Follow
Sungwook Kim
Sungwook Kim
Department of Information Security, Seoul Women's University
Verified email at swu.ac.kr
Title
Cited by
Cited by
Year
Privacy enhanced matrix factorization for recommendation with local differential privacy
H Shin, S Kim, J Shin, X Xiao
IEEE Transactions on Knowledge and Data Engineering 30 (9), 1770-1782, 2018
2122018
A secure smart-metering protocol over power-line communication
S Kim, EY Kwon, M Kim, JH Cheon, S Ju, Y Lim, M Choi
IEEE Transactions on Power Delivery 26 (4), 2370-2379, 2011
782011
Efficient privacy-preserving matrix factorization via fully homomorphic encryption
S Kim, J Kim, D Koo, Y Kim, H Yoon, J Shin
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
702016
Efficient privacy-preserving matrix factorization for recommendation via fully homomorphic encryption
J Kim, D Koo, Y Kim, H Yoon, J Shin, S Kim
ACM Transactions on Privacy and Security (TOPS) 21 (4), 1-30, 2018
562018
A new approach to practical function-private inner product encryption
S Kim, J Kim, JH Seo
Theoretical Computer Science 783, 22-40, 2019
242019
A new scale-invariant homomorphic encryption scheme
J Kim, S Kim, JH Seo
Information Sciences 422, 177-187, 2018
192018
Method and apparatus for encrypting data
JW Seo, YH Hwang, S Kim
US Patent 10,177,906, 2019
182019
Threshold signature schemes for ElGamal variants
S Kim, J Kim, JH Cheon, S Ju
Computer Standards & Interfaces 33 (4), 432-437, 2011
172011
Learning new words from keystroke data with local differential privacy
S Kim, H Shin, C Baek, S Kim, J Shin
IEEE Transactions on Knowledge and Data Engineering 32 (3), 479-491, 2018
162018
On the final exponentiation in Tate pairing computations
T Kim, S Kim, JH Cheon
IEEE Transactions on Information Theory 59 (6), 4033-4041, 2013
162013
Fast order-preserving encryption from uniform distribution sampling
YH Hwang, S Kim, JW Seo
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 41-52, 2015
102015
A parameterized splitting system and its application to the discrete logarithm problem with low Hamming weight product exponents
S Kim, JH Cheon
Public Key Cryptography–PKC 2008: 11th International Workshop on Practice …, 2008
82008
Efficient zero-knowledge arguments in discrete logarithm setting: sublogarithmic proof or sublinear verifier
S Kim, H Lee, JH Seo
International Conference on the Theory and Application of Cryptology and …, 2022
62022
Enhancing differential privacy for federated learning at scale
C Baek, S Kim, D Nam, J Park
IEEE Access 9, 148090-148103, 2021
62021
Fixed argument pairing inversion on elliptic curves
S Kim, JH Cheon
Designs, Codes and Cryptography 77, 143-152, 2015
52015
Electronic device, communication method and encrypting method thereof
SW Kim, KIM Chul-Joo, Y Sohn, J Shin
US Patent 10,362,005, 2019
42019
Multilinear map via scale-invariant FHE: Enhancing security and efficiency
J Kim, S Kim, JH Seo
Cryptology ePrint Archive, 2015
42015
Accelerating the final exponentiation in the computation of the Tate pairings
T Kim, S Kim, JH Cheon
Cryptology ePrint Archive, 2012
42012
Parameterized splitting systems for the discrete logarithm
S Kim, JH Cheon
IEEE transactions on information theory 56 (5), 2528-2535, 2010
32010
Efficient Sum-Check Protocol for Convolution
C Ju, H Lee, H Chung, JH Seo, S Kim
IEEE Access 9, 164047-164059, 2021
12021
The system can't perform the operation now. Try again later.
Articles 1–20