Masta: an HE-friendly cipher using modular arithmetic J Ha, S Kim, W Choi, J Lee, D Moon, H Yoon, J Cho IEEE Access 8, 194741-194751, 2020 | 25 | 2020 |
Indifferentiability of truncated random permutations W Choi, BH Lee, J Lee International Conference on the Theory and Application of Cryptology and …, 2019 | 18 | 2019 |
Improved security analysis for nonce-based enhanced hash-then-mask MACs W Choi, BH Lee, Y Lee, J Lee International Conference on the Theory and Application of Cryptology and …, 2020 | 14 | 2020 |
Toward a fully secure authenticated encryption scheme from a pseudorandom permutation W Choi, B Lee, J Lee, Y Lee International Conference on the Theory and Application of Cryptology and …, 2021 | 11 | 2021 |
Multi-user security of the sum of truncated random permutations W Choi, H Kim, J Lee, Y Lee International Conference on the Theory and Application of Cryptology and …, 2022 | 4 | 2022 |
Improved Multi-user Security Using the Squared-Ratio Method YL Chen, W Choi, C Lee Annual International Cryptology Conference, 694-724, 2023 | 2 | 2023 |
Building PRFs from TPRPs: beyond the block and the tweak length bounds W Choi, J Lee, Y Lee Cryptology ePrint Archive, 2022 | 2 | 2022 |
Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers W Choi, A Inoue, B Lee, J Lee, E List, K Minematsu, Y Naito IACR Transactions on Symmetric Cryptology, 39-70, 2020 | 1 | 2020 |
Apparatus and method for encryption, apparatus and method for converting ciphertext WSC Joo Hee Lee, Duk Jae Moon, Hyo Jin Yoon, Ji Hoon Cho, Eun Kyung Kim ... US Patent 11,558,171, 2023 | | 2023 |
Blockchain Governance via Sharp Anonymous Multisignatures W Choi, X Liu, V Zikas Cryptology ePrint Archive, 2023 | | 2023 |
On Overidealizing Ideal Worlds: Xor of Two Permutations and its Applications W Choi, M Hhan, Y Wei, V Zikas Cryptology ePrint Archive, 2023 | | 2023 |
Multi-User Security of the Sum of Truncated Random Permutations (Full Version) W Choi, H Kim, J Lee, Y Lee Cryptology ePrint Archive, 2022 | | 2022 |
Study on building pseudorandom functions from cryptographic primitives WS Choi 한국과학기술원, 2022 | | 2022 |
Toward a Fully Secure Authenticated Encryption Scheme From a Pseudorandom Permutation (Full Version) W Choi, B Lee, J Lee, Y Lee Cryptology ePrint Archive, 2021 | | 2021 |
Security of truncated random permutations W Choi 한국과학기술원, 2018 | | 2018 |