BibTeX records: Duong Hieu Phan

download as .bib file

@article{DBLP:journals/iacr/LingNPTWX24,
  author       = {San Ling and
                  Khoa Nguyen and
                  Duong Hieu Phan and
                  Khai Hanh Tang and
                  Huaxiong Wang and
                  Yanhong Xu},
  title        = {Fully Dynamic Attribute-Based Signatures for Circuits from Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/022},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LingNPTWX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EscobarCLP24,
  author       = {Ferran Alborch Escobar and
                  S{\'{e}}bastien Canard and
                  Fabien Laguillaumie and
                  Duong Hieu Phan},
  title        = {Computational Differential Privacy for Encrypted Databases Supporting
                  Linear Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/048},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/EscobarCLP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/KutylowskiPPYZ23,
  author       = {Miroslaw Kutylowski and
                  Giuseppe Persiano and
                  Duong Hieu Phan and
                  Moti Yung and
                  Marcin Zawada},
  title        = {The Self-Anti-Censorship Nature of Encryption: On the Prevalence of
                  Anamorphic Cryptography},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {4},
  pages        = {170--183},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0104},
  doi          = {10.56553/POPETS-2023-0104},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/KutylowskiPPYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NguyenPP23,
  author       = {Ky Nguyen and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Mehdi Tibouchi and
                  Xiaofeng Wang},
  title        = {Optimal Security Notion for Decentralized Multi-Client Functional
                  Encryption},
  booktitle    = {Applied Cryptography and Network Security - 21st International Conference,
                  {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13906},
  pages        = {336--365},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33491-7\_13},
  doi          = {10.1007/978-3-031-33491-7\_13},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NguyenPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NguyenPP23,
  author       = {Dinh Duy Nguyen and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Verifiable Decentralized Multi-client Functional Encryption for Inner
                  Product},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14442},
  pages        = {33--65},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8733-7\_2},
  doi          = {10.1007/978-981-99-8733-7\_2},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/NguyenPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/DuongGPT23,
  author       = {Thai Duong and
                  Jiahui Gao and
                  Duong Hieu Phan and
                  Ni Trieu},
  editor       = {Jing Deng and
                  Vladimir Kolesnikov and
                  Alexander A. Schwarzmann},
  title        = {Privacy-Preserving Digital Vaccine Passport},
  booktitle    = {Cryptology and Network Security - 22nd International Conference, {CANS}
                  2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14342},
  pages        = {137--161},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-7563-1\_7},
  doi          = {10.1007/978-981-99-7563-1\_7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/DuongGPT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KutylowskiPPYZ23,
  author       = {Miroslaw Kutylowski and
                  Giuseppe Persiano and
                  Duong Hieu Phan and
                  Moti Yung and
                  Marcin Zawada},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication!},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14082},
  pages        = {759--790},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38545-2\_25},
  doi          = {10.1007/978-3-031-38545-2\_25},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/KutylowskiPPYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenPP23,
  author       = {Dinh Duy Nguyen and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Verifiable Multi-Client Functional Encryption for Inner Product},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {268},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/268},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KutylowskiPPYZ23,
  author       = {Mirek Kutylowski and
                  Giuseppe Persiano and
                  Duong Hieu Phan and
                  Moti Yung and
                  Marcin Zawada},
  title        = {Anamorphic Signatures: Secrecy From a Dictator Who Only Permits Authentication!},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {356},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/356},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KutylowskiPPYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KutylowskiPPYZ23a,
  author       = {Mirek Kutylowski and
                  Giuseppe Persiano and
                  Duong Hieu Phan and
                  Moti Yung and
                  Marcin Zawada},
  title        = {The Self-Anti-Censorship Nature of Encryption: On the Prevalence of
                  Anamorphic Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {434},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/434},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KutylowskiPPYZ23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenPP23a,
  author       = {Ky Nguyen and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Optimal Security Notion for Decentralized Multi-Client Functional
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {435},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/435},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenPP23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuongGPT23,
  author       = {Thai Duong and
                  Jiahui Gao and
                  Duong Hieu Phan and
                  Ni Trieu},
  title        = {Privacy-Preserving Digital Vaccine Passport},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1656},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1656},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DuongGPT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NguyenPP22,
  author       = {Ky Nguyen and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Multi-Client Functional Encryption with Fine-Grained Access Control},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13791},
  pages        = {95--125},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22963-3\_4},
  doi          = {10.1007/978-3-031-22963-3\_4},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/NguyenPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PersianoPY22,
  author       = {Giuseppe Persiano and
                  Duong Hieu Phan and
                  Moti Yung},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Anamorphic Encryption: Private Communication Against a Dictator},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13276},
  pages        = {34--63},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07085-3\_2},
  doi          = {10.1007/978-3-031-07085-3\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PersianoPY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenPP22,
  author       = {Ky Nguyen and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Multi-Client Functional Encryption with Fine-Grained Access Control},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {215},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/215},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyMNPS22,
  author       = {Olivier Blazy and
                  Sayantan Mukherjee and
                  Huyen Nguyen and
                  Duong Hieu Phan and
                  Damien Stehl{\'{e}}},
  title        = {An Anonymous Trace-and-Revoke Broadcast Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {307},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/307},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyMNPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PersianoPY22,
  author       = {Giuseppe Persiano and
                  Duong Hieu Phan and
                  Moti Yung},
  title        = {Anamorphic Encryption: Private Communication against a Dictator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {639},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/639},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PersianoPY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BlazyMNPS21,
  author       = {Olivier Blazy and
                  Sayantan Mukherjee and
                  Huyen Nguyen and
                  Duong Hieu Phan and
                  Damien Stehl{\'{e}}},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {An Anonymous Trace-and-Revoke Broadcast Encryption Scheme},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {214--233},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_11},
  doi          = {10.1007/978-3-030-90567-5\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BlazyMNPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/LingNPTW21,
  author       = {San Ling and
                  Khoa Nguyen and
                  Duong Hieu Phan and
                  Hanh Tang and
                  Huaxiong Wang},
  editor       = {Jung Hee Cheon and
                  Jean{-}Pierre Tillich},
  title        = {Zero-Knowledge Proofs for Committed Symmetric Boolean Functions},
  booktitle    = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto
                  2021, Daejeon, South Korea, July 20-22, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12841},
  pages        = {339--359},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81293-5\_18},
  doi          = {10.1007/978-3-030-81293-5\_18},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/LingNPTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/PhanABCDGGHKLLM20,
  author       = {Raphael C.{-}W. Phan and
                  Masayuki Abe and
                  Lynn Batten and
                  Jung Hee Cheon and
                  Ed Dawson and
                  Steven D. Galbraith and
                  Jian Guo and
                  Lucas C. K. Hui and
                  Kwangjo Kim and
                  Xuejia Lai and
                  Dong Hoon Lee and
                  Mitsuru Matsui and
                  Tsutomu Matsumoto and
                  Shiho Moriai and
                  Phong Q. Nguyen and
                  Dingyi Pei and
                  Duong Hieu Phan and
                  Josef Pieprzyk and
                  Huaxiong Wang and
                  Hank Wolfe and
                  Duncan S. Wong and
                  Tzong{-}Chen Wu and
                  Bo{-}Yin Yang and
                  Siu{-}Ming Yiu and
                  Yu Yu and
                  Jianying Zhou},
  title        = {Advances in security research in the Asiacrypt region},
  journal      = {Commun. {ACM}},
  volume       = {63},
  number       = {4},
  pages        = {76--81},
  year         = {2020},
  url          = {https://doi.org/10.1145/3378428},
  doi          = {10.1145/3378428},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/PhanABCDGGHKLLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DoPY20,
  author       = {Xuan Thanh Do and
                  Duong Hieu Phan and
                  Moti Yung},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke
                  Schemes},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12147},
  pages        = {145--164},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57878-7\_8},
  doi          = {10.1007/978-3-030-57878-7\_8},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/DoPY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/DuongPT20,
  author       = {Thai Duong and
                  Duong Hieu Phan and
                  Ni Trieu},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Catalic: Delegated {PSI} Cardinality with Applications to Contact
                  Tracing},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12493},
  pages        = {870--899},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64840-4\_29},
  doi          = {10.1007/978-3-030-64840-4\_29},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/DuongPT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChotardDGPP20,
  author       = {J{\'{e}}r{\'{e}}my Chotard and
                  Edouard Dufour{-}Sans and
                  Romain Gay and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Dynamic Decentralized Functional Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {747--775},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_25},
  doi          = {10.1007/978-3-030-56784-2\_25},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChotardDGPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DoPP20,
  author       = {Xuan Thanh Do and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Stanislaw Jarecki},
  title        = {Traceable Inner Product Functional Encryption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at
                  the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12006},
  pages        = {564--585},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-40186-3\_24},
  doi          = {10.1007/978-3-030-40186-3\_24},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DoPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HebantPP20,
  author       = {Chlo{\'{e}} H{\'{e}}bant and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Linearly-Homomorphic Signatures and Scalable Mix-Nets},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {597--627},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_21},
  doi          = {10.1007/978-3-030-45388-6\_21},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HebantPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChotardDGPP20,
  author       = {J{\'{e}}r{\'{e}}my Chotard and
                  Edouard Dufour{-}Sans and
                  Romain Gay and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Dynamic Decentralized Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {197},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/197},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChotardDGPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoPY20,
  author       = {Xuan Thanh Do and
                  Duong Hieu Phan and
                  Moti Yung},
  title        = {A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke
                  Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {826},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/826},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoPY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuongPT20,
  author       = {Thai Duong and
                  Duong Hieu Phan and
                  Ni Trieu},
  title        = {Catalic: Delegated {PSI} Cardinality with Applications to Contact
                  Tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1105},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1105},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuongPT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/BlazyBP19,
  author       = {Olivier Blazy and
                  Laura Brouilhet and
                  Duong Hieu Phan},
  title        = {Anonymous Identity Based Encryption with Traceable Identities},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {13:1--13:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339271},
  doi          = {10.1145/3339252.3339271},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/BlazyBP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BlazyGP19,
  author       = {Olivier Blazy and
                  Paul Germouty and
                  Duong Hieu Phan},
  editor       = {Mitsuru Matsui},
  title        = {Downgradable Identity-Based Encryption and Applications},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
                  the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11405},
  pages        = {44--61},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12612-4\_3},
  doi          = {10.1007/978-3-030-12612-4\_3},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BlazyGP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/HebantPP19,
  author       = {Chlo{\'{e}} H{\'{e}}bant and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Zhiqiang Lin and
                  Charalampos Papamanthou and
                  Michalis Polychronakis},
  title        = {Decentralized Evaluation of Quadratic Polynomials on Encrypted Data},
  booktitle    = {Information Security - 22nd International Conference, {ISC} 2019,
                  New York City, NY, USA, September 16-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11723},
  pages        = {87--106},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30215-3\_5},
  doi          = {10.1007/978-3-030-30215-3\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/HebantPP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HebantPP19,
  author       = {Chlo{\'{e}} H{\'{e}}bant and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Linearly-Homomorphic Signatures and Scalable Mix-Nets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {547},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/547},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HebantPP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DoPP19,
  author       = {Xuan Thanh Do and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Traceable Inner Product Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1358},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DoPP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/CanardPT18,
  author       = {S{\'{e}}bastien Canard and
                  Duong Hieu Phan and
                  Viet Cuong Trinh},
  title        = {Attribute-based broadcast encryption scheme for lightweight devices},
  journal      = {{IET} Inf. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {52--59},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-ifs.2017.0157},
  doi          = {10.1049/IET-IFS.2017.0157},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/CanardPT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/CanardPPT18,
  author       = {S{\'{e}}bastien Canard and
                  Duong Hieu Phan and
                  David Pointcheval and
                  Viet Cuong Trinh},
  title        = {A new technique for compacting ciphertext in multi-channel broadcast
                  encryption and attribute-based encryption},
  journal      = {Theor. Comput. Sci.},
  volume       = {723},
  pages        = {51--72},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.tcs.2018.02.036},
  doi          = {10.1016/J.TCS.2018.02.036},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/CanardPPT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChotardSGPP18,
  author       = {J{\'{e}}r{\'{e}}my Chotard and
                  Edouard Dufour Sans and
                  Romain Gay and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Decentralized Multi-Client Functional Encryption for Inner Product},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11273},
  pages        = {703--732},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03329-3\_24},
  doi          = {10.1007/978-3-030-03329-3\_24},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChotardSGPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HebantPP18,
  author       = {Chlo{\'{e}} H{\'{e}}bant and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Decentralized Evaluation of Quadratic Polynomials on Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1019},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HebantPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChotardSGPP18,
  author       = {J{\'{e}}r{\'{e}}my Chotard and
                  Edouard Dufour Sans and
                  Romain Gay and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Multi-Client Functional Encryption with Repetition for Inner Product},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1021},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1021},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChotardSGPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlazyGP18,
  author       = {Olivier Blazy and
                  Paul Germouty and
                  Duong Hieu Phan},
  title        = {Downgradable Identity-based Encryption and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1176},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1176},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlazyGP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/LingPSS17,
  author       = {San Ling and
                  Duong Hieu Phan and
                  Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  title        = {Hardness of k-LWE and Applications in Traitor Tracing},
  journal      = {Algorithmica},
  volume       = {79},
  number       = {4},
  pages        = {1318--1352},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00453-016-0251-7},
  doi          = {10.1007/S00453-016-0251-7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/LingPSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/HieuK17,
  author       = {Duong Hieu Phan and
                  Neal Koblitz},
  title        = {Cryptography during the French and American Wars in Vietnam},
  journal      = {Cryptologia},
  volume       = {41},
  number       = {6},
  pages        = {491--511},
  year         = {2017},
  url          = {https://doi.org/10.1080/01611194.2017.1292825},
  doi          = {10.1080/01611194.2017.1292825},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/HieuK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AgrawalBPS017,
  author       = {Shweta Agrawal and
                  Sanjay Bhattacherjee and
                  Duong Hieu Phan and
                  Damien Stehl{\'{e}} and
                  Shota Yamada},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Efficient Public Trace and Revoke from Standard Assumptions: Extended
                  Abstract},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2277--2293},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134041},
  doi          = {10.1145/3133956.3134041},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AgrawalBPS017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GaboritHPT17,
  author       = {Philippe Gaborit and
                  Adrien Hauteville and
                  Duong Hieu Phan and
                  Jean{-}Pierre Tillich},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Identity-Based Encryption from Codes with Rank Metric},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {194--224},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_7},
  doi          = {10.1007/978-3-319-63697-9\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GaboritHPT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ChotardPP17,
  author       = {J{\'{e}}r{\'{e}}my Chotard and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Phong Q. Nguyen and
                  Jianying Zhou},
  title        = {Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms},
  booktitle    = {Information Security - 20th International Conference, {ISC} 2017,
                  Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10599},
  pages        = {155--172},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69659-1\_9},
  doi          = {10.1007/978-3-319-69659-1\_9},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/ChotardPP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaboritHPT17,
  author       = {Philippe Gaborit and
                  Adrien Hauteville and
                  Duong Hieu Phan and
                  Jean{-}Pierre Tillich},
  title        = {Identity-based Encryption from Codes with Rank Metric},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {514},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/514},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GaboritHPT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalBPSY17,
  author       = {Shweta Agrawal and
                  Sanjay Bhattacherjee and
                  Duong Hieu Phan and
                  Damien Stehl{\'{e}} and
                  Shota Yamada},
  title        = {Efficient Public Trace and Revoke from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {650},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/650},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalBPSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChotardSGPP17,
  author       = {J{\'{e}}r{\'{e}}my Chotard and
                  Edouard Dufour Sans and
                  Romain Gay and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Decentralized Multi-Client Functional Encryption for Inner Product},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {989},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/989},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChotardSGPP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/CanardPT16,
  author       = {S{\'{e}}bastien Canard and
                  Duong Hieu Phan and
                  Viet Cuong Trinh},
  editor       = {Sara Foresti and
                  Giuseppe Persiano},
  title        = {A New Technique for Compacting Secret Key in Attribute-Based Broadcast
                  Encryption},
  booktitle    = {Cryptology and Network Security - 15th International Conference, {CANS}
                  2016, Milan, Italy, November 14-16, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10052},
  pages        = {594--603},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48965-0\_38},
  doi          = {10.1007/978-3-319-48965-0\_38},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/CanardPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChotardPP16,
  author       = {J{\'{e}}r{\'{e}}my Chotard and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1089},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1089},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChotardPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HieuK16,
  author       = {Duong Hieu Phan and
                  Neal Koblitz},
  title        = {Cryptography during the French and American Wars in Vietnam},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1136},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1136},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HieuK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/hal/Phan14,
  author       = {Duong Hieu Phan},
  title        = {Some Advances in Broadcast Encryption and Traitor Tracing},
  year         = {2014},
  url          = {https://tel.archives-ouvertes.fr/tel-02384086},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/hal/Phan14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LingPSS14,
  author       = {San Ling and
                  Duong Hieu Phan and
                  Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Hardness of k-LWE and Applications in Traitor Tracing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8616},
  pages        = {315--334},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44371-2\_18},
  doi          = {10.1007/978-3-662-44371-2\_18},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LingPSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LingPSS14,
  author       = {San Ling and
                  Duong Hieu Phan and
                  Damien Stehl{\'{e}} and
                  Ron Steinfeld},
  title        = {Hardness of k-LWE and Applications in Traitor Tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {494},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/494},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LingPSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/NgoPP13,
  author       = {Hung Q. Ngo and
                  Duong Hieu Phan and
                  David Pointcheval},
  title        = {Black-Box Trace{\&}Revoke Codes},
  journal      = {Algorithmica},
  volume       = {67},
  number       = {3},
  pages        = {418--448},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00453-012-9702-y},
  doi          = {10.1007/S00453-012-9702-Y},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/NgoPP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/PhanPSS13,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Siamak Fayyaz Shahandashti and
                  Mario Strefler},
  title        = {Adaptive {CCA} broadcast encryption with constant-size secret keys
                  and ciphertexts},
  journal      = {Int. J. Inf. Sec.},
  volume       = {12},
  number       = {4},
  pages        = {251--265},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10207-013-0190-0},
  doi          = {10.1007/S10207-013-0190-0},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/PhanPSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/GuillotNPT13,
  author       = {Philippe Guillot and
                  Abdelkrim Nimour and
                  Duong Hieu Phan and
                  Viet Cuong Trinh},
  editor       = {Amr M. Youssef and
                  Abderrahmane Nitaj and
                  Aboul Ella Hassanien},
  title        = {Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
                  on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7918},
  pages        = {140--155},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38553-7\_8},
  doi          = {10.1007/978-3-642-38553-7\_8},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/GuillotNPT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/PhanT13,
  author       = {Duong Hieu Phan and
                  Viet Cuong Trinh},
  editor       = {Amr M. Youssef and
                  Abderrahmane Nitaj and
                  Aboul Ella Hassanien},
  title        = {Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded
                  Leakage Model},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
                  on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7918},
  pages        = {342--358},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38553-7\_20},
  doi          = {10.1007/978-3-642-38553-7\_20},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/PhanT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PhanPT13,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Viet Cuong Trinh},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Multi-channel broadcast encryption},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {277--286},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484348},
  doi          = {10.1145/2484313.2484348},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PhanPT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/AbdallaCP12,
  author       = {Michel Abdalla and
                  Angelo De Caro and
                  Duong Hieu Phan},
  title        = {Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product
                  Encryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {6},
  pages        = {1695--1706},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2012.2213594},
  doi          = {10.1109/TIFS.2012.2213594},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/AbdallaCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PhanPSS12,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Siamak Fayyaz Shahandashti and
                  Mario Strefler},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Adaptive {CCA} Broadcast Encryption with Constant-Size Secret Keys
                  and Ciphertexts},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {308--321},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_23},
  doi          = {10.1007/978-3-642-31448-3\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PhanPSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/PhanPS12,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Mario Strefler},
  editor       = {Alejandro Hevia and
                  Gregory Neven},
  title        = {Message-Based Traitor Tracing with Optimal Ciphertext Rate},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2012 - 2nd International Conference
                  on Cryptology and Information Security in Latin America, Santiago,
                  Chile, October 7-10, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7533},
  pages        = {56--77},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33481-8\_4},
  doi          = {10.1007/978-3-642-33481-8\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/PhanPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PhanPS12,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Mario Strefler},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {Decentralized Dynamic Broadcast Encryption},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {166--183},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_10},
  doi          = {10.1007/978-3-642-32928-9\_10},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/PhanPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhanPSS12,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Siamak Fayyaz Shahandashti and
                  Mario Strefler},
  title        = {Adaptive {CCA} Broadcast Encryption with Constant-Size Secret Keys
                  and Ciphertexts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {216},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/216},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhanPSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhanT12,
  author       = {Duong Hieu Phan and
                  Viet Cuong Trinh},
  title        = {Resistance to Pirates 2.0: {A} Method from Leakage Resilient Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/305},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhanT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhanPT12,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Viet Cuong Trinh},
  title        = {Multi-Channel Broadcast Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {307},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/307},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhanPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/PhanPS11,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Mario Strefler},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Security Notions for Broadcast Encryption},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {377--394},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_22},
  doi          = {10.1007/978-3-642-21554-4\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/PhanPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/PhanT11,
  author       = {Duong Hieu Phan and
                  Viet Cuong Trinh},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Identity-Based Trace and Revoke Schemes},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {204--221},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_15},
  doi          = {10.1007/978-3-642-24316-5\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/PhanT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhanPS11,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Mario Strefler},
  title        = {Adaptively Secure Broadcast Encryption with Forward Secrecy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {463},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/463},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhanPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BilletP09,
  author       = {Olivier Billet and
                  Duong Hieu Phan},
  editor       = {Antoine Joux},
  title        = {Traitors Collaborating in Public: Pirates 2.0},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {189--205},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_11},
  doi          = {10.1007/978-3-642-01001-9\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BilletP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/DesmedtLP08,
  author       = {Yvo Desmedt and
                  Helger Lipmaa and
                  Duong Hieu Phan},
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {Hybrid Damg{\aa}rd Is CCA1-Secure under the {DDH} Assumption},
  booktitle    = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  pages        = {18--30},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8\_2},
  doi          = {10.1007/978-3-540-89641-8\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/DesmedtLP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/BilletP08,
  author       = {Olivier Billet and
                  Duong Hieu Phan},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Efficient Traitor Tracing from Collusion Secure Codes},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {171--182},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_17},
  doi          = {10.1007/978-3-540-85093-9\_17},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/BilletP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/DesmedtP08,
  author       = {Yvo Desmedt and
                  Duong Hieu Phan},
  editor       = {Joonsang Baek and
                  Feng Bao and
                  Kefei Chen and
                  Xuejia Lai},
  title        = {A {CCA} Secure Hybrid Damg{\aa}rd's ElGamal Encryption},
  booktitle    = {Provable Security, Second International Conference, ProvSec 2008,
                  Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5324},
  pages        = {68--82},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88733-1\_5},
  doi          = {10.1007/978-3-540-88733-1\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/DesmedtP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/FazioNP07,
  author       = {Nelly Fazio and
                  Antonio Nicolosi and
                  Duong Hieu Phan},
  editor       = {Juan A. Garay and
                  Arjen K. Lenstra and
                  Masahiro Mambo and
                  Ren{\'{e}} Peralta},
  title        = {Traitor Tracing with Optimal Transmission Rate},
  booktitle    = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
                  Chile, October 9-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4779},
  pages        = {71--88},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75496-1\_5},
  doi          = {10.1007/978-3-540-75496-1\_5},
  timestamp    = {Fri, 03 Feb 2023 21:39:19 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/FazioNP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbdallaDMNPS07,
  author       = {Michel Abdalla and
                  Alexander W. Dent and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Duong Hieu Phan and
                  Nigel P. Smart},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Identity-Based Traitor Tracing},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {361--376},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_24},
  doi          = {10.1007/978-3-540-71677-8\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbdallaDMNPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/PhanST06,
  author       = {Duong Hieu Phan and
                  Reihaneh Safavi{-}Naini and
                  Dongvu Tonien},
  editor       = {Michele Bugliesi and
                  Bart Preneel and
                  Vladimiro Sassone and
                  Ingo Wegener},
  title        = {Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability},
  booktitle    = {Automata, Languages and Programming, 33rd International Colloquium,
                  {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4052},
  pages        = {264--275},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11787006\_23},
  doi          = {10.1007/11787006\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/PhanST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vietcrypt/Phan06,
  author       = {Duong Hieu Phan},
  editor       = {Phong Q. Nguyen},
  title        = {Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext
                  Rate},
  booktitle    = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference
                  on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4341},
  pages        = {354--365},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11958239\_24},
  doi          = {10.1007/11958239\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vietcrypt/Phan06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/hal/Phan05,
  author       = {Duong Hieu Phan},
  title        = {S{\'{e}}curit{\'{e}} et efficacit{\'{e}} des sch{\'{e}}mas
                  cryptographiques. (Security and Efficiency of Cryptographic Schemes)},
  school       = {{\'{E}}cole Polytechnique, Palaiseau, France},
  year         = {2005},
  url          = {https://tel.archives-ouvertes.fr/pastel-00001442},
  timestamp    = {Tue, 21 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/hal/Phan05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Chevallier-MamesPP05,
  author       = {Beno{\^{\i}}t Chevallier{-}Mames and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Optimal Asymmetric Encryption and Signature Paddings},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {254--268},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_18},
  doi          = {10.1007/11496137\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Chevallier-MamesPP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ChabannePP05,
  author       = {Herv{\'{e}} Chabanne and
                  Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Ronald Cramer},
  title        = {Public Traceability in Traitor Tracing Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {542--558},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_32},
  doi          = {10.1007/11426639\_32},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ChabannePP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PhanP04,
  author       = {Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Pil Joong Lee},
  title        = {{OAEP} 3-Round: {A} Generic and Secure Asymmetric Encryption Padding},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Jeju Island, Korea, December 5-9, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3329},
  pages        = {63--77},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30539-2\_5},
  doi          = {10.1007/978-3-540-30539-2\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PhanP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/PhanP04,
  author       = {Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Helena Handschuh and
                  M. Anwar Hasan},
  title        = {About the Security of Ciphers (Semantic Security and Pseudo-Random
                  Permutations)},
  booktitle    = {Selected Areas in Cryptography, 11th International Workshop, {SAC}
                  2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3357},
  pages        = {182--197},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30564-4\_13},
  doi          = {10.1007/978-3-540-30564-4\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/PhanP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PhanP04,
  author       = {Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {On the Security Notions for Public-Key Encryption Schemes},
  booktitle    = {Security in Communication Networks, 4th International Conference,
                  {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3352},
  pages        = {33--46},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30598-9\_3},
  doi          = {10.1007/978-3-540-30598-9\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/PhanP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaciii/ThuyHY03,
  author       = {Nguyen Thanh Thuy and
                  Duong Hieu Phan and
                  Takahiro Yamanoi},
  title        = {Some Preliminary Results on the Stableness of Extended F-rule Systems},
  journal      = {J. Adv. Comput. Intell. Intell. Informatics},
  volume       = {7},
  number       = {3},
  pages        = {252--259},
  year         = {2003},
  url          = {https://doi.org/10.20965/jaciii.2003.p0252},
  doi          = {10.20965/JACIII.2003.P0252},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaciii/ThuyHY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PhanP03,
  author       = {Duong Hieu Phan and
                  David Pointcheval},
  editor       = {Chi{-}Sung Laih},
  title        = {Chosen-Ciphertext Security without Redundancy},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_1},
  doi          = {10.1007/978-3-540-40061-5\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PhanP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rivf/PhanP03,
  author       = {Duong Hieu Phan and
                  David Pointcheval},
  title        = {Une comparaison entre deux m{\'{e}}thodes de preuve de s{\'{e}}curit{\'{e}}},
  booktitle    = {Actes de la Premi{\`{e}}re Conf{\'{e}}rence Internationale RIVF'03
                  Rencontres en Informatique Vietnam-France, RIVF'03, Hanoi, Vietnam,
                  10-13 F{\'{e}}vrier, 2003},
  pages        = {105--110},
  publisher    = {Editions Suger, Paris},
  year         = {2003},
  url          = {http://www.e-ifi.org/rivf2003/proceedings/p105-110.pdf},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rivf/PhanP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics