Остановите войну!
for scientists:
default search action
Sungwook Kim
- > Home > Persons > Sungwook Kim
Publications
- 2023
- [j130]Sungwook Kim, Gwangwoon Lee, Hyeonbum Lee, Jae Hong Seo:
Leopard: Sublinear Verifier Inner Product Argument Under Discrete Logarithm Assumption. IEEE Trans. Inf. Forensics Secur. 18: 5332-5344 (2023) - [c25]Sungwook Kim, Sungju Kim, Yulim Shin, Sunmi Kim, Jihye Kim, Hyunok Oh:
Efficient Transparent Polynomial Commitments for zk-SNARKs. ESORICS (3) 2023: 348-366 - 2022
- [c24]Sungwook Kim, Hyeonbum Lee, Jae Hong Seo:
Efficient Zero-Knowledge Arguments in Discrete Logarithm Setting: Sublogarithmic Proof or Sublinear Verifier. ASIACRYPT (2) 2022: 403-433 - 2021
- [j111]Chung Hun Baek, Sungwook Kim, Dongkyun Nam, Jihoon Park:
Enhancing Differential Privacy for Federated Learning at Scale. IEEE Access 9: 148090-148103 (2021) - [j109]Chanyang Ju, Hyeonbum Lee, HeeWon Chung, Jae Hong Seo, Sungwook Kim:
Efficient Sum-Check Protocol for Convolution. IEEE Access 9: 164047-164059 (2021) - 2020
- [j94]Sungwook Kim, Hyejin Shin, Chung Hun Baek, Soohyung Kim, Junbum Shin:
Learning New Words from Keystroke Data with Local Differential Privacy. IEEE Trans. Knowl. Data Eng. 32(3): 479-491 (2020) - 2019
- [j80]Sungwook Kim, Jinsu Kim, Jae Hong Seo:
A new approach to practical function-private inner product encryption. Theor. Comput. Sci. 783: 22-40 (2019) - 2018
- [j70]Jinsu Kim, Sungwook Kim, Jae Hong Seo:
A new scale-invariant homomorphic encryption scheme. Inf. Sci. 422: 177-187 (2018) - [j69]Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Junbum Shin, Sungwook Kim:
Efficient Privacy-Preserving Matrix Factorization for Recommendation via Fully Homomorphic Encryption. ACM Trans. Priv. Secur. 21(4): 17:1-17:30 (2018) - [j68]Hyejin Shin, Sungwook Kim, Junbum Shin, Xiaokui Xiao:
Privacy Enhanced Matrix Factorization for Recommendation with Local Differential Privacy. IEEE Trans. Knowl. Data Eng. 30(9): 1770-1782 (2018) - 2017
- [i5]Sungwook Kim, Jinsu Kim, Jae Hong Seo:
A New Approach for Practical Function-Private Inner Product Encryption. IACR Cryptol. ePrint Arch. 2017: 4 (2017) - 2016
- [c23]Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Jun-Bum Shin:
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption: Extended Abstract. AsiaCCS 2016: 617-628 - [i4]Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Jun-Bum Shin:
Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2016: 232 (2016) - 2015
- [j45]Sungwook Kim, Jung Hee Cheon:
Fixed argument pairing inversion on elliptic curves. Des. Codes Cryptogr. 77(1): 143-152 (2015) - [c22]Yong Ho Hwang, Sungwook Kim, Jae Woo Seo:
Fast Order-Preserving Encryption from Uniform Distribution Sampling. CCSW 2015: 41-52 - [i3]Jinsu Kim, Sungwook Kim, Jae Hong Seo:
Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency. IACR Cryptol. ePrint Arch. 2015: 992 (2015) - 2013
- [j27]Taechan Kim, Sungwook Kim, Jung Hee Cheon:
On the Final Exponentiation in Tate Pairing Computations. IEEE Trans. Inf. Theory 59(6): 4033-4041 (2013) - 2012
- [i2]Taechan Kim, Sungwook Kim, Jung Hee Cheon:
Accelerating the Final Exponentiation in the Computation of the Tate Pairings. IACR Cryptol. ePrint Arch. 2012: 119 (2012) - [i1]Sungwook Kim, Jung Hee Cheon:
Fixed Argument Pairing Inversion on Elliptic Curves. IACR Cryptol. ePrint Arch. 2012: 657 (2012) - 2011
- [j16]Sungwook Kim, Jihye Kim, Jung Hee Cheon, Seong-ho Ju:
Threshold signature schemes for ElGamal variants. Comput. Stand. Interfaces 33(4): 432-437 (2011) - 2010
- [j6]Sungwook Kim, Jung Hee Cheon:
Parameterized splitting systems for the discrete logarithm. IEEE Trans. Inf. Theory 56(5): 2528-2535 (2010) - 2008
- [c12]Sungwook Kim, Jung Hee Cheon:
A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents. Public Key Cryptography 2008: 328-343
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-16 22:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint