Follow
Miran Kim
Miran Kim
Verified email at hanyang.ac.kr - Homepage
Title
Cited by
Cited by
Year
Homomorphic encryption for arithmetic of approximate numbers
JH Cheon, A Kim, M Kim, Y Song
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
17372017
Bootstrapping for Approximate Homomorphic Encryption
JH Cheon, K Han, A Kim, M Kim, Y Song
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
3212018
Secure outsourced matrix computation and application to neural networks
X Jiang, M Kim, K Lauter, Y Song
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
2892018
A full rns variant of approximate homomorphic encryption
JH Cheon, K Han, A Kim, M Kim, Y Song
International Conference on Selected Areas in Cryptography. Springer, 2018
2812018
Secure logistic regression based on homomorphic encryption: design and evaluation
M Kim, Y Song, S Wang, Y Xia, X Jiang
JMIR medical informatics, 2018
2812018
Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference
H Chen, W Dai, M Kim, Y Song
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
2312019
Logistic regression model training based on the approximate homomorphic encryption
A Kim, Y Song, M Kim, K Lee, JH Cheon
BMC medical genomics, 2018
2202018
Homomorphic computation of edit distance
JH Cheon, M Kim, K Lauter
Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015
1842015
Private genome analysis through homomorphic encryption
M Kim, K Lauter
BMC medical informatics and decision making 15 (5), S3, 2015
1692015
Encrypting controller using fully homomorphic encryption for security of cyber-physical systems
J Kim, C Lee, H Shim, JH Cheon, A Kim, M Kim, Y Song
IFAC-PapersOnLine 49 (22), 175-180, 2016
1522016
HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS
S Wang, Y Zhang, W Dai, K Lauter, M Kim, Y Tang, H Xiong, X Jiang
Bioinformatics 32 (2), 211-218, 2016
1512016
Search-and-compute on encrypted data
JH Cheon, M Kim, M Kim
Financial Cryptography and Data Security: FC 2015 International Workshops …, 2015
772015
Optimized search-and-compute circuits and their application to query evaluation on encrypted data
JH Cheon, M Kim, M Kim
IEEE Transactions on Information Forensics and Security 11 (1), 188-199, 2015
732015
Secure and differentially private logistic regression for horizontally distributed data
M Kim, J Lee, L Ohno-Machado, X Jiang
IEEE Transactions on Information Forensics and Security 15, 695-710, 2019
622019
Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation
M Kim, AO Harmanci, JP Bossuat, S Carpov, JH Cheon, I Chillotti, W Cho, ...
Cell systems 12 (11), 1108-1120. e4, 2021
602021
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning
H Chen, M Kim, I Razenshteyn, D Rotaru, Y Song, S Wagh
Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020
552020
Efficient homomorphic conversion between (ring) LWE ciphertexts
H Chen, W Dai, M Kim, Y Song
International Conference on Applied Cryptography and Network Security, 460-479, 2021
542021
Semi-parallel logistic regression for GWAS on encrypted data
M Kim, Y Song, B Li, D Micciancio
BMC medical genomics 13, 1-13, 2020
522020
SCOR: A secure international informatics infrastructure to investigate COVID-19
JL Raisaro, F Marino, J Troncoso-Pastoriza, R Beau-Lejdstrom, R Bellazzi, ...
Journal of the American Medical Informatics Association 27 (11), 1721-1726, 2020
382020
Secure human action recognition by encrypted neural network inference
M Kim, X Jiang, K Lauter, E Ismayilzada, S Shams
Nature communications 13 (1), 4799, 2022
37*2022
The system can't perform the operation now. Try again later.
Articles 1–20