Chongwon Cho
Chongwon Cho
Stealth Software Technologies Inc.
Zweryfikowany adres z
Cytowane przez
Cytowane przez
Laconic Oblivious Transfer and its Applications
C Cho, N Döttling, S Garg, D Gupta, P Miao, A Polychroniadou
Efficient, Reusable Fuzzy Extractors from LWE
D Apon, C Cho, K Eldefrawy, J Katz
International Symposium on Cyber Security Cryptography and Machine Learning …, 2017
Simultaneously resettable arguments of knowledge
C Cho, R Ostrovsky, A Scafuro, I Visconti
Theory of Cryptography Conference, 530-547, 2012
Efficient concurrent covert computation of string equality and set intersection
C Cho, D Dachman-Soled, S Jarecki
Cryptographers’ Track at the RSA Conference, 164-179, 2016
Equivalence of Uniform Key Agreement and Composition Insecurity.
C Cho, CK Lee, R Ostrovsky
CRYPTO 2010, 447-464, 2010
Privacy-preserving multi-client and cloud computation with application to secure navigation
C Cho, K El Defrawy, HTJ Kim, JD Lampkins
US Patent 10,528,760, 2020
One-time obfuscation for polynomial-size ordered binary decision diagrams (POBDDs)
C Cho, K El Defrawy
US Patent 10,509,918, 2019
Practical reusable fuzzy extractor based on the learning-with-error assumption and random oracle
C Cho, K El Defrawy, DC Apon, J Katz
US Patent App. 15/976,583, 2019
Anonymous allocation and majority voting in a compromised environment
JW Baron, K El Defrawy, A Nogin, C Cho
US Patent 10,887,092, 2021
Reusable fuzzy vault system
C Cho, C Ding
US Patent 10,826,686, 2020
Reusable fuzzy extractor based on the learning-with-error assumption secure against quantum attacks
C Cho, K El Defrawy, DC Apon, J Katz
US Patent 10,778,423, 2020
Cross-Domain Secure Computation.
C Cho, S Garg, R Ostrovsky
Public Key Cryptography (PKC) 2014, 650-668, 2014
Constant-round protocols of stronger security via relaxed set-up assumptions
C Cho
UCLA, 2013
Rafail Ostrovsky-Publications
C Cho
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–14