Author pages are created from data sourced from our academic publisher partnerships and public sources.

- Publications
- Influence

Molecular MIMO: From Theory to Prototype

- Bonhong Koo, C. Lee, Huseyin Birkan Yilmaz, Nariman Farsad, A. Eckford, Chan-Byoung Chae
- Computer Science
- IEEE Journal on Selected Areas in Communications
- 3 February 2016

In diffusion-based molecular communication, information transport is governed by diffusion through a fluid medium. The achievable data rates for these channels are very low compared to the… Expand

Cryptanalysis of the Multilinear Map over the Integers

- J. H. Cheon, Kyoohyung Han, C. Lee, Hansol Ryu, D. Stehlé
- Computer Science
- EUROCRYPT
- 2014

We describe a polynomial-time cryptanalysis of the (approximate) multilinear map of Coron, Lepoint and Tibouchi (CLT). The attack relies on an adaptation of the so-called zeroizing attack against the… Expand

Securing smart home: Technologies, security challenges, and security requirements

- C. Lee, Luca Zappaterra, Kwanghee Choi, Hyeong-Ah Choi
- Computer Science
- IEEE Conference on Communications and Network…
- 29 December 2014

Smart homes are gaining vast popularity as the most promising application of the emerging Internet of Things (IoT) technology. Exploiting the high level of connectivity present in current electronic… Expand

An Algorithm for NTRU Problems and Cryptanalysis of the GGH Multilinear Map without an encoding of zero

- J. H. Cheon, Jinhyuck Jeong, C. Lee
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2016

Let h and g be polynomials of bounded Euclidean norm in the ring Z[X]/⟨X+1⟩. Given polynomial [h/g]q ∈ Zq[X]/⟨X+1⟩, the NTRU problem is to find a, b ∈ Z[X]/⟨X + 1⟩ with small Euclidean norm such that… Expand

Boosting CUDA Applications with CPU–GPU Hybrid Computing

- C. Lee, W. Ro, J. Gaudiot
- Computer Science
- International Journal of Parallel Programming
- 1 April 2014

This paper presents a cooperative heterogeneous computing framework which enables the efficient utilization of available computing resources of host CPU cores for CUDA kernels, which are designed to… Expand

Cryptanalysis of the New CLT Multilinear Map over the Integers

- J. H. Cheon, Pierre-Alain Fouque, C. Lee, B. Minaud, Hansol Ryu
- Computer Science
- EUROCRYPT
- 8 May 2016

Multilinear maps serve as a basis for a wide range of cryptographic applications. The first candidate construction of multilinear maps was proposed by Garg, Gentry, and Halevi in 2013, and soon… Expand

An algorithm for NTRU problems and cryptanalysis of the GGH multilinear map without a low-level encoding of zero

- J. H. Cheon, Jinhyuck Jeong, C. Lee
- Mathematics
- 2016

Let f and g be polynomials of a bounded Euclidean norm in the ring Z[X]/⟨X+1⟩. Given the polynomial [f/g]q ∈ Zq[X]/⟨X+1⟩, the NTRU problem is to find a, b ∈ Z[X]/⟨X + 1⟩ with a small Euclidean norm… Expand

Atomically Thin Transition-Metal Dinitrides: High-Temperature Ferromagnetism and Half-Metallicity.

- F. Wu, Chengxi Huang, +4 authors P. Jena
- Materials Science, Medicine
- Nano letters
- 19 November 2015

High-temperature ferromagnetic two-dimensional (2D) materials with flat surfaces have been a long-sought goal due to their potential in spintronics applications. Through comprehensive… Expand

An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes

- Taek-Young Youn, C. Lee, Y. Park
- Computer Science
- Comput. Commun.
- 1 March 2011

Deniable authentication scheme is one of useful tools for secure communications. The scheme allows a sender to prove the authenticity of a message to a specified receiver without permitting the… Expand

A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE

- J. H. Cheon, Kyoohyung Han, J. Kim, C. Lee, Yongha Son
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2016

The Learning with Errors (LWE) problem has been widely used as a hardness assumption to construct public-key primitives. In this paper, we propose an efficient instantiation of a PKE scheme based on… Expand