Folgen
Duc-Phong Le
Duc-Phong Le
Fintech Technical Researcher (Cryptographer), Bank of Canada
Bestätigte E-Mail-Adresse bei bankofcanada.ca - Startseite
Titel
Zitiert von
Zitiert von
Jahr
BIFF: A blockchain-based IoT forensics framework with identity privacy
DP Le, H Meng, L Su, SL Yeo, V Thing
TENCON 2018-2018 IEEE region 10 conference, 2372-2377, 2018
742018
Multisignatures as secure as the Diffie-Hellman problem in the plain public-key model
DP Le, A Bonnecaze, A Gabillon
International Conference on Pairing-Based Cryptography, 35-51, 2009
262009
A variant of miller’s formula and algorithm
J Boxall, N El Mrabet, F Laguillaumie, DP Le
Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010
252010
A review of blockchain in fintech: taxonomy, challenges, and future directions
K Nelaturu, H Du, DP Le
Cryptography 6 (2), 18, 2022
232022
Speeding up Ate Pairing Computation in Affine Coordinates
DP Le, CH Tan
The 15th international conference on Information Security and Cryptology …, 2012
172012
Randomizing the montgomery powering ladder
DP Le, CH Tan, M Tunstall
Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015
162015
Algebraic differential fault analysis on simon block cipher
DP Le, SL Yeo, K Khoo
IEEE Transactions on Computers 68 (11), 1561-1572, 2019
152019
Fast point quadrupling on elliptic curves
DP Le, BP Nguyen
Proceedings of the 3rd Symposium on Information and Communication Technology …, 2012
15*2012
A new multisignature scheme with public key aggregation for blockchain
DP Le, G Yang, A Ghorbani
2019 17th International Conference on Privacy, Security and Trust (PST), 1-7, 2019
14*2019
On Double Exponentiation for Securing RSA against Fault Analysis
DP Le, M Rivain, CH Tan
CT-RSA 2014, 152--168, 2014
122014
Signtiming scheme based on aggregate signature
DP Le, A Bonnecaze, A Gabillon
2008 IEEE International Conference on Intelligence and Security Informatics …, 2008
102008
Improved Miller’s algorithm for computing pairings on Edwards curves
DP Le, CH Tan
IEEE Transactions on Computers 63 (10), 2626-2632, 2013
92013
Refinements of Miller's algorithm over Weierstrass curves revisited
DP Le, CL Liu
The Computer Journal 54 (10), 1582-1591, 2011
92011
Improved algebraic attacks on lightweight block ciphers
SL Yeo, DP Le, K Khoo
Journal of Cryptographic Engineering 11, 1-19, 2021
82021
Improved fault analysis on SIMECK ciphers
DP Le, R Lu, AA Ghorbani
Journal of Cryptographic Engineering 12 (2), 169-180, 2022
72022
On near prime-order elliptic curves with small embedding degrees
DP Le, N El Mrabet, CH Tan
International Conference on Algebraic Informatics, 140-151, 2015
72015
A new multisignature scheme based on strong Diffie-Hellman assumption
DP Le, A Gabillon
Proceedings of the third International Conference on Pairing-based …, 2009
62009
Breaking an ID-based encryption based on discrete logarithm and factorization problems
CH Tan, TF Prabowo, DP Le
Information Processing Letters 116 (2), 116-119, 2016
52016
A secure round-based timestamping scheme with absolute timestamps (short paper)
DP Le, A Bonnecaze, A Gabillon
International Conference on Information Systems Security, 116-123, 2008
52008
Data breach: analysis, countermeasures and challenges
X Zhang, MM Yadollahi, S Dadkhah, H Isah, DP Le, AA Ghorbani
International Journal of Information and Computer Security 19 (3-4), 402-442, 2022
32022
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20