publications

Authors are listed in alphabetical order unless marked with *.

2026

  1. CCS
    Revisiting Shamir Secret Sharing for Threshold Fully Homomorphic Encryption
    Jiseung Kim, Seunghu Kim, and Hyung Tae Lee
    In ACM Conference on Computer and Communications Security (CCS), 2026
    To appear
  2. S&P
    From Perfect to Approximate Hints: Efficient LWE Secret Recovery Leveraging Low Hamming Weight
    Minki Hhan, Ga Hee Hong, Jiseung Kim, Changmin Lee, and Jeonghwan Lee
    In IEEE Symposium on Security and Privacy (S&P), 2026
    To appear
  3. IoT-J
    Insecurity of Forward Secure Equality Test for Secure Data Sharing in Healthcare Systems
    Jiseung Kim and Hyung Tae Lee
    IEEE Internet of Things Journal, 2026
    To appear
  4. DCC
    Hybrid of Lattice-reduction and Meet-LWE via Near-Collision on Babai’s Plane
    Minki Hhan, Jiseung Kim, Changmin Lee, and Yongha Son
    Designs, Codes and Cryptography, 2026
  5. SAC
    Private Set Operations from Circuit-Based PSI
    Jiseung Kim, Hyung Tae Lee, and Yongha Son
    In ACM Symposium on Applied Computing (SAC), 2026

2025

  1. ACCESS
    Cryptanalysis and Modification of Yang et al.’s Certificateless Multi-User Matchmaking Encryption Scheme
    Jiseung Kim and Hyung Tae Lee
    IEEE ACCESS, 2025
  2. TSC
    Comment on “RCME: A Reputation Incentive Committee Consensus-Based for Matchmaking Encryption in IoT Healthcare”
    Jiseung Kim and Hyung Tae Lee
    IEEE Transactions on Services Computing, 2025
  3. JoC
    Improved Universal Thresholdizer from Iterative Shamir Secret Sharing
    Jung Hee Cheon, Wonhee Cho, and Jiseung Kim
    Journal of Cryptology, 2025

2024

  1. AMC
    Finding Small Roots for Bivariate Polynomials Modulo an Ideal of the Ring of Integers
    Jiseung Kim and Changmin Lee
    Advances in Mathematics of Communications, 2024

2023

  1. DCC
    A Polynomial Time Algorithm for Breaking NTRU Encryption with Multiple Keys
    Jiseung Kim and Changmin Lee
    Designs, Codes and Cryptography, 2023
  2. JCN
    Amortized Efficient zk-SNARK from Linear-Only RLWE Encodings
    Heewon Chung, Dongwoo Kim, Jeong Han Kim, and Jiseung Kim
    Journal of Communications and Networks, 2023

2022

  1. DCC
    Adventures in Crypto Dark Matter: Attacks, Fixes and Analysis for Weak Pseudorandom Functions
    Jung Hee Cheon, Wonhee Cho, Jeong Han Kim, and Jiseung Kim
    Designs, Codes and Cryptography, 2022
    Extended version of PKC 2021
  2. IET Inf. Sec.
    Cryptanalysis of the FRS Obfuscation Based on the CLT13 Multilinear Map
    Jiseung Kim and Changmin Lee
    IET Information Security, 2022

2021

  1. IET Inf. Sec.
    Extension of Simultaneous Diophantine Approximation Algorithm for Partial Approximate Common Divisor Variants
    Wonhee Cho, Jiseung Kim, and Changmin Lee
    IET Information Security, 2021
  2. DCC
    (In)security of Concrete Instantiation of Lin17’s Functional Encryption Scheme from Noisy Multilinear Maps
    Wonhee Cho, Jiseung Kim, and Changmin Lee
    Designs, Codes and Cryptography, 2021
  3. PKC
    Adventures in Crypto Dark Matter: Attacks and Fixes for Weak Pseudorandom Function
    Jung Hee Cheon, Wonhee Cho, Jeong Han Kim, and Jiseung Kim
    In International Conference on Practice and Theory of Public-Key Cryptography (PKC), 2021

2020

  1. JMC
    Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem
    Jung Hee Cheon, Wonhee Cho, Minki Hhan, Jiseung Kim, and Changmin Lee
    Journal of Mathematical Cryptology, 2020
    Extended version of NutMic 2019

2019

  1. CRYPTO
    Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map
    Jung Hee Cheon, Wonhee Cho, Minki Hhan, Jiseung Kim, and Changmin Lee
    In Annual International Cryptology Conference (CRYPTO), 2019
  2. NutMic
    Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem
    Jung Hee Cheon, Wonhee Cho, Minki Hhan, Minsik Kang, Jiseung Kim, and 1 more author
    In Number-Theoretic Methods in Cryptology (NutMic), 2019

2018

  1. CRYPTO
    Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from the NTRU Problem
    Jung Hee Cheon, Minki Hhan, Jiseung Kim, and Changmin Lee
    In Annual International Cryptology Conference (CRYPTO), 2018
  2. ACCESS
    Cryptanalysis on the HHSS Obfuscation Arising from Absence of Safeguards
    Jung Hee Cheon, Minki Hhan, Jiseung Kim, and Changmin Lee
    IEEE ACCESS, 2018