22 results on '"Young-Sik Kim"'
Search Results
2. A New Fine Tuning Method for FHEW/TFHE Bootstrapping with IND-CPAD Security.
3. Amortized Large Look-up Table Evaluation with Multivariate Polynomials for Homomorphic Encryption.
4. Layered ROLLO-I: Faster rank-metric code-based KEM using ideal LRPC codes.
5. Peregrine: Toward Fastest FALCON Based on GPV Framework.
6. Hierarchical Galois Key Management Systems for Privacy Preserving AIaaS with Homomorphic Encryption.
7. Enhanced pqsigRM: Code-Based Digital Signature Scheme with Short Signature and Fast Verification for Post-Quantum Cryptography.
8. Optimization of Homomorphic Comparison Algorithm on RNS-CKKS Scheme.
9. Low-Complexity Deep Convolutional Neural Networks on Fully Homomorphic Encryption Using Multiplexed Convolutions.
10. Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network.
11. Near-optimal Polynomial for Modulus Reduction Using L2-norm for Approximate Homomorphic Encryption.
12. Reduction from Module-SIS to Ring-SIS Under Norm Constraint of Ring-SIS.
13. On the Efficient Estimation of Min-Entropy.
14. Bootstrapping on SEAL.
15. Improved Reduction Between SIS Problems over Structured Lattices.
16. Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison.
17. Optimal Minimax Polynomial Approximation of Modular Reduction for Bootstrapping of Approximate Homomorphic Encryption.
18. High-Precision Approximate Homomorphic Encryption by Error Variance Minimization.
19. Homomorphic Computation in Reed-Muller Codes.
20. Bit Security Estimation Using Various Information-Theoretic Measures.
21. A Modified pqsigRM: RM Code-Based Signature Scheme.
22. Analysis of Modified Shell Sort for Fully Homomorphic Encryption.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.