Author

Mi-Ran Kim

Hanyang University - Cited by 3,686 - Cryptography

Biography

Dr. Mi-Ran Kim is currently working at Pathology Department. Mi-Ran Kim is research interests includes Pathology in Human turbinate. Mi-Ran Kim serving as an editorial member and reviewer of several international reputed journals. Mi-Ran Kim has successfully completed his Administrative responsibilities. Mi-Ran Kim has authored of many research articles/books related to Medicine.
Title
Cited by
Year
Homomorphic encryption for arithmetic of approximate numbers
JH Cheon, A Kim, M Kim, Y SongAdvances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017201
2017
Bootstrapping for Approximate Homomorphic Encryption
JH Cheon, K Han, A Kim, M Kim, Y SongAdvances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018201
247
2018
Secure logistic regression based on homomorphic encryption: design and evaluation
M Kim, Y Song, S Wang, Y Xia, X JiangJMIR medical informatics, 2018201
239
2018
Secure outsourced matrix computation and application to neural networks
X Jiang, M Kim, K Lauter, Y SongProceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018201
235
2018
A full rns variant of approximate homomorphic encryption
JH Cheon, K Han, A Kim, M Kim, Y SongInternational Conference on Selected Areas in Cryptography. Springer, 2018201
193
2018
Logistic regression model training based on the approximate homomorphic encryption
A Kim, Y Song, M Kim, K Lee, JH CheonBMC medical genomics, 2018201
182
2018
Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference
H Chen, W Dai, M Kim, Y SongProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019201
178
2019
Homomorphic computation of edit distance
JH Cheon, M Kim, K LauterFinancial Cryptography and Data Security: FC 2015 International Workshops …, 2015201
163
2015
Private genome analysis through homomorphic encryption
M Kim, K LauterBMC medical informatics and decision making 15 (5), S3, 2015201
152
2015
HEALER: homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS
S Wang, Y Zhang, W Dai, K Lauter, M Kim, Y Tang, H Xiong, X JiangBioinformatics 32 (2), 211-218, 2016201
131
2016
Encrypting controller using fully homomorphic encryption for security of cyber-physical systems
J Kim, C Lee, H Shim, JH Cheon, A Kim, M Kim, Y SongIFAC-PapersOnLine 49 (22), 175-180, 2016201
130
2016
Search-and-compute on encrypted data
JH Cheon, M Kim, M KimFinancial Cryptography and Data Security: FC 2015 International Workshops …, 2015201
71
2015
Optimized search-and-compute circuits and their application to query evaluation on encrypted data
JH Cheon, M Kim, M KimIEEE Transactions on Information Forensics and Security 11 (1), 188-199, 2015201
66
2015
Ultrafast homomorphic encryption models enable secure outsourcing of genotype imputation
M Kim, AO Harmanci, JP Bossuat, S Carpov, JH Cheon, I Chillotti, W Cho, ...Cell systems 12 (11), 1108-1120. e4, 202153202
53
2021
Secure and differentially private logistic regression for horizontally distributed data
M Kim, J Lee, L Ohno-Machado, X JiangIEEE Transactions on Information Forensics and Security 15, 695-710, 2019201
51
2019
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning
H Chen, M Kim, I Razenshteyn, D Rotaru, Y Song, S WaghAdvances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020202
44
2020
Semi-parallel logistic regression for GWAS on encrypted data
M Kim, Y Song, B Li, D MicciancioBMC Medical Genomics 13, 1-13, 2020202
44
2020
Efficient homomorphic conversion between (ring) LWE ciphertexts
H Chen, W Dai, M Kim, Y SongInternational Conference on Applied Cryptography and Network Security, 460-479, 2021202
42
2021
SCOR: A secure international informatics infrastructure to investigate COVID-19
JL Raisaro, F Marino, J Troncoso-Pastoriza, R Beau-Lejdstrom, R Bellazzi, ...Journal of the American Medical Informatics Association 27 (11), 1721-1726, 2020202
37
2020
SecureLR: Secure logistic regression model via a hybrid cryptographic protocol
Y Jiang, J Hamer, C Wang, X Jiang, M Kim, Y Song, Y Xia, N Mohammed, ...IEEE/ACM transactions on computational biology and bioinformatics 16 (1 …, 2018201
33
2018