Follow
Aaram Yun
Aaram Yun
Unknown affiliation
Verified email at ewha.ac.kr
Title
Cited by
Cited by
Year
Batch fully homomorphic encryption over the integers
JH Cheon, JS Coron, J Kim, MS Lee, T Lepoint, M Tibouchi, A Yun
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
4592013
Measuring the mixing time of social graphs
A Mohaisen, A Yun, Y Kim
Proceedings of the 10th ACM SIGCOMM conference on Internet measurement, 383-389, 2010
2402010
Quantum Security of NMAC and Related Constructions: PRF Domain Extension Against Quantum attacks
F Song, A Yun
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
1612017
On protecting integrity and confidentiality of cryptographic file system for outsourced storage
A Yun, C Shi, Y Kim
Proceedings of the 2009 ACM workshop on Cloud computing security, 67-76, 2009
1062009
A simple variant of the Merkle-Damgård scheme with a permutation
S Hirose, JH Park, A Yun
Advances in Cryptology–ASIACRYPT 2007: 13th International Conference on the …, 2007
922007
On homomorphic signatures for network coding
A Yun, JH Cheon, Y Kim
IEEE Transactions on Computers 59 (9), 1295-1296, 2010
712010
CRT-based fully homomorphic encryption over the integers
J Kim, MS Lee, A Yun, JH Cheon
Cryptology ePrint Archive, 2013
462013
CRT-based fully homomorphic encryption over the integers
JH Cheon, J Kim, MS Lee, A Yun
Information Sciences 310, 149-162, 2015
432015
Cryptanalysis of the Full HAVAL with 4 and 5 Passes
H Yu, X Wang, A Yun, S Park
Fast Software Encryption: 13th International Workshop, FSE 2006, Graz …, 2006
402006
Homomorphic authenticated encryption secure against chosen-ciphertext attack
C Joo, A Yun
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
392014
General linear group action on tensors: A candidate for post-quantum cryptography
Z Ji, Y Qiao, F Song, A Yun
Theory of Cryptography: 17th International Conference, TCC 2019, Nuremberg …, 2019
292019
On lai–massey and quasi-feistel ciphers
A Yun, JH Park, J Lee
Designs, Codes and Cryptography 58, 45-72, 2011
262011
Finding collision on 45-step HAS-160
A Yun, SH Sung, S Park, D Chang, S Hong, HS Cho
Information Security and Cryptology-ICISC 2005: 8th International Conference …, 2006
242006
Collision search attack for 53-step HAS-160
HS Cho, S Park, SH Sung, A Yun
Information Security and Cryptology–ICISC 2006: 9th International Conference …, 2006
232006
Generic hardness of the multiple discrete logarithm problem
A Yun
Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015
212015
Anonymous signatures revisited
V Saraswat, A Yun
Provable Security: Third International Conference, ProvSec 2009, Guangzhou …, 2009
192009
Secure fully homomorphic authenticated encryption
J Kim, A Yun
IEEE Access 9, 107279-107297, 2021
172021
Lai-Massey scheme and quasi-Feistel networks
A Yun, JH Park, J Lee
Cryptology ePrint Archive, 2007
112007
A Simple Variant of the Merkle–Damgård Scheme with a Permutation
S Hirose, JH Park, A Yun
Journal of cryptology 25, 271-309, 2012
92012
Secure network coding for a P2P system
HJ Kang, A Yun, EY Vasserman, HT Lee, JH Cheon, Y Kim
ACM Conference on Computer and Communications Security, Poster, 2009
52009
The system can't perform the operation now. Try again later.
Articles 1–20