default search action
Dongwoo Kim 0003
Person information
- unicode name: 김동우
- affiliation: Western Digital Technologies Inc., Milpitas, CA, USA
- affiliation: Seoul National University, Seoul, South Korea
Other persons with the same name
- Dongwoo Kim (aka: Dong-Woo Kim, Dong Woo Kim) — disambiguation page
- Dongwoo Kim 0001 — Hanyang University, ERICA, Department of Electronics and Communication Engineering, Ansan, South Korea (and 1 more)
- Dongwoo Kim 0002 (aka: Dong Woo Kim 0002) — POSTECH, Pohang, South Korea (and 2 more)
- Dongwoo Kim 0004 — Chungnam National University, Daejeon, South Korea
- Dongwoo Kim 0005 — POSTECH, Power Analog Electronics & Semiconductor Devices Lab, Pohang, Republic of Korea
- Dongwoo Kim 0006 — Microsoft
- Dongwoo Kim 0007 — Korea Advanced Institute of Science and Technology, School of Digital Humanities and Computational Social Sciences, Daejeon, South Korea (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j4]Dongwoo Kim, Cyril Guyot:
Optimized Privacy-Preserving CNN Inference With Fully Homomorphic Encryption. IEEE Trans. Inf. Forensics Secur. 18: 2175-2187 (2023) - 2022
- [j3]Shuo Chen, Jung Hee Cheon, Dongwoo Kim, Daejun Park:
Interactive Proofs for Rounding Arithmetic. IEEE Access 10: 122706-122725 (2022) - [j2]Junsoo Kim, Dongwoo Kim, Yongsoo Song, Hyungbo Shim, Henrik Sandberg, Karl Henrik Johansson:
Comparison of encrypted control approaches and tutorial on dynamic systems using Learning With Errors-based homomorphic encryption. Annu. Rev. Control. 54: 200-218 (2022) - [j1]Jai Hyun Park, Jung Hee Cheon, Dongwoo Kim:
Efficient verifiable computation over quotient polynomial rings. Int. J. Inf. Sec. 21(5): 953-971 (2022) - [i9]Junsoo Kim, Dongwoo Kim, Yongsoo Song, Hyungbo Shim, Henrik Sandberg, Karl Henrik Johansson:
Comparison of encrypted control approaches and tutorial on dynamic systems using LWE-based homomorphic encryption. CoRR abs/2210.05560 (2022) - 2021
- [c7]Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Joohee Lee, Junbum Shin, Yongsoo Song:
Lattice-Based Secure Biometric Authentication for Hamming Distance. ACISP 2021: 653-672 - [c6]Jung Hee Cheon, Dongwoo Kim, Keewoo Lee:
MHz2k: MPC from HE over $\mathbb {Z}_{2^k}$ with New Packing, Simpler Reshare, and Better ZKP. CRYPTO (2) 2021: 426-456 - [c5]Alexandre Bois, Ignacio Cascudo, Dario Fiore, Dongwoo Kim:
Flexible and Efficient Verifiable Computation on Encrypted Data. Public Key Cryptography (2) 2021: 528-558 - [i8]Jung Hee Cheon, Dongwoo Kim, Keewoo Lee:
MHz2k: MPC from HE over ℤ2k with New Packing, Simpler Reshare, and Better ZKP. IACR Cryptol. ePrint Arch. 2021: 1383 (2021) - 2020
- [c4]Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim:
Efficient Homomorphic Comparison Methods with Optimal Complexity. ASIACRYPT (2) 2020: 221-256 - [c3]Jung Hee Cheon, Dongwoo Kim, Junsoo Kim, Seungbeom Lee, Hyungbo Shim:
Authenticated Computation of Control Signal from Dynamic Controllers. CDC 2020: 3249-3254 - [i7]Alexandre Bois, Ignacio Cascudo, Dario Fiore, Dongwoo Kim:
Flexible and Efficient Verifiable Computation on Encrypted Data. IACR Cryptol. ePrint Arch. 2020: 1526 (2020)
2010 – 2019
- 2019
- [c2]Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Hun-Hee Lee, Keewoo Lee:
Numerical Method for Comparison on Homomorphically Encrypted Numbers. ASIACRYPT (2) 2019: 415-445 - [i6]Duhyeong Kim, Yongha Son, Dongwoo Kim, Andrey Kim, Seungwan Hong, Jung Hee Cheon:
Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2019: 152 (2019) - [i5]Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim, Hun-Hee Lee, Keewoo Lee:
Numerical Methods for Comparison on Homomorphically Encrypted Numbers. IACR Cryptol. ePrint Arch. 2019: 417 (2019) - [i4]Shuo Chen, Jung Hee Cheon, Dongwoo Kim, Daejun Park:
Verifiable Computing for Approximate Computation. IACR Cryptol. ePrint Arch. 2019: 762 (2019) - [i3]Jung Hee Cheon, Dongwoo Kim, Duhyeong Kim:
Efficient Homomorphic Comparison Methods with Optimal Complexity. IACR Cryptol. ePrint Arch. 2019: 1234 (2019) - 2018
- [c1]Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee:
A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction. ACISP 2018: 28-44 - [i2]Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee:
A Reusable Fuzzy Extractor with Practical Storage Size. IACR Cryptol. ePrint Arch. 2018: 681 (2018) - [i1]Joohee Lee, Dongwoo Kim, Duhyeong Kim, Yongsoo Song, Junbum Shin, Jung Hee Cheon:
Instant Privacy-Preserving Biometric Authentication for Hamming Distance. IACR Cryptol. ePrint Arch. 2018: 1214 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint