Joohee Lee

Orcid: 0000-0002-1901-2410

According to our database1, Joohee Lee authored at least 23 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Direct comparison of diagnostic and clinical values between Tc-99 m DPD and Tc-99 m PYP scintigraphy in patients with cardiac amyloidosis.
BMC Medical Imaging, December, 2023

A Novel CCA Attack for NTRU+ KEM.
IACR Cryptol. ePrint Arch., 2023

Efficient Continuous Key Agreement With Reduced Bandwidth From a Decomposable KEM.
IEEE Access, 2023

Security Evaluation on KpqC Round 1 Lattice-Based Algorithms Using Lattice Estimator.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

2022
AIM: Symmetric Primitive for Shorter Signatures with Stronger Security.
IACR Cryptol. ePrint Arch., 2022

Privacy-Preserving Fair Learning of Support Vector Machine with Homomorphic Encryption.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

2021
Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling.
IEEE Access, 2021

Transciphering Framework for Approximate Homomorphic Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Lattice-Based Secure Biometric Authentication for Hamming Distance.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Hybrid Framework for Approximate Computation over Encrypted Data.
IACR Cryptol. ePrint Arch., 2020

Formal or informal human collaboration approach to maritime safety using FRAM.
Cogn. Technol. Work., 2020

Single-Trace Attacks on Message Encoding in Lattice-Based KEMs.
IEEE Access, 2020

HE-Friendly Algorithm for Privacy-Preserving SVM Training.
IEEE Access, 2020

2019
RLizard: Post-Quantum Key Encapsulation Mechanism for IoT Devices.
IEEE Access, 2019

Direct Energy Trading of Microgrids in Distribution Energy Market.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Efficient Identity-Based Encryption from LWR.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

2018
Instant Privacy-Preserving Biometric Authentication for Hamming Distance.
IACR Cryptol. ePrint Arch., 2018

Round-Reduced Modular Construction of Asymmetric Password-Authenticated Key Exchange.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

2017
Privacy-Preserving Computations of Predictive Medical Models with Minimax Approximation and Non-Adjacent Form.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Lizard: Cut off the Tail! // Practical Post-Quantum Public-Key Encryption from LWE and LWR.
IACR Cryptol. ePrint Arch., 2016

An Efficient Affine Equivalence Algorithm for Multiple S-Boxes and a Structured Affine Layer.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

2014
Nodal Flow Simulations by the Immersed Boundary Method.
SIAM J. Appl. Math., 2014

1996
Error probability for bandlimited hybrid SFH/DS-CDMA.
Proceedings of the 7th IEEE International Symposium on Personal, 1996


  Loading...