Aaram Yun

Orcid: 0000-0003-3502-2296

According to our database1, Aaram Yun authored at least 27 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Adaptively Secure Fully Homomorphic Message Authentication Code with Pre-processable Verification.
IACR Cryptol. ePrint Arch., 2025

Quantum Lifting for Invertible Permutations and Ideal Ciphers.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Quantum Complexity for Discrete Logarithms and Related Problems.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Oracle Recording for Non-Uniform Random Oracles, and its Applications.
IACR Cryptol. ePrint Arch., 2023

Oracle Indistinguishability and Its Applications.
IEEE Access, 2023

2022
On Insecure Uses of BGN for Privacy Preserving Data Aggregation Protocols.
Fundam. Informaticae, 2022

On Privacy Preserving Data Aggregation Protocols using BGN cryptosystem.
CoRR, 2022

2021
Formations for the Quantum Random Oracle.
IACR Cryptol. ePrint Arch., 2021

Secure Fully Homomorphic Authenticated Encryption.
IEEE Access, 2021

2019
General Linear Group Action on Tensors: A Candidate for Post-quantum Cryptography.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

2017
Quantum Security of NMAC and Related Constructions.
IACR Cryptol. ePrint Arch., 2017

Quantum Security of NMAC and Related Constructions - PRF Domain Extension Against Quantum attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2015
CRT-based fully homomorphic encryption over the integers.
Inf. Sci., 2015

Generic Hardness of the Multiple Discrete Logarithm Problem.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Homomorphic Authenticated Encryption Secure against Chosen-Ciphertext Attack.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Batch Fully Homomorphic Encryption over the Integers.
Proceedings of the Advances in Cryptology, 2013

2011
On Lai-Massey and quasi-Feistel ciphers.
Des. Codes Cryptogr., 2011

2010
On Homomorphic Signatures for Network Coding.
IEEE Trans. Computers, 2010

Measuring the mixing time of social graphs.
Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference, 2010

2009
Anonymous Signatures Revisited.
Proceedings of the Provable Security, Third International Conference, 2009

On protecting integrity and confidentiality of cryptographic file system for outsourced storage.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2007
Lai-Massey Scheme and Quasi-Feistel Networks.
IACR Cryptol. ePrint Arch., 2007

A Simple Variant of the Merkle-Damgård Scheme with a Permutation.
Proceedings of the Advances in Cryptology, 2007

2006
Collision Search Attack for 53-Step HAS-160.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

Cryptanalysis of the Full HAVAL with 4 and 5 Passes.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

2005
Finding Collision on 45-Step HAS-160.
Proceedings of the Information Security and Cryptology, 2005

2004
Cryptanalysis of a Divisor Class Group Based Public-Key Cryptosystem.
Proceedings of the Algorithmic Number Theory, 6th International Symposium, 2004


  Loading...