default search action
Yongsoo Song
Person information
- affiliation: University of California, San Diego, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Hyesun Kwak, Dongwon Lee, Yongsoo Song, Sameer Wagh:
A General Framework of Homomorphic Encryption for Multiple Parties with Non-interactive Key-Aggregation. ACNS (2) 2024: 403-430 - [c20]Intak Hwang, Jinyeong Seo, Yongsoo Song:
Concretely Efficient Lattice-Based Polynomial Commitment from Standard Assumptions. CRYPTO (10) 2024: 414-448 - [c19]Hyesun Kwak, Seonhong Min, Yongsoo Song:
Towards Practical Multi-key TFHE: Parallelizable, Key-Compatible, Quasi-linear Complexity. Public Key Cryptography (4) 2024: 354-385 - [i33]Yeongjun Jang, Joowon Lee, Seonhong Min, Hyesun Kwak, Junsoo Kim, Yongsoo Song:
Ring-LWE based encrypted controller with unlimited number of recursive multiplications and effect of error growth. CoRR abs/2406.14372 (2024) - [i32]Jaehyung Kim, Jinyeong Seo, Yongsoo Song:
Simpler and Faster BFV Bootstrapping for Arbitrary Plaintext Modulus from CKKS. IACR Cryptol. ePrint Arch. 2024: 109 (2024) - [i31]Dongwon Lee, Seonhong Min, Yongsoo Song:
Functional Bootstrapping for FV-style Cryptosystems. IACR Cryptol. ePrint Arch. 2024: 181 (2024) - [i30]Intak Hwang, Jinyeong Seo, Yongsoo Song:
Concretely Efficient Lattice-based Polynomial Commitment from Standard Assumptions. IACR Cryptol. ePrint Arch. 2024: 306 (2024) - [i29]Jean-Philippe Bossuat, Rosario Cammarota, Jung Hee Cheon, Ilaria Chillotti, Benjamin R. Curtis, Wei Dai, Huijing Gong, Erin Hales, Duhyeong Kim, Bryan Kumara, Changmin Lee, Xianhui Lu, Carsten Maple, Alberto Pedrouzo-Ulloa, Rachel Player, Luis Antonio Ruiz Lopez, Yongsoo Song, Donggeon Yhee, Bahattin Yildiz:
Security Guidelines for Implementing Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2024: 463 (2024) - [i28]HyunHo Cha, Intak Hwang, Seonhong Min, Jinyeong Seo, Yongsoo Song:
TopGear 2.0: Accelerated Authenticated Matrix Triple Generation with Scalable Prime Fields via Optimized HE Packing. IACR Cryptol. ePrint Arch. 2024: 1502 (2024) - 2023
- [c18]Changmin Lee, Seonhong Min, Jinyeong Seo, Yongsoo Song:
Faster TFHE Bootstrapping with Block Binary Keys. AsiaCCS 2023: 2-13 - [c17]Taechan Kim, Hyesun Kwak, Dongwon Lee, Jinyeong Seo, Yongsoo Song:
Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition. CCS 2023: 726-740 - [c16]Miran Kim, Dongwon Lee, Jinyeong Seo, Yongsoo Song:
Accelerating HE Operations from Key Decomposition Technique. CRYPTO (4) 2023: 70-92 - [c15]Duhyeong Kim, Dongwon Lee, Jinyeong Seo, Yongsoo Song:
Toward Practical Lattice-Based Proof of Knowledge from Hint-MLWE. CRYPTO (5) 2023: 549-580 - [c14]Intak Hwang, Jinyeong Seo, Yongsoo Song:
Optimizing HE operations via Level-aware Key-switching Framework. WAHC@CCS 2023: 59-67 - [i27]Miran Kim, Dongwon Lee, Jinyeong Seo, Yongsoo Song:
Accelerating HE Operations from Key Decomposition Technique. IACR Cryptol. ePrint Arch. 2023: 413 (2023) - [i26]Duhyeong Kim, Dongwon Lee, Jinyeong Seo, Yongsoo Song:
Toward Practical Lattice-based Proof of Knowledge from Hint-MLWE. IACR Cryptol. ePrint Arch. 2023: 623 (2023) - [i25]Changmin Lee, Seonhong Min, Jinyeong Seo, Yongsoo Song:
Faster TFHE Bootstrapping with Block Binary Keys. IACR Cryptol. ePrint Arch. 2023: 958 (2023) - [i24]Intak Hwang, Jinyeong Seo, Yongsoo Song:
Optimizing HE operations via Level-aware Key-switching Framework. IACR Cryptol. ePrint Arch. 2023: 1328 (2023) - [i23]Intak Hwang, Jinyeong Seo, Yongsoo Song:
Efficient Lattice-based Sublinear Arguments for R1CS without Aborts. IACR Cryptol. ePrint Arch. 2023: 1606 (2023) - 2022
- [j6]Junsoo Kim, Dongwoo Kim, Yongsoo Song, Hyungbo Shim, Henrik Sandberg, Karl Henrik Johansson:
Comparison of encrypted control approaches and tutorial on dynamic systems using Learning With Errors-based homomorphic encryption. Annu. Rev. Control. 54: 200-218 (2022) - [j5]Asma Aloufi, Peizhao Hu, Yongsoo Song, Kristin E. Lauter:
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey. ACM Comput. Surv. 54(9): 195:1-195:37 (2022) - [i22]Junsoo Kim, Dongwoo Kim, Yongsoo Song, Hyungbo Shim, Henrik Sandberg, Karl Henrik Johansson:
Comparison of encrypted control approaches and tutorial on dynamic systems using LWE-based homomorphic encryption. CoRR abs/2210.05560 (2022) - [i21]Taechan Kim, Hyesun Kwak, Dongwon Lee, Jinyeong Seo, Yongsoo Song:
Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition. IACR Cryptol. ePrint Arch. 2022: 347 (2022) - [i20]Hyesun Kwak, Seonhong Min, Yongsoo Song:
Towards Practical Multi-key TFHE: Parallelizable, Key-Compatible, Quasi-linear Complexity. IACR Cryptol. ePrint Arch. 2022: 1460 (2022) - 2021
- [j4]Jung Hee Cheon, Kristin E. Lauter, Yongsoo Song:
Editor's Preface for the Second Annual MathCrypt Proceedings Volume. J. Math. Cryptol. 15(1): 1-3 (2021) - [c13]Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Joohee Lee, Junbum Shin, Yongsoo Song:
Lattice-Based Secure Biometric Authentication for Hamming Distance. ACISP 2021: 653-672 - [c12]Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts. ACNS (1) 2021: 460-479 - [i19]Hyesun Kwak, Dongwon Lee, Yongsoo Song, Sameer Wagh:
A Unified Framework of Homomorphic Encryption for Multiple Parties with Non-Interactive Setup. IACR Cryptol. ePrint Arch. 2021: 1412 (2021) - 2020
- [c11]Hao Chen, Miran Kim, Ilya P. Razenshteyn, Dragos Rotaru, Yongsoo Song, Sameer Wagh:
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning. ASIACRYPT (3) 2020: 31-59 - [i18]Asma Aloufi, Peizhao Hu, Yongsoo Song, Kristin E. Lauter:
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey. CoRR abs/2007.09270 (2020) - [i17]Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts. IACR Cryptol. ePrint Arch. 2020: 15 (2020) - [i16]Hao Chen, Miran Kim, Ilya P. Razenshteyn, Dragos Rotaru, Yongsoo Song, Sameer Wagh:
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning. IACR Cryptol. ePrint Arch. 2020: 451 (2020) - [i15]Hao Chen, Lynn Chua, Kristin E. Lauter, Yongsoo Song:
On the Concrete Security of LWE with Small Secret. IACR Cryptol. ePrint Arch. 2020: 539 (2020)
2010 – 2019
- 2019
- [j3]Yichen Jiang, Jenny Hamer, Chenghong Wang, Xiaoqian Jiang, Miran Kim, Yongsoo Song, Yuhou Xia, Noman Mohammed, Md. Nazmus Sadat, Shuang Wang:
SecureLR: Secure Logistic Regression Model via a Hybrid Cryptographic Protocol. IEEE ACM Trans. Comput. Biol. Bioinform. 16(1): 113-123 (2019) - [c10]Hao Chen, Ilaria Chillotti, Yongsoo Song:
Multi-Key Homomorphic Encryption from TFHE. ASIACRYPT (2) 2019: 446-472 - [c9]Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference. CCS 2019: 395-412 - [c8]Hao Chen, Ilaria Chillotti, Yongsoo Song:
Improved Bootstrapping for Approximate Homomorphic Encryption. EUROCRYPT (2) 2019: 34-54 - [i14]Hao Chen, Ilaria Chillotti, Yongsoo Song:
Multi-Key Homomophic Encryption from TFHE. IACR Cryptol. ePrint Arch. 2019: 116 (2019) - [i13]Miran Kim, Yongsoo Song, Baiyu Li, Daniele Micciancio:
Semi-parallel Logistic Regression for GWAS on Encrypted Data. IACR Cryptol. ePrint Arch. 2019: 294 (2019) - [i12]Hao Chen, Wei Dai, Miran Kim, Yongsoo Song:
Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference. IACR Cryptol. ePrint Arch. 2019: 524 (2019) - 2018
- [j2]Jung Hee Cheon, Kyoohyung Han, Seong-Min Hong, Hyoun Jin Kim, Junsoo Kim, Suseong Kim, Hosung Seo, Hyungbo Shim, Yongsoo Song:
Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption. IEEE Access 6: 24325-24339 (2018) - [j1]Jung Hee Cheon, Duhyeong Kim, Yongdai Kim, Yongsoo Song:
Ensemble Method for Privacy-Preserving Logistic Regression Based on Homomorphic Encryption. IEEE Access 6: 46938-46948 (2018) - [c7]Xiaoqian Jiang, Miran Kim, Kristin E. Lauter, Yongsoo Song:
Secure Outsourced Matrix Computation and Application to Neural Networks. CCS 2018: 1209-1222 - [c6]Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song:
Bootstrapping for Approximate Homomorphic Encryption. EUROCRYPT (1) 2018: 360-384 - [c5]Duhyeong Kim, Yongsoo Song:
Approximate Homomorphic Encryption over the Conjugate-Invariant Ring. ICISC 2018: 85-102 - [c4]Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song:
A Full RNS Variant of Approximate Homomorphic Encryption. SAC 2018: 347-368 - [c3]Jung Hee Cheon, Duhyeong Kim, Joohee Lee, Yongsoo Song:
Lizard: Cut Off the Tail! A Practical Post-quantum Public-Key Encryption from LWE and LWR. SCN 2018: 160-177 - [i11]Miran Kim, Yongsoo Song, Shuang Wang, Yuhou Xia, Xiaoqian Jiang:
Secure Logistic Regression based on Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2018: 74 (2018) - [i10]Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song:
Bootstrapping for Approximate Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2018: 153 (2018) - [i9]Andrey Kim, Yongsoo Song, Miran Kim, Keewoo Lee, Jung Hee Cheon:
Logistic Regression Model Training based on the Approximate Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2018: 254 (2018) - [i8]Jung Hee Cheon, Kyoohyung Han, Andrey Kim, Miran Kim, Yongsoo Song:
A Full RNS Variant of Approximate Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2018: 931 (2018) - [i7]Duhyeong Kim, Yongsoo Song:
Approximate Homomorphic Encryption over the Conjugate-invariant Ring. IACR Cryptol. ePrint Arch. 2018: 952 (2018) - [i6]Xiaoqian Jiang, Miran Kim, Kristin E. Lauter, Yongsoo Song:
Secure Outsourced Matrix Computation and Application to Neural Networks. IACR Cryptol. ePrint Arch. 2018: 1041 (2018) - [i5]Hao Chen, Ilaria Chillotti, Yongsoo Song:
Improved Bootstrapping for Approximate Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2018: 1043 (2018) - [i4]Joohee Lee, Dongwoo Kim, Duhyeong Kim, Yongsoo Song, Junbum Shin, Jung Hee Cheon:
Instant Privacy-Preserving Biometric Authentication for Hamming Distance. IACR Cryptol. ePrint Arch. 2018: 1214 (2018) - 2017
- [c2]Jung Hee Cheon, Andrey Kim, Miran Kim, Yong Soo Song:
Homomorphic Encryption for Arithmetic of Approximate Numbers. ASIACRYPT (1) 2017: 409-437 - [i3]Jung Hee Cheon, Miran Kim, Yong Soo Song:
Secure Searching of Biomarkers Using Hybrid Homomorphic Encryption Scheme. IACR Cryptol. ePrint Arch. 2017: 294 (2017) - 2016
- [i2]Jung Hee Cheon, Andrey Kim, Miran Kim, Yong Soo Song:
Floating-Point Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2016: 421 (2016) - [i1]Jung Hee Cheon, Duhyeong Kim, Joohee Lee, Yong Soo Song:
Lizard: Cut off the Tail! // Practical Post-Quantum Public-Key Encryption from LWE and LWR. IACR Cryptol. ePrint Arch. 2016: 1126 (2016) - 2013
- [c1]Jung Hee Cheon, Taechan Kim, Yong Soo Song:
A Group Action on ℤp˟ and the Generalized DLP with Auxiliary Inputs. Selected Areas in Cryptography 2013: 121-135
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint