Yongsoo Song

Orcid: 0000-0002-0496-9789

Affiliations:
  • University of California, San Diego, CA, USA


According to our database1, Yongsoo Song authored at least 55 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
On the Security and Privacy of CKKS-based Homomorphic Evaluation Protocols.
IACR Cryptol. ePrint Arch., 2025

Practical Circuit Privacy/Sanitization for TFHE.
IACR Cryptol. ePrint Arch., 2025

Ciphertext-Simulatable HE from BFV with Randomized Evaluation.
IACR Cryptol. ePrint Arch., 2025

Efficient Full Domain Functional Bootstrapping from Recursive LUT Decomposition.
IACR Cryptol. ePrint Arch., 2025

Provably Secure Approximate Computation Protocols from CKKS.
IACR Cryptol. ePrint Arch., 2025

MatriGear: Accelerating Authenticated Matrix Triple Generation with Scalable Prime Fields via Optimized HE Packing.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Enhanced CKKS Bootstrapping with Generalized Polynomial Composites Approximation.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

2024
Carousel: Fully Homomorphic Encryption from Slot Blind Rotation Technique.
IACR Cryptol. ePrint Arch., 2024

Functional Bootstrapping for FV-style Cryptosystems.
IACR Cryptol. ePrint Arch., 2024

Practical Zero-Knowledge PIOP for Public Key and Ciphertext Generation in (Multi-Group) Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2024

TopGear 2.0: Accelerated Authenticated Matrix Triple Generation with Scalable Prime Fields via Optimized HE Packing.
IACR Cryptol. ePrint Arch., 2024

More Efficient Lattice-based OLE from Circuit-private Linear HE with Polynomial Overhead.
IACR Cryptol. ePrint Arch., 2024

Security Guidelines for Implementing Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2024

Ring-LWE based encrypted controller with unlimited number of recursive multiplications and effect of error growth.
CoRR, 2024

Security Guidelines for Implementing Homomorphic Encryption.
IACR Commun. Cryptol., 2024

Towards Practical Multi-key TFHE: Parallelizable, Key-Compatible, Quasi-linear Complexity.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

Concretely Efficient Lattice-Based Polynomial Commitment from Standard Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Simpler and Faster BFV Bootstrapping for Arbitrary Plaintext Modulus from CKKS.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

A General Framework of Homomorphic Encryption for Multiple Parties with Non-interactive Key-Aggregation.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Efficient Lattice-based Sublinear Arguments for R1CS without Aborts.
IACR Cryptol. ePrint Arch., 2023

Optimizing HE operations via Level-aware Key-switching Framework.
Proceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2023

Accelerating HE Operations from Key Decomposition Technique.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Toward Practical Lattice-Based Proof of Knowledge from Hint-MLWE.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Faster TFHE Bootstrapping with Block Binary Keys.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: A Survey.
ACM Comput. Surv., 2022

Comparison of encrypted control approaches and tutorial on dynamic systems using LWE-based homomorphic encryption.
CoRR, 2022

Comparison of encrypted control approaches and tutorial on dynamic systems using Learning With Errors-based homomorphic encryption.
Annu. Rev. Control., 2022

2021
Editor's Preface for the Second Annual MathCrypt Proceedings Volume.
J. Math. Cryptol., 2021

A Unified Framework of Homomorphic Encryption for Multiple Parties with Non-Interactive Setup.
IACR Cryptol. ePrint Arch., 2021

Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts.
Proceedings of the Applied Cryptography and Network Security, 2021

Lattice-Based Secure Biometric Authentication for Hamming Distance.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
On the Concrete Security of LWE with Small Secret.
IACR Cryptol. ePrint Arch., 2020

Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey.
CoRR, 2020

Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
SecureLR: Secure Logistic Regression Model via a Hybrid Cryptographic Protocol.
IEEE ACM Trans. Comput. Biol. Bioinform., 2019

Semi-parallel Logistic Regression for GWAS on Encrypted Data.
IACR Cryptol. ePrint Arch., 2019

Multi-Key Homomophic Encryption from TFHE.
IACR Cryptol. ePrint Arch., 2019

Improved Bootstrapping for Approximate Homomorphic Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Multi-Key Homomorphic Encryption from TFHE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Instant Privacy-Preserving Biometric Authentication for Hamming Distance.
IACR Cryptol. ePrint Arch., 2018

Logistic Regression Model Training based on the Approximate Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2018

Secure Logistic Regression based on Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2018

Ensemble Method for Privacy-Preserving Logistic Regression Based on Homomorphic Encryption.
IEEE Access, 2018

Toward a Secure Drone System: Flying With Real-Time Homomorphic Authenticated Encryption.
IEEE Access, 2018

Lizard: Cut Off the Tail! A Practical Post-quantum Public-Key Encryption from LWE and LWR.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

A Full RNS Variant of Approximate Homomorphic Encryption.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

Approximate Homomorphic Encryption over the Conjugate-Invariant Ring.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

Bootstrapping for Approximate Homomorphic Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Secure Outsourced Matrix Computation and Application to Neural Networks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Secure Searching of Biomarkers Using Hybrid Homomorphic Encryption Scheme.
IACR Cryptol. ePrint Arch., 2017

Homomorphic Encryption for Arithmetic of Approximate Numbers.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Floating-Point Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2016

2013
A Group Action on ℤ<sub>p</sub><sup>˟</sup> and the Generalized DLP with Auxiliary Inputs.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013


  Loading...