Follow
Miran Kim
Miran Kim
Verified email at hanyang.ac.kr - Homepage
Title
Cited by
Cited by
Year
Homomorphic encryption for arithmetic of approximate numbers
JH Cheon, A Kim, M Kim, Y Song
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
23162017
Bootstrapping for Approximate Homomorphic Encryption
JH Cheon, K Han, A Kim, M Kim, Y Song
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
3972018
A full rns variant of approximate homomorphic encryption
JH Cheon, K Han, A Kim, M Kim, Y Song
International Conference on Selected Areas in Cryptography. Springer, 2018
3722018
Secure outsourced matrix computation and application to neural networks
X Jiang, M Kim, K Lauter, Y Song
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
3612018
Secure logistic regression based on homomorphic encryption: design and evaluation
M Kim, Y Song, S Wang, Y Xia, X Jiang
JMIR medical informatics, 2018
3312018
Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference
H Chen, W Dai, M Kim, Y Song
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
2742019
Logistic regression model training based on the approximate homomorphic encryption
A Kim, Y Song, M Kim, K Lee, JH Cheon
BMC medical genomics, 2018
2712018
Homomorphic computation of edit distance
JH Cheon, M Kim, K Lauter
Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015
1942015
Private genome analysis through homomorphic encryption
M Kim, K Lauter
BMC medical informatics and decision making 15 (5), S3, 2015
1842015
Encrypting controller using fully homomorphic encryption for security of cyber-physical systems
J Kim, C Lee, H Shim, JH Cheon, A Kim, M Kim, Y Song
IFAC-PapersOnLine 49 (22), 175-180, 2016
1692016
HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS
S Wang, Y Zhang, W Dai, K Lauter, M Kim, Y Tang, H Xiong, X Jiang
Bioinformatics 32 (2), 211-218, 2016
1612016
Efficient homomorphic conversion between (ring) LWE ciphertexts
H Chen, W Dai, M Kim, Y Song
International Conference on Applied Cryptography and Network Security, 460-479, 2021
912021
Search-and-compute on encrypted data
JH Cheon, M Kim, M Kim
Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015
812015
Optimized search-and-compute circuits and their application to query evaluation on encrypted data
JH Cheon, M Kim, M Kim
IEEE Transactions on Information Forensics and Security 11 (1), 188-199, 2015
752015
Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation
M Kim, AO Harmanci, JP Bossuat, S Carpov, JH Cheon, I Chillotti, W Cho, ...
Cell systems 12 (11), 1108-1120. e4, 2021
742021
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning
H Chen, M Kim, I Razenshteyn, D Rotaru, Y Song, S Wagh
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
712020
Secure and differentially private logistic regression for horizontally distributed data
M Kim, J Lee, L Ohno-Machado, X Jiang
IEEE Transactions on Information Forensics and Security 15, 695-710, 2019
712019
Semi-parallel logistic regression for GWAS on encrypted data
M Kim, Y Song, B Li, D Micciancio
BMC medical genomics 13, 1-13, 2020
692020
Secure human action recognition by encrypted neural network inference
M Kim, X Jiang, K Lauter, E Ismayilzada, S Shams
Nature communications 13 (1), 4799, 2022
50*2022
SecureLR: Secure logistic regression model via a hybrid cryptographic protocol
Y Jiang, J Hamer, C Wang, X Jiang, M Kim, Y Song, Y Xia, N Mohammed, ...
IEEE/ACM transactions on computational biology and bioinformatics 16 (1 …, 2018
462018
The system can't perform the operation now. Try again later.
Articles 1–20