Dung Hoang Duong
Dung Hoang Duong
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
Efficient secure matrix multiplication over LWE-based homomorphic encryption
DH Duong, PK Mishra, M Yasuda
Tatra mountains mathematical publications 67 (1), 69-83, 2016
Practical post-quantum signature schemes from isomorphism problems of trilinear forms
G Tang, DH Duong, A Joux, T Plantard, Y Qiao, W Susilo
Annual International Conference on the Theory and Applications of …, 2022
Fast secure matrix multiplications over ring-based homomorphic encryption
PK Mishra, D Rathee, DH Duong, M Yasuda
Information Security Journal: A Global Perspective 30 (4), 219-234, 2021
A lattice-based public key encryption with equality test in standard model
DH Duong, K Fukushima, S Kiyomoto, PS Roy, W Susilo
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing
H Wang, Y Li, W Susilo, DH Duong, F Luo
Computer Standards & Interfaces 82, 103635, 2022
Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model
P Dutta, W Susilo, DH Duong, PS Roy
Theoretical Computer Science 871, 16-29, 2021
Lattice-based IBE with equality test in standard model
DH Duong, HQ Le, PS Roy, W Susilo
Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD …, 2019
Uniform analytic properties of representation zeta functions of finitely generated nilpotent groups
D Dung, C Voll
Transactions of the American Mathematical Society 369 (9), 6327-6349, 2017
Lattice-based HRA-secure attribute-based proxy re-encryption in standard model
W Susilo, P Dutta, DH Duong, PS Roy
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
Chosen-ciphertext secure homomorphic proxy re-encryption
F Luo, S Al-Kuwari, W Susilo, DH Duong
IEEE Transactions on Cloud Computing 10 (4), 2398-2408, 2020
From helpfulness prediction to helpful review retrieval for online product reviews
C Vo, D Duong, D Nguyen, T Cao
Proceedings of the 9th International Symposium on Information and …, 2018
Enhancement for secure multiple matrix multiplications over ring-LWE homomorphic encryption
PK Mishra, DH Duong, M Yasuda
Information Security Practice and Experience: 13th International Conference …, 2017
An efficient multivariate threshold ring signature scheme
DH Duong, HTN Tran, W Susilo
Computer Standards & Interfaces 74, 103489, 2021
Attribute-based proxy re-signature from standard lattices and its applications
F Luo, S Al-Kuwari, W Susilo, DH Duong
Computer Standards & Interfaces 75, 103499, 2021
Wildcarded Identity-Based Encryption with Constant-size Ciphertext and Secret Key.
DH Duong, W Susilo, VC Trinh
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11 (2), 74-86, 2020
Lattice-based IBE with equality test supporting flexible authorization in the standard model
GLD Nguyen, W Susilo, DH Duong, HQ Le, F Guo
Progress in Cryptology–INDOCRYPT 2020: 21st International Conference on …, 2020
Puncturable encryption: a generic construction from delegatable fully key-homomorphic encryption
W Susilo, DH Duong, HQ Le, J Pieprzyk
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
A blind signature from module latices
HQ Le, W Susilo, TX Khuc, MK Bui, DH Duong
2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019
Lattice-based signcryption with equality test in standard model
HQ Le, DH Duong, PS Roy, W Susilo, K Fukushima, S Kiyomoto
Computer Standards & Interfaces 76, 103515, 2021
Efficient post-quantum identity-based encryption with equality test
W Susilo, DH Duong, HQ Le
2020 IEEE 26th International Conference on Parallel and Distributed Systems …, 2020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20