Sunoo Park

According to our database1, Sunoo Park authored at least 20 papers between 2012 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
It wasn't me! Repudiability and Unclaimability of Ring Signatures.
IACR Cryptology ePrint Archive, 2019

3SUM with Preprocessing: Algorithms, Lower Bounds and Cryptographic Applications.
CoRR, 2019

KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures.
CoRR, 2019

It Wasn't Me! - Repudiability and Claimability of Ring Signatures.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Cryptography for societal benefit.
PhD thesis, 2018

Public Accountability vs. Secret Laws: Can They Coexist?
IACR Cryptology ePrint Archive, 2018

Practical Accountability of Secret Processes.
IACR Cryptology ePrint Archive, 2018

Fully Bideniable Interactive Encryption.
IACR Cryptology ePrint Archive, 2018

Static-Memory-Hard Functions and Nonlinear Space-Time Tradeoffs via Pebbling.
CoRR, 2018

How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts.
CoRR, 2018

Static-Memory-Hard Functions, and Modeling the Cost of Space vs. Time.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Proactive Secure Multiparty Computation with a Dishonest Majority.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

2017
Public Accountability vs. Secret Laws: Can They Coexist?: A Cryptographic Proposal.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

2016
Towards Secure Quadratic Voting.
IACR Cryptology ePrint Archive, 2016

How to Incentivize Data-Driven Collaboration Among Competing Parties.
CoRR, 2016

2015
Spacemint: A Cryptocurrency Based on Proofs of Space.
IACR Cryptology ePrint Archive, 2015

Adaptively Secure Coin-Flipping, Revisited.
CoRR, 2015

2014
Towards Optimally Efficient Secret-Key Authentication from PRG.
IACR Cryptology ePrint Archive, 2014

Cryptographically Blinded Games: Leveraging Players' Limitations for Equilibria and Profit.
CoRR, 2014

2012
Is Public-Key Encryption Based on LPN Practical?
IACR Cryptology ePrint Archive, 2012


  Loading...