Jinsu Kim
Jinsu Kim
Security 2Lab, Software Center, Samsung Electronics
Verified email at
Cited by
Cited by
Batch fully homomorphic encryption over the integers
JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint, M Tibouchi, A Yun
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
A hybrid scheme of public-key encryption and somewhat homomorphic encryption
JH Cheon, J Kim
IEEE transactions on information forensics and security 10 (5), 1052-1063, 2015
Efficient privacy-preserving matrix factorization via fully homomorphic encryption
S Kim, J Kim, D Koo, Y Kim, H Yoon, J Shin
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption
J Kim, D Koo, Y Kim, H Yoon, J Shin, S Kim
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-30, 2018
CRT-based fully homomorphic encryption over the integers
JH Cheon, J Kim, MS Lee, A Yun
Information Sciences 310, 149-162, 2015
A new approach to practical function-private inner product encryption
S Kim, J Kim, JH Seo
Theoretical Computer Science 783, 22-40, 2019
A new scale-invariant homomorphic encryption scheme
J Kim, S Kim, JH Seo
Information Sciences 422, 177-187, 2018
Homomorphic encryption and decryption methods using ring isomorphism, and apparatuses using the same
JH Cheon, J Kim, MS Lee
US Patent App. 14/127,478, 2015
Data protection method and apparatus
K Lee, J Cheon, K Eunyoung, KIM Bumhan, J Kim, KIM Hongtae, ...
US Patent 9,509,495, 2016
Multilinear map via scale-invariant FHE: Enhancing security and efficiency
J Kim, S Kim, JH Seo
Cryptology ePrint Archive, 2015
An Approach to Reduce Storage for Homomorphic Computations
JH Cheon, J Kim
Cryptology ePrint Archive, 2013
A Public Shuffle without Private Permutations
M Kim, J Kim, JH Cheon
Cryptology ePrint Archive, 2012
The system can't perform the operation now. Try again later.
Articles 1–12