Follow
Wonseok Choi
Wonseok Choi
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
Masta: an HE-friendly cipher using modular arithmetic
J Ha, S Kim, W Choi, J Lee, D Moon, H Yoon, J Cho
IEEE Access 8, 194741-194751, 2020
252020
Indifferentiability of truncated random permutations
W Choi, BH Lee, J Lee
International Conference on the Theory and Application of Cryptology and …, 2019
182019
Improved security analysis for nonce-based enhanced hash-then-mask MACs
W Choi, BH Lee, Y Lee, J Lee
International Conference on the Theory and Application of Cryptology and …, 2020
142020
Toward a fully secure authenticated encryption scheme from a pseudorandom permutation
W Choi, B Lee, J Lee, Y Lee
International Conference on the Theory and Application of Cryptology and …, 2021
112021
Multi-user security of the sum of truncated random permutations
W Choi, H Kim, J Lee, Y Lee
International Conference on the Theory and Application of Cryptology and …, 2022
42022
Building PRFs from TPRPs: beyond the block and the tweak length bounds
W Choi, J Lee, Y Lee
Cryptology ePrint Archive, 2022
22022
Improved Multi-user Security Using the Squared-Ratio Method
YL Chen, W Choi, C Lee
Annual International Cryptology Conference, 694-724, 2023
12023
Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers
W Choi, A Inoue, B Lee, J Lee, E List, K Minematsu, Y Naito
IACR Transactions on Symmetric Cryptology, 39-70, 2020
12020
Apparatus and method for encryption, apparatus and method for converting ciphertext
WSC Joo Hee Lee, Duk Jae Moon, Hyo Jin Yoon, Ji Hoon Cho, Eun Kyung Kim ...
US Patent 11,558,171, 2023
2023
Blockchain Governance via Sharp Anonymous Multisignatures
W Choi, X Liu, V Zikas
Cryptology ePrint Archive, 2023
2023
On Overidealizing Ideal Worlds: Xor of Two Permutations and its Applications
W Choi, M Hhan, Y Wei, V Zikas
Cryptology ePrint Archive, 2023
2023
Multi-User Security of the Sum of Truncated Random Permutations (Full Version)
W Choi, H Kim, J Lee, Y Lee
Cryptology ePrint Archive, 2022
2022
Study on building pseudorandom functions from cryptographic primitives
WS Choi
한국과학기술원, 2022
2022
Toward a Fully Secure Authenticated Encryption Scheme From a Pseudorandom Permutation (Full Version)
W Choi, B Lee, J Lee, Y Lee
Cryptology ePrint Archive, 2021
2021
Security of truncated random permutations
W Choi
한국과학기술원, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–15