Dung Hoang Duong

According to our database1, Dung Hoang Duong authored at least 39 papers between 2016 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Attribute-based proxy re-signature from standard lattices and its applications.
Comput. Stand. Interfaces, 2021

Lattice-based signcryption with equality test in standard model.
Comput. Stand. Interfaces, 2021

An efficient multivariate threshold ring signature scheme.
Comput. Stand. Interfaces, 2021

2020
Wildcarded Identity-Based Encryption with Constant-size Ciphertext and Secret Key.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions.
J. Internet Serv. Inf. Secur., 2020

A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme.
Inf., 2020

An Efficient MQ-based Signature with Tight Security Proof.
Int. J. Netw. Comput., 2020

Impact of the modulus switching technique on some attacks against learning problems.
IET Inf. Secur., 2020

Choosing subfields for LUOV and lifting fields for rainbow.
IET Inf. Secur., 2020

Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2020

Collusion-Resistant Identity-based Proxy Re-Encryption: Lattice-based Constructions in Standard Model.
CoRR, 2020

Lattice-based Unidirectional IBPRE Secure in Standard Model.
CoRR, 2020

Lattice-based public key encryption with equality test supporting flexible authorization in standard model.
CoRR, 2020

Lattice-based public key encryption with equality test in standard model, revisited.
CoRR, 2020

Hierarchical Identity-Based Signature in Polynomial Rings.
Comput. J., 2020

A Multivariate Blind Ring Signature Scheme.
Comput. J., 2020

Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction.
Proceedings of the Information Security Applications - 21st International Conference, 2020

Lattice-Based IBE with Equality Test Supporting Flexible Authorization in the Standard Model.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Efficient Post-quantum Identity-based Encryption with Equality Test.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model.
Proceedings of the Applied Cryptography and Network Security, 2020

Lattice Blind Signatures with Forward Security.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem EFC.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

A Blind Ring Signature Based on the Short Integer Solution Problem.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Lattice-Based IBE with Equality Test in Standard Model.
Proceedings of the Provable Security, 2019

An Efficient MQ-Based Signature in the QROM.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019

A Blind Signature from Module Latices.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

A Lattice-Based Public Key Encryption with Equality Test in Standard Model.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
An Efficient Key Generation of ZHFE Public Key Cryptosystem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2018

Solving LWR via BDD Strategy: Modulus Switching Approach.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
CyclicSRP - A Multivariate Encryption Scheme with a Partially Cyclic Public Key.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Choosing Parameters for the Subfield Lattice Attack against overstretched NTRU.
IACR Cryptol. ePrint Arch., 2017

Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption.
Proceedings of the Information Security Practice and Experience, 2017

2016
Revisiting the Efficient Key Generation of ZHFE.
IACR Cryptol. ePrint Arch., 2016

Revisiting the Cubic UOV Signature Scheme.
IACR Cryptol. ePrint Arch., 2016

Reducing the Key Size of the SRP Encryption Scheme - Extended version.
IACR Cryptol. ePrint Arch., 2016

Reducing the Key Size of the SRP Encryption Scheme.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016


  Loading...