Duc-Phong Le
Duc-Phong Le
Fintech Technical Researcher (Cryptographer), Bank of Canada
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
BIFF: A blockchain-based IoT forensics framework with identity privacy
DP Le, H Meng, L Su, SL Yeo, V Thing
TENCON 2018-2018 IEEE region 10 conference, 2372-2377, 2018
Multisignatures as secure as the Diffie-Hellman problem in the plain public-key model
DP Le, A Bonnecaze, A Gabillon
International Conference on Pairing-Based Cryptography, 35-51, 2009
A variant of miller’s formula and algorithm
J Boxall, N El Mrabet, F Laguillaumie, DP Le
Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010
A review of blockchain in fintech: taxonomy, challenges, and future directions
K Nelaturu, H Du, DP Le
Cryptography 6 (2), 18, 2022
Speeding up Ate Pairing Computation in Affine Coordinates
DP Le, CH Tan
The 15th international conference on Information Security and Cryptology …, 2012
Randomizing the montgomery powering ladder
DP Le, CH Tan, M Tunstall
Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015
Algebraic differential fault analysis on simon block cipher
DP Le, SL Yeo, K Khoo
IEEE Transactions on Computers 68 (11), 1561-1572, 2019
Fast point quadrupling on elliptic curves
DP Le, BP Nguyen
Proceedings of the 3rd Symposium on Information and Communication Technology …, 2012
A new multisignature scheme with public key aggregation for blockchain
DP Le, G Yang, A Ghorbani
2019 17th International Conference on Privacy, Security and Trust (PST), 1-7, 2019
On Double Exponentiation for Securing RSA against Fault Analysis
DP Le, M Rivain, CH Tan
CT-RSA 2014, 152--168, 2014
Signtiming scheme based on aggregate signature
DP Le, A Bonnecaze, A Gabillon
2008 IEEE International Conference on Intelligence and Security Informatics …, 2008
Improved Miller’s algorithm for computing pairings on Edwards curves
DP Le, CH Tan
IEEE Transactions on Computers 63 (10), 2626-2632, 2013
Refinements of Miller's algorithm over Weierstrass curves revisited
DP Le, CL Liu
The Computer Journal 54 (10), 1582-1591, 2011
Improved algebraic attacks on lightweight block ciphers
SL Yeo, DP Le, K Khoo
Journal of Cryptographic Engineering 11, 1-19, 2021
Improved fault analysis on SIMECK ciphers
DP Le, R Lu, AA Ghorbani
Journal of Cryptographic Engineering 12 (2), 169-180, 2022
On near prime-order elliptic curves with small embedding degrees
DP Le, N El Mrabet, CH Tan
International Conference on Algebraic Informatics, 140-151, 2015
A new multisignature scheme based on strong Diffie-Hellman assumption
DP Le, A Gabillon
Proceedings of the third International Conference on Pairing-based …, 2009
Breaking an ID-based encryption based on discrete logarithm and factorization problems
CH Tan, TF Prabowo, DP Le
Information Processing Letters 116 (2), 116-119, 2016
A secure round-based timestamping scheme with absolute timestamps (short paper)
DP Le, A Bonnecaze, A Gabillon
International Conference on Information Systems Security, 116-123, 2008
Data breach: analysis, countermeasures and challenges
X Zhang, MM Yadollahi, S Dadkhah, H Isah, DP Le, AA Ghorbani
International Journal of Information and Computer Security 19 (3-4), 402-442, 2022
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20