Joohee Lee

Orcid: 0000-0002-1901-2410

According to our database1, Joohee Lee authored at least 23 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Direct comparison of diagnostic and clinical values between Tc-99 m DPD and Tc-99 m PYP scintigraphy in patients with cardiac amyloidosis.
BMC Medical Imaging, December, 2023

A Novel CCA Attack for NTRU+ KEM.
IACR Cryptol. ePrint Arch., 2023

Efficient Continuous Key Agreement With Reduced Bandwidth From a Decomposable KEM.
IEEE Access, 2023

Security Evaluation on KpqC Round 1 Lattice-Based Algorithms Using Lattice Estimator.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

AIM: Symmetric Primitive for Shorter Signatures with Stronger Security.
IACR Cryptol. ePrint Arch., 2022

Privacy-Preserving Fair Learning of Support Vector Machine with Homomorphic Encryption.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling.
IEEE Access, 2021

Transciphering Framework for Approximate Homomorphic Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Lattice-Based Secure Biometric Authentication for Hamming Distance.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

Hybrid Framework for Approximate Computation over Encrypted Data.
IACR Cryptol. ePrint Arch., 2020

Formal or informal human collaboration approach to maritime safety using FRAM.
Cogn. Technol. Work., 2020

Single-Trace Attacks on Message Encoding in Lattice-Based KEMs.
IEEE Access, 2020

HE-Friendly Algorithm for Privacy-Preserving SVM Training.
IEEE Access, 2020

RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices.
IEEE Access, 2019

Direct Energy Trading of Microgrids in Distribution Energy Market.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Efficient Identity-Based Encryption from LWR.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

Instant Privacy-Preserving Biometric Authentication for Hamming Distance.
IACR Cryptol. ePrint Arch., 2018

Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Privacy-Preserving Computations of Predictive Medical Models with Minimax Approximation and Non-Adjacent Form.
Proceedings of the Financial Cryptography and Data Security, 2017

Lizard: Cut off the Tail! // Practical Post-Quantum Public-Key Encryption from LWE and LWR.
IACR Cryptol. ePrint Arch., 2016

An Efficient Affine Equivalence Algorithm for Multiple S-Boxes and a Structured Affine Layer.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Nodal Flow Simulations by the Immersed Boundary Method.
SIAM J. Appl. Math., 2014

Error probability for bandlimited hybrid SFH/DS-CDMA.
Proceedings of the 7th IEEE International Symposium on Personal, 1996