Volgen
Taechan Kim
Taechan Kim
NTT Secure Platform Laboratories
Geverifieerd e-mailadres voor snu.ac.kr
Titel
Geciteerd door
Geciteerd door
Jaar
Extended tower number field sieve: A new complexity for the medium prime case
T Kim, R Barbulescu
Annual international cryptology conference, 543-571, 2016
2792016
Extended tower number field sieve: A new complexity for the medium prime case
T Kim, R Barbulescu
Annual international cryptology conference, 543-571, 2016
2792016
Extended tower number field sieve with application to finite fields of arbitrary composite extension degree
T Kim, J Jeong
IACR International Workshop on Public Key Cryptography, 388-408, 2017
78*2017
Lattice reductions over Euclidean rings with applications to cryptanalysis
T Kim, C Lee
IMA International Conference on Cryptography and Coding, 371-391, 2017
222017
Improved elliptic curve hashing and point representation
M Tibouchi, T Kim
Designs, Codes and Cryptography 82, 161-177, 2017
222017
Asymptotically faster multi-key homomorphic encryption from homomorphic gadget decomposition
T Kim, H Kwak, D Lee, J Seo, Y Song
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
202023
On the final exponentiation in Tate pairing computations
T Kim, S Kim, JH Cheon
IEEE Transactions on Information Theory 59 (6), 4033-4041, 2013
162013
Invalid curve attacks in a GLS setting
T Kim, M Tibouchi
Advances in Information and Computer Security: 10th International Workshop …, 2015
102015
Bit-flip faults on elliptic curve base fields, revisited
T Kim, M Tibouchi
Applied Cryptography and Network Security: 12th International Conference …, 2014
102014
A new trapdoor over module-NTRU lattice and its application to ID-based encryption
JH Cheon, D Kim, T Kim, Y Son
Cryptology ePrint Archive, 2019
92019
A Group Action on and the Generalized DLP with Auxiliary Inputs
JH Cheon, T Kim, YS Song
International Conference on Selected Areas in Cryptography, 121-135, 2013
82013
A new approach to the discrete logarithm problem with auxiliary inputs
T Kim, JH Cheon
Cryptology ePrint Archive, 2012
72012
A new approach to the discrete logarithm problem with auxiliary inputs
JH Cheon, T Kim
LMS Journal of Computation and Mathematics 19 (1), 1-15, 2016
62016
Multiple discrete logarithm problems with auxiliary inputs
T Kim
International Conference on the Theory and Application of Cryptology and …, 2015
62015
Discrete logarithm with auxiliary inputs
JH Cheon, T Kim
MSJ-KMS Joint Meeting 2012, 2012
52012
Equidistribution among cosets of elliptic curve points in intervals, 2019
T Kim, M Tibouchi
Number-Theoretic Methods in Cryptography (NutMic), 2019
42019
Accelerating the final exponentiation in the computation of the Tate pairings
T Kim, S Kim, JH Cheon
Cryptology ePrint Archive, 2012
42012
Security analysis of group action inverse problem with auxiliary inputs with application to CSIDH Parameters
T Kim
International Conference on Information Security and Cryptology, 165-174, 2019
22019
Improved elliptic curve hashing and point representation
T Kim, M Tibouchi
WCC2015-9th International Workshop on Coding and Cryptography 2015, 2015
22015
Bit-flip faults on elliptic curve base fields
T Kim, M Tibouchi
Applied Cryptography and Network Security, 12th International Conference, 10-13, 2014
22014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20