Kyeongtae Lee, Donghwan Oh, Hankyung Ko, Jihye Kim, Hyunok Oh: Hadamard Product Arguments and Their Applications. IEEE Access (2025)
Seunghwa Lee, Hankyung Ko, Jihye Kim, Hyunok Oh: vCNN: Verifiable Convolutional Neural Network. IEEE Transactions on Dependable and Secure Computing (2024)
Daehyeon Lee, Ohsuk Shin, Yeonghyeon Cha, Junghee Lee, Taisic Yun, Jihye Kim, Hyunok Oh, Chrysostomos Nicopoulos, Sang Su Lee: A Hardware-Based Correct Execution Environment Supporting Virtual Memory. IEEE Access 12: 114008-114022 (2024)
Gweonho Jeong, Nuri Lee, Jihye Kim, Hyunok Oh: Azeroth: Auditable Zero-Knowledge Transactions in Smart Contracts. IEEE Access 11: 56463-56480 (2023)
Jeonghyuk Lee, Jihye Kim, Hyunok Oh: Forward-Secure Multi-User Aggregate Signatures Based on zk-SNARKs. IEEE Access 9: 97705-97717 (2021)
Jihye Kim, Jiwon Lee, Hyunok Oh: Simulation-Extractable zk-SNARK With a Single Verification. IEEE Access 8: 156569-156581 (2020)
Lee, J.; Lee, S.; Kim, J.; Oh, H. Scalable Wildcarded Identity-Based Encryption with Full Security. Electronics 2020, 9, 1453.
Jiwon Lee, Jihye Kim, Hyunok Oh. 2020. "BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipment." Electronics. 2020; 9, no. 9: 1389.
Haywood Dadzie T, Lee J, Kim J, Oh H. NVM-Shelf: Secure Hybrid Encryption with Less Flip for Non-Volatile Memory. Electronics. 2020; 9(8):1304
Jiwon Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh : Combinatorial Subset Difference - IoT-Friendly Subset Representation and Broadcast Encryption. Sensors 20(11): 3140 (2020)
Jihye Kim, Jiwon Lee, Hankyung Ko, Donghwan Oh, Semin Han, Gwonho Jeong, Hyunok Oh, "AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems", ACM Trans. Embedded Comput. Syst. 18(5s), 62:1-62:19, 2019
Jihye Kim, Hyunok Oh, "FAS: Forward Secure Sequential Aggregate Signatures for Secure Logging", Volume 471, Pages 115-131, Information Sciences, January 2019
Jihye Kim, Hyunok Oh, "FAS: Forward Secure Sequential Aggregate Signatures for Secure Logging", Information Sciences, 2018, https://doi.org/10.1016/j.ins.2018.08.044
Hyunok Oh, Jihye Kim, and Jisun Shin, "Forward-Secure ID based Digital Signature Scheme with Forward-Secure Private Key Generator", Volumes 454–455, Pages 96-109, Information Sciences, July 2018 https://doi.org/10.1016/j.ins.2018.04.049
Hyunok Oh and Jihye Kim, "An Efficient Non-Linear Cost Compression Algorithm for Multi Level Cell Memory", IEEE Transactions on Computers, Volume 63, Issue 4, Page 820-832, April 2014.
Hyunok Oh and Jihye Kim, "Design Space Exploration using Answer Set Programming", Information-an international interdisciplinary journal, International Information Institute, vol 16, no 9(B), pp 7219-7227, Sep., 2013
Hyunok Oh and Jihye Kim, "Minimization of Both Buffer Memory Size and Buffer Memory Management Overhead for A Synchronous Dataflow Graph", Information-an international interdisciplinary journal, International Information Institute, vol 16, no 9(B), pp 7235-7247, Sep., 2013.
Jeongdae Hong, Jung Woo Kim, Jihye Kim, Kunsoo Park, Jung Hee Cheon, "Constant-Round Privacy Preserving Multiset Union", Bulletin of the Korean Mathematical Society, Volume 50, Issue 6, 2013, pp.1799-1816
Myungsun Kim, Jihye Kim, and Jung Hee Cheon, “Compress Multiple Ciphertexts using ElGamal Encryption Schemes”, Journal of the Korean Mathematical Society, 50, No. 2, pp.361-377, June 2013
Sungwook Kim, Jihye Kim and Jung Hee Cheon, Seong-ho Ju, “Threshold Signature Schemes for ElGamal Variants”, Computer Standards & Interfaces, Volume 33, Issue 4, 432-437, June 2011.
Stanislaw. Jarecki, Jihye Kim*, and Gene Tsudik, “Flexible Robust Group Key Agreement”, IEEE Transactions on Parallel and Distributed Systems, Volume 22, Issue 5, 879-886, May, 2011.
Emiliano De Cristofaro and Jihye Kim*, “Some like it private: sharing confidential information based on oblivious authorization”, IEEE Security and Privacy, Volume 8, Number 4, 18-24, August, 2010.
Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, and Kunsoo Park, “Fair Threshold Decryption with Semi-Trusted Third Parties”, International Journal of Cryptography, Volume 2, Number 2, 2010
Jihye Kim, and Gene Tsudik, “SRDP: Secure Route Discovery for Dynamic Source Routing in MANETs”, Ad Hoc Networks, Volume 7, Issue 6, pp 1097-1109, August, 2009.
Claud Castelluccia, Stanislaw Jarecki, Jihye Kim, and Gene Tsudik, “Secure Acknowledgement Aggregation and Multi-signatures with Limited Robustness”, Computer Networks, Special Issue on Algorithms for Distributed Systems, Volume 50, Number 10, July 2006, pp. 1639-1652.
Semin Han, Geonho Yoon, Hyunok Oh, Jihye Kim: DUPLEX: Scalable Zero-Knowledge Lookup Arguments over RSA Group. AsiaCCS 2025
Jongho Kim, Junhee Lee, Hyunok Oh, Jihye Kim: zkLogis: Scalable, Privacy-Enhanced, and Traceable Logistics on Public Blockchain. AsiaCCS 2024
Jiwon Lee, Jaekyoung Choi, Jihye Kim, Hyunok Oh: SAVER: SNARK-comparible Verifiable Encryption. Financial Cryptography 2024
Sungwook Kim, Seongju Kim, Yurim Shin, Sunmi Kim, Jihye Kim, Hyunok Oh: Efficient Transparent Polynomial Commitments for zk-SNARKs. ESORICS 2023
Hankyung Ko, Ingeun Lee, Seunghwa Lee, Jihye Kim, Hyunok Oh: Efficient Verifiable Image Redacting based on zk-SNARKs. AsiaCCS 2021: 213-226
Hankyung Ko, Gweonho Jeong, Jongho Kim, Jihye Kim and Hyunok Oh, "Forward Secure Identity-based Signature Scheme with RSA", the 34th IFIP International Information Security and Privacy Conference (IFIP SEC 2019), Lisbon, Portugal, June 25-27, 2019
Jihye Kim, Hankyung Ko, Hyunok Oh, "AILocker: Authenticated Image Locker for Video", The 34th ACM/SIGAPP Symposium On Applied Computing (SAC), Limassol, Cyprus, April 8-12, 2019
Thomas Ekow Haywood-Dadzie, Jihye Kim, Hyunok Oh, "Secure Non-volatile Memory with Scratch Pad Memory using Dual Encryption Mode," International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS), Torino, Italy, Sep. 30- Oct. 2 2018 (WIP)
Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh, "Scalable Wildcarded Identity-Based Encryption," The 23rd European Symposium on Research in Computer Security (ESORICS), Barcelona, Spain, September 3-7 2018
Jihye Kim, Seunghwa Lee, Jiwon Lee, Hyunok Oh, "Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast," The 33rd ACM/SIGAPP Symposium On Applied Computing (SAC), Pau, France, April 9 - 13, 2018
Jihye Kim, Seunghwa Lee, Jungjun Yoon, Hankyung Ko, Seungri Kim, Hyunok Oh, "PASS: Privacy Aware Secure Signature Scheme for Surveillance Systems," 14th IEEE International Conference on Advanced Video and Signal based Surveillance (AVSS), Aug 29, 2017 - Sep 1 , 2017, Lecce, Italia
Jihye Kim, Hyunok Oh, "Forward-Secure Digital Signature Schemes with Optimal Computation and Storage of Signers", the 32nd IFIP International Information Security and Privacy Conference (IFIP SEC 2017), Rome, Italy, May 2017
Jihye Kim, Wonwoo Yang, Seunghwa Lee, Wonjoon Hwang, "Mediated aggregate signature schemes in wireless sensor networks", SECON Workshops 2015: 7-12
Myungsun Kim and Jihye Kim*, “Privacy-preserving Web Search”, International Conference on Ubiquitous and Future Networks, July, 2012.
Emiliano Cristofaro, Jihye Kim*, and Gene Tsudik, “Linear-Complexity Private Set Intersection Protocols”, Asiacrypt, December, 2010.
Emiliano Cristofaro, Stanislaw Jarecki, Jihye Kim*, and Gene Tsudik, “Privacy-preserving Policy-based Information Transfer”, The 9th Privacy Enhancing Technologies Symposium (PET), August, 2009.
Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, and Kunsoo Park, “Fair Threshold Decryption with Semi-Trusted Third Parties”, Australasian Conference on Information Security and Privacy (ACISP), July, 2009.
Jihye Kim, and Gene Tsudik, “Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks”, International Conference on Information Security and Cryptology (ICISC), 2008.
Stanislaw Jarecki, Jihye Kim*, and Gene Tsudik, “Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange”, RSA Conference, Cryptographers’ Track (CT-RSA), 2008.
Stanislaw Jarecki, Jihye Kim*, and Gene Tsudik, “Authenticated Group Agreement Protocols with a Privacy Property of Affiliation-Hiding”, RSA Conference, Cryptographers’ Track (CT-RSA), 2007.
Stanislaw Jarecki, Jihye Kim*, and Gene Tsudik, “Robust Group Key Agreement using Short Broadcasts”, 14th ACM Conference on Computer and Communications Security (CCS), 2007.
Stanislaw Jarecki, Jihye Kim*, and Gene Tsudik, “Authentication for Paranoids: Group Secret Handshakes”, Lecture Notes on Computer Science, 2006.
Jihye Kim, and Gene Tsudik, “SRDP: Securing Route Discovery in DSR”, 2nd International Conference on Mobile and Ubiquitous Systems: Networking and Services (Mobiquitous), 2005
Claud Castelluccia, Stanislaw Jarecki, Jihye Kim, and Gene Tsudik, “A Robust Multi-signature Scheme with Applications to Multicast Acknowledgement Aggregation”, Lecture Notes on Computer Science, 2004.
윤정준, 이정혁, 김지혜, 오현옥, "보안 하드웨어 연산 최소화를 통한 효율적인 속성 기반 전자서명 구현", 정보과학회논문지 44(4), 344-351, 2017.4
양원우, 김지혜, "Androfilter: 유효마켓데이터를 이용한 안드로이드 악성코드 필터", 정보보호학회논문지 25(6), 1341-1351, 2015.12
이정혁, 김예지, 조수연, 오현옥, 김지혜, "전방향 안전서명을 사용하는 빠른 블록체인", 한국정보과학회 하계학술대회, 2018 (한국컴퓨터종합학술대회 우수논문상)
최재경, 이인근, 김종호, 이승화, 김지혜, 오현옥, "검증 가능한 계산을 위한 zk-SNARK에 대한 분석", 한국정보과학회 하계학술대회, 2018
오동환, 한세민, 정권호, 오현옥, 김지혜, "신원 기반 서명을 활용한 ECU 펌웨어 폐기 기법", 한국정보과학회 하계학술대회, 2018
김승리, 이정혁, 구슬예, 오현옥, 김지혜, "블록체인 기반 에너지 거래 모델 연구", 한국정보보호학회 동계학술대회, 2018
윤정준, 김지혜, 오현옥, "블록체인 기술 동향 및 응용", 한국정보보호학회 하계학술대회, 2017
이정혁, 김지혜, 오현옥, "이더리움의 분석 및 응용기법", 한국정보보호학회 하계학술대회, 2017
김승리, 김지혜, 오현옥, 이승화, "전자 암호 화폐의 프라이버시 이슈와 동향", 한국정보보호학회 하계학술대회, 2017
윤정준, 이정혁, 김지혜, 오현옥, "최소 보안 연산을 가지는 전방향 보안 전자서명", 한국정보과학회 2016 한국컴퓨터종합학술대회, 제주 ICC, 2016년 6월 29일~ 7월 1일. (2016 한국컴퓨터종합학술대회 우수논문상)
오현옥, 김지혜, 이지원, 이승화 : 와일드 카드를 포함하는 키 발급, 암호화 및 복호화 방법, 출원번호 10-2017-0044716, 출원일 2017.04.06
오현옥, 김지혜, "부분집합 차 기반 브로드캐스트 암호화 및 복호화 방법, 출원일 2017.03.28, 출원번호 10-2017-0039279,
김지혜, 오현옥, "시큐어로깅을 위한 포워드시큐어 압축 서명 장치 및 방법", 등록일 2017.02.01, 등록번호 10-1703880
오현옥 : 최소 보안 연산을 가지는 포워드 시큐어 전자 서명 시스템 및 방법, 출원번호 10-2016-0110230, 출원일 2016.08.29
오현옥, 김지혜, "인증을 이용하여 보안을 강화하는 비휘발성 메모리 칩 및 이를 이용한 데이터 보안 방법", 등록일 2016.02.11, 등록번호 10-1617089