Follow
Rakyong Choi
Rakyong Choi
Samsung Advanced Institute of Technology
Verified email at samsung.com
Title
Cited by
Cited by
Year
Deep abstraction and weighted feature selection for Wi-Fi impersonation detection
ME Aminanto, R Choi, HC Tanuwidjaja, PD Yoo, K Kim
IEEE Transactions on Information Forensics and Security 13 (3), 621-636, 2017
2352017
Privacy-preserving deep learning on machine learning as a service—a comprehensive survey
HC Tanuwidjaja, R Choi, S Baek, K Kim
Ieee Access 8, 167425-167447, 2020
812020
Efficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption
Y Lee, D Micciancio, A Kim, R Choi, M Deryabin, J Eom, D Yoo
Annual International Conference on the Theory and Applications of …, 2023
472023
A survey on deep learning techniques for privacy-preserving
HC Tanuwidjaja, R Choi, K Kim
Machine Learning for Cyber Security: Second International Conference, ML4CS …, 2019
462019
General bootstrapping approach for RLWE-based homomorphic encryption
A Kim, M Deryabin, J Eom, R Choi, Y Lee, W Ghang, D Yoo
IEEE Transactions on Computers, 2023
302023
Security analysis of end-to-end encryption in Telegram
J Lee, R Choi, S Kim, K Kim
Simposio en Criptografía Seguridad Informática, Naha, Japón. Disponible en …, 2017
202017
Lattice-based multi-signature with linear homomorphism
R Choi, K Kim
2016 Symposium on Cryptography and Information Security (SCIS 2016), 2016
132016
Constant-round dynamic group key exchange from RLWE assumption
R Choi, D Hong, K Kim
Cryptology ePrint Archive, 2020
92020
Design and implementation of constant-round dynamic group key exchange from RLWE
R Choi, D Hong, S Han, S Baek, W Kang, K Kim
IEEE Access 8, 94610-94630, 2020
82020
AtLast: Another three-party lattice-based PAKE scheme
R Choi, H An, K Kim
Proceedings of the 2018 Symposium on Cryptography and Information Security …, 2018
62018
LFHE: Fully homomorphic encryption with bootstrapping key size less than a megabyte
A Kim, Y Lee, M Deryabin, J Eom, R Choi
Cryptology ePrint Archive, 2023
52023
Performance evaluation of liboqs in open quantum safe project (part i)
H An, R Choi, J Lee, K Kim
Proc. Symposium on Cryptography and Information Security SCIS 2018, 2018
52018
Lattice-based threshold signature with message block sharing
R Choi, K Kim
Proc. of The 31st Symposium on Cryptography and Information Security, 1-7, 2014
52014
Blockchain-based decentralized key management system with quantum resistance
H An, R Choi, K Kim
Information Security Applications: 19th International Conference, WISA 2018 …, 2019
42019
Implementation of tree-based dynamic group key exchange with newhope
R Choi, D Hong, K Kim
IEICE Technical Committee on Information Security, 1-8, 2020
32020
Limitations of privacy-preserving for confidential data training by deep learning
HC Tanuwidjaja, R Choi, K Kim
2019 symposium on cryptography and information security (SCIS 2019). IEICE …, 2019
22019
양자 컴퓨터 공격에 안전한 격자 기반 키 교환 방식의 비교
최락용, 안형철, 이지은, 김성숙, 김광조
한국통신학회논문지 42 (11), 2200-2207, 2017
22017
System and method for generating scalable group key based on homomorphic encryption with trust server
K Kim, C Rakyong
US Patent 11,411,715, 2022
12022
Adding authenticity into tree-based group key agreement by public ledger
S Han, R Choi, K Kim
2019 Symposium on Cryptography and Information Security (SCIS 2019). IEICE …, 2019
12019
A novel non-interactive multi-party key exchange from homomorphic encryption
R Choi, K Kim
ProvSec Workshop 2018, 2018
12018
The system can't perform the operation now. Try again later.
Articles 1–20