Chongwon Cho
Title
Cited by
Cited by
Year
Laconic Oblivious Transfer and its Applications
C Cho, N Döttling, S Garg, D Gupta, P Miao, A Polychroniadou
412017
Efficient, Reusable Fuzzy Extractors from LWE
D Apon, C Cho, K Eldefrawy, J Katz
International Symposium on Cyber Security Cryptography and Machine Learning …, 2017
302017
Simultaneously resettable arguments of knowledge
C Cho, R Ostrovsky, A Scafuro, I Visconti
Theory of Cryptography Conference, 530-547, 2012
222012
Efficient concurrent covert computation of string equality and set intersection
C Cho, D Dachman-Soled, S Jarecki
Cryptographers’ Track at the RSA Conference, 164-179, 2016
122016
Equivalence of Uniform Key Agreement and Composition Insecurity.
C Cho, CK Lee, R Ostrovsky
CRYPTO 2010, 447-464, 2010
92010
Reusable fuzzy extractor based on the learning-with-error assumption secure against quantum attacks
C Cho, K El Defrawy, DC Apon, J Katz
US Patent 10,778,423, 2020
12020
Privacy-preserving multi-client and cloud computation with application to secure navigation
C Cho, K El Defrawy, HTJ Kim, JD Lampkins
US Patent 10,528,760, 2020
12020
Practical reusable fuzzy extractor based on the learning-with-error assumption and random oracle
C Cho, K El Defrawy, DC Apon, J Katz
US Patent App. 15/976,583, 2019
12019
Reusable fuzzy vault system
C Cho, C Ding
US Patent 10,826,686, 2020
2020
Anonymous allocation and majority voting in a compromised environment
JW Baron, K El Defrawy, A Nogin, C Cho
US Patent App. 16/433,928, 2020
2020
One-time obfuscation for polynomial-size ordered binary decision diagrams (POBDDs)
C Cho, K El Defrawy
US Patent 10,509,918, 2019
2019
Cross-Domain Secure Computation.
C Cho, S Garg, R Ostrovsky
Public Key Cryptography (PKC) 2014, 650-668, 2014
2014
Constant-round protocols of stronger security via relaxed set-up assumptions
C Cho
UCLA, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–13