Kyu Choi, Jae-Seung Jeong, Sung-Gi Ahn, Jihye Kim, Jun Jin Kong, Kyomin Sohn, Nam Sung Kim, Jung-Bae Lee:
A 16-GB 640-GB/s HBM2E DRAM With a Data-Bus Window Extension Technique and a Synergetic On-Die ECC Scheme. IEEE J. Solid State Circuits 56(1): 199-211 (2021) - [j27]Sangjun Lee, Kyunghwan Cho, Jihye Kim, Jongho Park, Inhwan Lee, Sungho Kang:
Low-Power Scan Correlation-Aware Scan Cluster Reordering for Wireless Sensor Networks. Sensors 21(18): 6111 (2021) - [c38]Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh:
Efficient Verifiable Image Redacting based on zk-SNARKs. AsiaCCS 2021: 213-226 - [i16]Jeonghyuk Lee, Jihye Kim, Hyunok Oh:
Forward-secure Multi-user Aggregate Signatures based on zk-SNARKs. IACR Cryptol. ePrint Arch. 2021: 567 (2021) - [i15]Jeonghyuk Lee, Jaekyung Choi, Hyunok Oh, Jihye Kim:
Privacy-preserving Identity Management System. IACR Cryptol. ePrint Arch. 2021: 1459 (2021) - [i14]Matteo Campanelli, Dario Fiore, Semin Han, Jihye Kim, Dimitris Kolonelos, Hyunok Oh:
Succinct Zero-Knowledge Batch Proofs for Set Accumulators. IACR Cryptol. ePrint Arch. 2021: 1672 (2021) - 2020
- [j26]Jihye Kim, Jiwon Lee, Hyunok Oh:
Simulation-Extractable zk-SNARK With a Single Verification. IEEE Access 8: 156569-156581 (2020) - [j25]Jihye Kim, Hayoung Lee, Seokjun Jang, Sungho Kang:
Fine-Grained Defect Diagnosis for CMOL FPGA Circuits. IEEE Access 8: 163140-163151 (2020) - [j24]Junghee Lee, Chrysostomos Nicopoulos, Gweonho Jeong, Jihye Kim, Hyunok Oh:
Practical Verifiable Computation by Using a Hardware-Based Correct Execution Environment. IEEE Access 8: 216689-216706 (2020) - [j22]Jiwon Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh:
Combinatorial Subset Difference - IoT-Friendly Subset Representation and Broadcast Encryption. Sensors 20(11): 3140 (2020) - [c35]Jihye Kim, Hayoung Lee, Seokjun Jang, Hogyeong Kim, Sungho Kang:
Memory-like Defect Diagnosis for CMOL FPGAs. ISOCC 2020: 139-140 - [i13]Seunghwa Lee, Hankyung Ko, Jihye Kim, Hyunok Oh:
vCNN: Verifiable Convolutional Neural Network. IACR Cryptol. ePrint Arch. 2020: 584 (2020) - [i12]Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh:
Efficient Verifiable Image Redacting based on zk-SNARKs. IACR Cryptol. ePrint Arch. 2020: 1579 (2020) - 2019
- [j21]Minjae Yoo, Jimin Shin, Hyunmin Kim, Jihye Kim, Jaewoo Kang, Aik Choon Tan:
Exploring the molecular mechanisms of Traditional Chinese Medicine components using gene expression signatures and connectivity map. Comput. Methods Programs Biomed. 174: 33-40 (2019) - [j20]Jihye Kim, Hyunok Oh:
FAS: Forward secure sequential aggregate signatures for secure logging. Inf. Sci. 471: 115-131 (2019) - [j19]Jihye Kim, Jiwon Lee, Hankyung Ko, Donghwan Oh, Semin Han, Gwonho Jeong, Hyunok Oh:
AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems. ACM Trans. Embed. Comput. Syst. 18(5s): 62:1-62:17 (2019) - [j18]Jihye Kim, Sangjun Lee, Sungho Kang:
Test-Friendly Data-Selectable Self-Gating (DSSG). IEEE Trans. Very Large Scale Integr. Syst. 27(8): 1972-1976 (2019) - [c34]Jihye Kim, Sangjun Lee, Minho Moon, Sungho Kang:
Transition-delay Test Methodology for Designs with Self-gating. ISOCC 2019: 93-94 - [c33]Kyunghwan Cho, Jihye Kim, Hyunggoy Oh, Sangjun Lee, Sungho Kang:
A New Scan Chain Reordering Method for Low Power Consumption based on Care Bit Density. ISOCC 2019: 134-135 - [c32]Thomas Haywood Dadzie, Jiwon Lee, Jihye Kim, Hyunok Oh:
SA-SPM: an efficient compiler for security aware scratchpad memory (invited paper). LCTES 2019: 57-69 - [c31]Jihye Kim, Hankyung Ko, Hyunok Oh:
AILocker: authenticated image locker for video. SAC 2019: 1508-1511 - [c30]Hankyung Ko, Gweonho Jeong, Jongho Kim, Jihye Kim, Hyunok Oh:
Forward Secure Identity-Based Signature Scheme with RSA. SEC 2019: 314-327 - [i11]Jihye Kim, Jiwon Lee, Hyunok Oh:
QAP-based Simulation-Extractable SNARK with a Single Verification. IACR Cryptol. ePrint Arch. 2019: 586 (2019) - [i10]Jeonghyuk Lee, Jungyeon Hwang, Jaekyung Choi, Hyunok Oh, Jihye Kim:
SIMS : Self Sovereign Identity Management System with Preserving Privacy in Blockchain. IACR Cryptol. ePrint Arch. 2019: 1241 (2019) - [i9]Jiwon Lee, Jaekyoung Choi, Jihye Kim, Hyunok Oh:
SAVER: Snark-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization. IACR Cryptol. ePrint Arch. 2019: 1270 (2019) - [i8]Jiwon Lee, Jihye Kim, Hyunok Oh:
BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipments. IACR Cryptol. ePrint Arch. 2019: 1311 (2019) - [i7]Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh:
Scalable Wildcarded Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2019: 1342 (2019) - 2018
- [j15]Hyunok Oh, Jihye Kim, Ji Sun Shin:
Forward-secure ID based digital signature scheme with forward-secure private key generator. Inf. Sci. 454-455: 96-109 (2018) - [c29]Thomas Haywood Dadzie, Jihye Kim, Hyunok Oh:
Secure non-volatile memory with scratch pad memory using dual encryption mode: work-in-progress. CODES+ISSS 2018: 6 - [c28]Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh:
Scalable Wildcarded Identity-Based Encryption. ESORICS (2) 2018: 269-287 - [c26]Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh:
Combinatorial subset difference public key broadcast encryption scheme for secure multicast. SAC 2018: 1593-1600 - [i6]Jihye Kim, Jiwon Lee, Hankyung Ko, Donghwan Oh, Semin Han, Kwonho Jeong, Hyunok Oh:
AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems. IACR Cryptol. ePrint Arch. 2018: 1202 (2018) - 2017
- [c25]Jihye Kim, Seunghwa Lee, Jungjun Yoon, Hankyung Ko, Seungri Kim, Hyunok Oh:
PASS: Privacy aware secure signature scheme for surveillance systems. AVSS 2017: 1-6 - [c23]Jihye Kim, Hyunok Oh:
Forward-Secure Digital Signature Schemes with Optimal Computation and Storage of Signers. SEC 2017: 523-537 - [i5]Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh:
Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast. IACR Cryptol. ePrint Arch. 2017: 408 (2017) - 2016
- [j12]Jennifer Hintzsche, Jihye Kim, Vinod Kumar Yadav, Carol Amato, Steven E. Robinson, Eric Seelenfreund, Yiqun Shellman, Joshua Wisell, Allison Applegate, Martin McCarter, Neil Box, John Tentler, Subhajyoti De, William A. Robinson, Aik Choon Tan:
IMPACT: a whole-exome sequencing analysis pipeline for integrating molecular profiles with actionable therapeutics in clinical samples. J. Am. Medical Informatics Assoc. 23(4): 721-730 (2016) - 2015
- [j11]Minjae Yoo, Jimin Shin, Jihye Kim, Karen A. Ryall, Kyubum Lee, Sunwon Lee, Minji Jeon, Jaewoo Kang, Aik Choon Tan:
DSigDB: drug signatures database for gene set analysis. Bioinform. 31(18): 3069-3071 (2015) - [j10]Karen A. Ryall, Jimin Shin, Minjae Yoo, Trista K. Hinz, Jihye Kim, Jaewoo Kang, Lynn E. Heasley, Aik Choon Tan:
Identifying kinase dependency in cancer cells by integrating high-throughput drug screening and kinase inhibition data. Bioinform. 31(23): 3799-3806 (2015) - [c22]Insu Hwang, Jihye Kim, Youngwoo Kim, Jonghyun Cho, Joungho Kim:
Noise coupling modeling and analysis of through glass via(TGV). 3DIC 2015: TS8.34.1-TS8.34.5 - [c21]Jihye Kim, Wonwoo Yang, Seunghwa Lee, Wonjoon Hwang:
Mediated aggregate signature schemes in wireless sensor networks. SECON Workshops 2015: 7-12 - 2014
- [j9]Jihye Kim, Vihas T. Vasu, Rangnath Mishra, Katherine R. Singleton, Minjae Yoo, Sonia M. Leach, Eveline Farias-Hesson, Robert J. Mason, Jaewoo Kang, Preveen Ramamoorthy, Jeffrey A. Kern, Lynn E. Heasley, James H. Finigan, Aik Choon Tan:
Bioinformatics-driven discovery of rational combination for overcoming EGFR-mutant lung cancer resistance to EGFR therapy. Bioinform. 30(17): 2393-2398 (2014) - [j8]Hyunok Oh, Jihye Kim:
An Efficient Non-Linear Cost Compression Algorithm for Multi Level Cell Memory. IEEE Trans. Computers 63(4): 820-832 (2014) - 2012
- [c18]Myungsun Kim, Jihye Kim:
Privacy-preserving web search. ICUFN 2012: 480-481 - [i4]Myungsun Kim, Jihye Kim, Jung Hee Cheon:
Compress Multiple Ciphertexts Using ElGamal Encryption Schemes. IACR Cryptol. ePrint Arch. 2012: 243 (2012) - 2011
- [j7]Sungwook Kim, Jihye Kim, Jung Hee Cheon, Seong-ho Ju:
Threshold signature schemes for ElGamal variants. Comput. Stand. Interfaces 33(4): 432-437 (2011) - [j6]Jihye Kim, YouAn Kwon, Kichun Nam:
The Syllable Frequency Effect in Semantic Categorization Tasks in Korean. KSII Trans. Internet Inf. Syst. 5(10): 1879-1890 (2011) - [j5]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Flexible Robust Group Key Agreement. IEEE Trans. Parallel Distributed Syst. 22(5): 879-886 (2011) - [i3]Jeongdae Hong, Jung Woo Kim, Jihye Kim, Kunsoo Park, Jung Hee Cheon:
Constant-Round Privacy Preserving Multiset Union. IACR Cryptol. ePrint Arch. 2011: 138 (2011) - 2010
- [j4]Emiliano De Cristofaro, Jihye Kim:
Some Like It Private: Sharing Confidential Information Based on Oblivious Authorization. IEEE Secur. Priv. 8(4): 18-24 (2010) - [j3]Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park:
Fair threshold decryption with semi-trusted third parties. Int. J. Appl. Cryptogr. 2(2): 139-153 (2010) - [c17]Emiliano De Cristofaro, Jihye Kim, Gene Tsudik:
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. ASIACRYPT 2010: 213-231 - [i2]Emiliano De Cristofaro, Jihye Kim, Gene Tsudik:
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. IACR Cryptol. ePrint Arch. 2010: 469 (2010) - 2009
- [j2]Jihye Kim, Gene Tsudik:
SRDP: Secure route discovery for dynamic source routing in MANETs. Ad Hoc Networks 7(6): 1097-1109 (2009) - [c16]Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park:
Fair Threshold Decryption with Semi-Trusted Third Parties. ACISP 2009: 309-326 - [c13]Emiliano De Cristofaro, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Privacy-Preserving Policy-Based Information Transfer. Privacy Enhancing Technologies 2009: 164-184 - 2008
- [c11]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. CT-RSA 2008: 352-369 - [c10]Jihye Kim, Gene Tsudik:
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. ICISC 2008: 66-83 - [i1]Jihye Kim, Gene Tsudik:
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. IACR Cryptol. ePrint Arch. 2008: 282 (2008) - 2007
- [c7]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Robust group key agreement using short broadcasts. CCS 2007: 411-420 - [c6]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. CT-RSA 2007: 287-308 - 2006
- [j1]Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Secure acknowledgment aggregation and multisignatures with limited robustness. Comput. Networks 50(10): 1639-1652 (2006) - [c5]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Authentication for Paranoids: Multi-party Secret Handshakes. ACNS 2006: 325-339 - 2005
- [c4]Jihye Kim, Gene Tsudik:
SRDP: Securing Route Discovery in DSR. MobiQuitous 2005: 247-260 - 2004
- [c3]Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. SCN 2004: 193-207 - 2002
- [c2]Sangmin Bae, DongSup Song, Jihye Kim, Sungho Kang:
An Efficient On-Line Monitoring BIST for Remote Service System. AISA 2002: 205-214 - [c1]Hyunmin Kim, Jihye Kim, Chang Wook Ahn, Rudrapatna S. Ramakrishna:
Efficient Dynamic Load Balancing for Association Rule Mining. PDPTA 2002: 886-894
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint