Taechan Kim

Orcid: 0000-0003-1683-8484

Affiliations:
  • NTT (Nippon Telegraph and Telephone Corporation) Secure Platform Laboratories, Japan
  • Seoul National University, South Korea (former)


According to our database1, Taechan Kim authored at least 16 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition.
IACR Cryptol. ePrint Arch., 2022

2020
Equidistribution Among Cosets of Elliptic Curve Points in Intervals.
J. Math. Cryptol., 2020

2019
A New Trapdoor over Module-NTRU Lattice and its Application to ID-based Encryption.
IACR Cryptol. ePrint Arch., 2019

Security Analysis of Group Action Inverse Problem with Auxiliary Inputs with Application to CSIDH Parameters.
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019

2017
Improved elliptic curve hashing and point representation.
Des. Codes Cryptogr., 2017

Lattice Reductions over Euclidean Rings with Applications to Cryptanalysis.
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017

2016
A new approach to the discrete logarithm problem with auxiliary inputs.
LMS J. Comput. Math., 2016

Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree.
IACR Cryptol. ePrint Arch., 2016

Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Extended Tower Number Field Sieve: A New Complexity for Medium Prime Case.
IACR Cryptol. ePrint Arch., 2015

Invalid Curve Attacks in a GLS Setting.
Proceedings of the Advances in Information and Computer Security, 2015

Multiple Discrete Logarithm Problems with Auxiliary Inputs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Bit-Flip Faults on Elliptic Curve Base Fields, Revisited.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
On the Final Exponentiation in Tate Pairing Computations.
IEEE Trans. Inf. Theory, 2013

A Group Action on ℤ<sub>p</sub><sup>˟</sup> and the Generalized DLP with Auxiliary Inputs.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

2012
Accelerating the Final Exponentiation in the Computation of the Tate Pairings.
IACR Cryptol. ePrint Arch., 2012


  Loading...