Jihoon Cho

Orcid: 0000-0002-8619-9481

According to our database1, Jihoon Cho authored at least 31 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Software-Defined Cryptography: A Design Feature of Cryptographic Agility.
IACR Cryptol. ePrint Arch., 2024

Disentangled Multimodal Brain MR Image Translation via Transformer-based Modality Infuser.
CoRR, 2024

2023
Development and validation of a prediction model for evaluating extubation readiness in preterm infants.
Int. J. Medical Informatics, October, 2023

Hybrid-Fusion Transformer for Multisequence MRI.
CoRR, 2023

Systematization of Shuffling Countermeasures: With an Application to CRYSTALS-Dilithium.
IEEE Access, 2023

2022
AIM: Symmetric Primitive for Shorter Signatures with Stronger Security.
IACR Cryptol. ePrint Arch., 2022

Invertible Tabular GANs: Killing Two Birds with OneStone for Tabular Data Synthesis.
CoRR, 2022

SOS: Score-based Oversampling for Tabular Data.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

Multi-modal Transformer for Brain Tumor Segmentation.
Proceedings of the Brainlesion: Glioma, Multiple Sclerosis, Stroke and Traumatic Brain Injuries, 2022

2021
Management of cardiovascular disease using an mHealth tool: a randomized clinical trial.
npj Digit. Medicine, 2021

Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling.
IEEE Access, 2021

Invertible Tabular GANs: Killing Two Birds with One Stone for Tabular Data Synthesis.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Domain-Robust Mitotic Figure Detection with Style Transfer.
Proceedings of the Biomedical Image Registration, Domain Generalisation and Out-of-Distribution Analysis - MICCAI 2021 Challenges: MIDOG 2021, MOOD 2021, and Learn2Reg 2021, Held in Conjunction with MICCAI 2021, Strasbourg, France, September 27, 2021

Self-supervised 3D Out-of-Distribution Detection via Pseudoanomaly Generation.
Proceedings of the Biomedical Image Registration, Domain Generalisation and Out-of-Distribution Analysis - MICCAI 2021 Challenges: MIDOG 2021, MOOD 2021, and Learn2Reg 2021, Held in Conjunction with MICCAI 2021, Strasbourg, France, September 27, 2021

Transciphering Framework for Approximate Homomorphic Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Augmented Museum Experience with Interactive Visualization: Korean Mummy.
J. Comput. Sci. Eng., 2020

Hybrid Framework for Approximate Computation over Encrypted Data.
IACR Cryptol. ePrint Arch., 2020

Single-Trace Attacks on Message Encoding in Lattice-Based KEMs.
IEEE Access, 2020

How to Securely Collaborate on Data: Decentralized Threshold HE and Secure Key Update.
IEEE Access, 2020

Masta: An HE-Friendly Cipher Using Modular Arithmetic.
IEEE Access, 2020

2019
Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Interactive Exhibition from Wall Panels in a Museum.
Proceedings of the 2019 ACM International Conference on Interactive Surfaces and Spaces, 2019

Generic Construction of Bounded-Collusion IBE via Table-Based ID-to-Key Map.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks.
Proceedings of the Information Security Practice and Experience, 2018

2017
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

2016
Hybrid WBC: Secure and Efficient White-Box Encryption Schemes.
IACR Cryptol. ePrint Arch., 2016

2015
Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM.
IACR Cryptol. ePrint Arch., 2015

2014
Cryptographic approaches to security and privacy issues in pervasive computing.
PhD thesis, 2014

2009
Strengthening Class1 Gen2 RFID Tags.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

On Refresh-Based Tag Identification Schemes.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2007
Practical and robust self-keying scheme for personal area networks.
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007


  Loading...