Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Duong Hieu Phan
@article{DBLP:journals/iacr/LingNPTWX24, author = {San Ling and Khoa Nguyen and Duong Hieu Phan and Khai Hanh Tang and Huaxiong Wang and Yanhong Xu}, title = {Fully Dynamic Attribute-Based Signatures for Circuits from Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2024}, url = {https://eprint.iacr.org/2024/022}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LingNPTWX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EscobarCLP24, author = {Ferran Alborch Escobar and S{\'{e}}bastien Canard and Fabien Laguillaumie and Duong Hieu Phan}, title = {Computational Differential Privacy for Encrypted Databases Supporting Linear Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2024}, url = {https://eprint.iacr.org/2024/048}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/EscobarCLP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/KutylowskiPPYZ23, author = {Miroslaw Kutylowski and Giuseppe Persiano and Duong Hieu Phan and Moti Yung and Marcin Zawada}, title = {The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {4}, pages = {170--183}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0104}, doi = {10.56553/POPETS-2023-0104}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/KutylowskiPPYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NguyenPP23, author = {Ky Nguyen and Duong Hieu Phan and David Pointcheval}, editor = {Mehdi Tibouchi and Xiaofeng Wang}, title = {Optimal Security Notion for Decentralized Multi-Client Functional Encryption}, booktitle = {Applied Cryptography and Network Security - 21st International Conference, {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13906}, pages = {336--365}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33491-7\_13}, doi = {10.1007/978-3-031-33491-7\_13}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NguyenPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/NguyenPP23, author = {Dinh Duy Nguyen and Duong Hieu Phan and David Pointcheval}, editor = {Jian Guo and Ron Steinfeld}, title = {Verifiable Decentralized Multi-client Functional Encryption for Inner Product}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14442}, pages = {33--65}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8733-7\_2}, doi = {10.1007/978-981-99-8733-7\_2}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/NguyenPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/DuongGPT23, author = {Thai Duong and Jiahui Gao and Duong Hieu Phan and Ni Trieu}, editor = {Jing Deng and Vladimir Kolesnikov and Alexander A. Schwarzmann}, title = {Privacy-Preserving Digital Vaccine Passport}, booktitle = {Cryptology and Network Security - 22nd International Conference, {CANS} 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14342}, pages = {137--161}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-7563-1\_7}, doi = {10.1007/978-981-99-7563-1\_7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/DuongGPT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KutylowskiPPYZ23, author = {Miroslaw Kutylowski and Giuseppe Persiano and Duong Hieu Phan and Moti Yung and Marcin Zawada}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication!}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14082}, pages = {759--790}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38545-2\_25}, doi = {10.1007/978-3-031-38545-2\_25}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/KutylowskiPPYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenPP23, author = {Dinh Duy Nguyen and Duong Hieu Phan and David Pointcheval}, title = {Verifiable Multi-Client Functional Encryption for Inner Product}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {268}, year = {2023}, url = {https://eprint.iacr.org/2023/268}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NguyenPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KutylowskiPPYZ23, author = {Mirek Kutylowski and Giuseppe Persiano and Duong Hieu Phan and Moti Yung and Marcin Zawada}, title = {Anamorphic Signatures: Secrecy From a Dictator Who Only Permits Authentication!}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {356}, year = {2023}, url = {https://eprint.iacr.org/2023/356}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KutylowskiPPYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KutylowskiPPYZ23a, author = {Mirek Kutylowski and Giuseppe Persiano and Duong Hieu Phan and Moti Yung and Marcin Zawada}, title = {The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {434}, year = {2023}, url = {https://eprint.iacr.org/2023/434}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KutylowskiPPYZ23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenPP23a, author = {Ky Nguyen and Duong Hieu Phan and David Pointcheval}, title = {Optimal Security Notion for Decentralized Multi-Client Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {435}, year = {2023}, url = {https://eprint.iacr.org/2023/435}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NguyenPP23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuongGPT23, author = {Thai Duong and Jiahui Gao and Duong Hieu Phan and Ni Trieu}, title = {Privacy-Preserving Digital Vaccine Passport}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1656}, year = {2023}, url = {https://eprint.iacr.org/2023/1656}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DuongGPT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/NguyenPP22, author = {Ky Nguyen and Duong Hieu Phan and David Pointcheval}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Multi-Client Functional Encryption with Fine-Grained Access Control}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13791}, pages = {95--125}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22963-3\_4}, doi = {10.1007/978-3-031-22963-3\_4}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/NguyenPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PersianoPY22, author = {Giuseppe Persiano and Duong Hieu Phan and Moti Yung}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Anamorphic Encryption: Private Communication Against a Dictator}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {34--63}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_2}, doi = {10.1007/978-3-031-07085-3\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PersianoPY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenPP22, author = {Ky Nguyen and Duong Hieu Phan and David Pointcheval}, title = {Multi-Client Functional Encryption with Fine-Grained Access Control}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {215}, year = {2022}, url = {https://eprint.iacr.org/2022/215}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NguyenPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyMNPS22, author = {Olivier Blazy and Sayantan Mukherjee and Huyen Nguyen and Duong Hieu Phan and Damien Stehl{\'{e}}}, title = {An Anonymous Trace-and-Revoke Broadcast Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {307}, year = {2022}, url = {https://eprint.iacr.org/2022/307}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BlazyMNPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PersianoPY22, author = {Giuseppe Persiano and Duong Hieu Phan and Moti Yung}, title = {Anamorphic Encryption: Private Communication against a Dictator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {639}, year = {2022}, url = {https://eprint.iacr.org/2022/639}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PersianoPY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BlazyMNPS21, author = {Olivier Blazy and Sayantan Mukherjee and Huyen Nguyen and Duong Hieu Phan and Damien Stehl{\'{e}}}, editor = {Joonsang Baek and Sushmita Ruj}, title = {An Anonymous Trace-and-Revoke Broadcast Encryption Scheme}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {214--233}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_11}, doi = {10.1007/978-3-030-90567-5\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BlazyMNPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/LingNPTW21, author = {San Ling and Khoa Nguyen and Duong Hieu Phan and Hanh Tang and Huaxiong Wang}, editor = {Jung Hee Cheon and Jean{-}Pierre Tillich}, title = {Zero-Knowledge Proofs for Committed Symmetric Boolean Functions}, booktitle = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12841}, pages = {339--359}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81293-5\_18}, doi = {10.1007/978-3-030-81293-5\_18}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pqcrypto/LingNPTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/PhanABCDGGHKLLM20, author = {Raphael C.{-}W. Phan and Masayuki Abe and Lynn Batten and Jung Hee Cheon and Ed Dawson and Steven D. Galbraith and Jian Guo and Lucas C. K. Hui and Kwangjo Kim and Xuejia Lai and Dong Hoon Lee and Mitsuru Matsui and Tsutomu Matsumoto and Shiho Moriai and Phong Q. Nguyen and Dingyi Pei and Duong Hieu Phan and Josef Pieprzyk and Huaxiong Wang and Hank Wolfe and Duncan S. Wong and Tzong{-}Chen Wu and Bo{-}Yin Yang and Siu{-}Ming Yiu and Yu Yu and Jianying Zhou}, title = {Advances in security research in the Asiacrypt region}, journal = {Commun. {ACM}}, volume = {63}, number = {4}, pages = {76--81}, year = {2020}, url = {https://doi.org/10.1145/3378428}, doi = {10.1145/3378428}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/PhanABCDGGHKLLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DoPY20, author = {Xuan Thanh Do and Duong Hieu Phan and Moti Yung}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12147}, pages = {145--164}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57878-7\_8}, doi = {10.1007/978-3-030-57878-7\_8}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/DoPY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DuongPT20, author = {Thai Duong and Duong Hieu Phan and Ni Trieu}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Catalic: Delegated {PSI} Cardinality with Applications to Contact Tracing}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {870--899}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_29}, doi = {10.1007/978-3-030-64840-4\_29}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DuongPT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChotardDGPP20, author = {J{\'{e}}r{\'{e}}my Chotard and Edouard Dufour{-}Sans and Romain Gay and Duong Hieu Phan and David Pointcheval}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Dynamic Decentralized Functional Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {747--775}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_25}, doi = {10.1007/978-3-030-56784-2\_25}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChotardDGPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/DoPP20, author = {Xuan Thanh Do and Duong Hieu Phan and David Pointcheval}, editor = {Stanislaw Jarecki}, title = {Traceable Inner Product Functional Encryption}, booktitle = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12006}, pages = {564--585}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-40186-3\_24}, doi = {10.1007/978-3-030-40186-3\_24}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/DoPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HebantPP20, author = {Chlo{\'{e}} H{\'{e}}bant and Duong Hieu Phan and David Pointcheval}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Linearly-Homomorphic Signatures and Scalable Mix-Nets}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {597--627}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_21}, doi = {10.1007/978-3-030-45388-6\_21}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HebantPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChotardDGPP20, author = {J{\'{e}}r{\'{e}}my Chotard and Edouard Dufour{-}Sans and Romain Gay and Duong Hieu Phan and David Pointcheval}, title = {Dynamic Decentralized Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {197}, year = {2020}, url = {https://eprint.iacr.org/2020/197}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChotardDGPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoPY20, author = {Xuan Thanh Do and Duong Hieu Phan and Moti Yung}, title = {A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {826}, year = {2020}, url = {https://eprint.iacr.org/2020/826}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoPY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuongPT20, author = {Thai Duong and Duong Hieu Phan and Ni Trieu}, title = {Catalic: Delegated {PSI} Cardinality with Applications to Contact Tracing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1105}, year = {2020}, url = {https://eprint.iacr.org/2020/1105}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuongPT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/BlazyBP19, author = {Olivier Blazy and Laura Brouilhet and Duong Hieu Phan}, title = {Anonymous Identity Based Encryption with Traceable Identities}, booktitle = {Proceedings of the 14th International Conference on Availability, Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29, 2019}, pages = {13:1--13:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3339252.3339271}, doi = {10.1145/3339252.3339271}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/BlazyBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BlazyGP19, author = {Olivier Blazy and Paul Germouty and Duong Hieu Phan}, editor = {Mitsuru Matsui}, title = {Downgradable Identity-Based Encryption and Applications}, booktitle = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11405}, pages = {44--61}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12612-4\_3}, doi = {10.1007/978-3-030-12612-4\_3}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/BlazyGP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/HebantPP19, author = {Chlo{\'{e}} H{\'{e}}bant and Duong Hieu Phan and David Pointcheval}, editor = {Zhiqiang Lin and Charalampos Papamanthou and Michalis Polychronakis}, title = {Decentralized Evaluation of Quadratic Polynomials on Encrypted Data}, booktitle = {Information Security - 22nd International Conference, {ISC} 2019, New York City, NY, USA, September 16-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11723}, pages = {87--106}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30215-3\_5}, doi = {10.1007/978-3-030-30215-3\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/HebantPP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HebantPP19, author = {Chlo{\'{e}} H{\'{e}}bant and Duong Hieu Phan and David Pointcheval}, title = {Linearly-Homomorphic Signatures and Scalable Mix-Nets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {547}, year = {2019}, url = {https://eprint.iacr.org/2019/547}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HebantPP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DoPP19, author = {Xuan Thanh Do and Duong Hieu Phan and David Pointcheval}, title = {Traceable Inner Product Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1358}, year = {2019}, url = {https://eprint.iacr.org/2019/1358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DoPP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/CanardPT18, author = {S{\'{e}}bastien Canard and Duong Hieu Phan and Viet Cuong Trinh}, title = {Attribute-based broadcast encryption scheme for lightweight devices}, journal = {{IET} Inf. Secur.}, volume = {12}, number = {1}, pages = {52--59}, year = {2018}, url = {https://doi.org/10.1049/iet-ifs.2017.0157}, doi = {10.1049/IET-IFS.2017.0157}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/CanardPT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/CanardPPT18, author = {S{\'{e}}bastien Canard and Duong Hieu Phan and David Pointcheval and Viet Cuong Trinh}, title = {A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption}, journal = {Theor. Comput. Sci.}, volume = {723}, pages = {51--72}, year = {2018}, url = {https://doi.org/10.1016/j.tcs.2018.02.036}, doi = {10.1016/J.TCS.2018.02.036}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/CanardPPT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChotardSGPP18, author = {J{\'{e}}r{\'{e}}my Chotard and Edouard Dufour Sans and Romain Gay and Duong Hieu Phan and David Pointcheval}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Decentralized Multi-Client Functional Encryption for Inner Product}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11273}, pages = {703--732}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03329-3\_24}, doi = {10.1007/978-3-030-03329-3\_24}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChotardSGPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HebantPP18, author = {Chlo{\'{e}} H{\'{e}}bant and Duong Hieu Phan and David Pointcheval}, title = {Decentralized Evaluation of Quadratic Polynomials on Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1019}, year = {2018}, url = {https://eprint.iacr.org/2018/1019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HebantPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChotardSGPP18, author = {J{\'{e}}r{\'{e}}my Chotard and Edouard Dufour Sans and Romain Gay and Duong Hieu Phan and David Pointcheval}, title = {Multi-Client Functional Encryption with Repetition for Inner Product}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1021}, year = {2018}, url = {https://eprint.iacr.org/2018/1021}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChotardSGPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlazyGP18, author = {Olivier Blazy and Paul Germouty and Duong Hieu Phan}, title = {Downgradable Identity-based Encryption and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1176}, year = {2018}, url = {https://eprint.iacr.org/2018/1176}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlazyGP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/LingPSS17, author = {San Ling and Duong Hieu Phan and Damien Stehl{\'{e}} and Ron Steinfeld}, title = {Hardness of k-LWE and Applications in Traitor Tracing}, journal = {Algorithmica}, volume = {79}, number = {4}, pages = {1318--1352}, year = {2017}, url = {https://doi.org/10.1007/s00453-016-0251-7}, doi = {10.1007/S00453-016-0251-7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/LingPSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/HieuK17, author = {Duong Hieu Phan and Neal Koblitz}, title = {Cryptography during the French and American Wars in Vietnam}, journal = {Cryptologia}, volume = {41}, number = {6}, pages = {491--511}, year = {2017}, url = {https://doi.org/10.1080/01611194.2017.1292825}, doi = {10.1080/01611194.2017.1292825}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/HieuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AgrawalBPS017, author = {Shweta Agrawal and Sanjay Bhattacherjee and Duong Hieu Phan and Damien Stehl{\'{e}} and Shota Yamada}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2277--2293}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134041}, doi = {10.1145/3133956.3134041}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AgrawalBPS017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GaboritHPT17, author = {Philippe Gaborit and Adrien Hauteville and Duong Hieu Phan and Jean{-}Pierre Tillich}, editor = {Jonathan Katz and Hovav Shacham}, title = {Identity-Based Encryption from Codes with Rank Metric}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {194--224}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_7}, doi = {10.1007/978-3-319-63697-9\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GaboritHPT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ChotardPP17, author = {J{\'{e}}r{\'{e}}my Chotard and Duong Hieu Phan and David Pointcheval}, editor = {Phong Q. Nguyen and Jianying Zhou}, title = {Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms}, booktitle = {Information Security - 20th International Conference, {ISC} 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10599}, pages = {155--172}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69659-1\_9}, doi = {10.1007/978-3-319-69659-1\_9}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/ChotardPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaboritHPT17, author = {Philippe Gaborit and Adrien Hauteville and Duong Hieu Phan and Jean{-}Pierre Tillich}, title = {Identity-based Encryption from Codes with Rank Metric}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {514}, year = {2017}, url = {http://eprint.iacr.org/2017/514}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GaboritHPT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalBPSY17, author = {Shweta Agrawal and Sanjay Bhattacherjee and Duong Hieu Phan and Damien Stehl{\'{e}} and Shota Yamada}, title = {Efficient Public Trace and Revoke from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {650}, year = {2017}, url = {http://eprint.iacr.org/2017/650}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalBPSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChotardSGPP17, author = {J{\'{e}}r{\'{e}}my Chotard and Edouard Dufour Sans and Romain Gay and Duong Hieu Phan and David Pointcheval}, title = {Decentralized Multi-Client Functional Encryption for Inner Product}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {989}, year = {2017}, url = {http://eprint.iacr.org/2017/989}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChotardSGPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/CanardPT16, author = {S{\'{e}}bastien Canard and Duong Hieu Phan and Viet Cuong Trinh}, editor = {Sara Foresti and Giuseppe Persiano}, title = {A New Technique for Compacting Secret Key in Attribute-Based Broadcast Encryption}, booktitle = {Cryptology and Network Security - 15th International Conference, {CANS} 2016, Milan, Italy, November 14-16, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10052}, pages = {594--603}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48965-0\_38}, doi = {10.1007/978-3-319-48965-0\_38}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/CanardPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChotardPP16, author = {J{\'{e}}r{\'{e}}my Chotard and Duong Hieu Phan and David Pointcheval}, title = {Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1089}, year = {2016}, url = {http://eprint.iacr.org/2016/1089}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChotardPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HieuK16, author = {Duong Hieu Phan and Neal Koblitz}, title = {Cryptography during the French and American Wars in Vietnam}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1136}, year = {2016}, url = {http://eprint.iacr.org/2016/1136}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HieuK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/hal/Phan14, author = {Duong Hieu Phan}, title = {Some Advances in Broadcast Encryption and Traitor Tracing}, year = {2014}, url = {https://tel.archives-ouvertes.fr/tel-02384086}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/hal/Phan14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LingPSS14, author = {San Ling and Duong Hieu Phan and Damien Stehl{\'{e}} and Ron Steinfeld}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Hardness of k-LWE and Applications in Traitor Tracing}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {315--334}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_18}, doi = {10.1007/978-3-662-44371-2\_18}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LingPSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LingPSS14, author = {San Ling and Duong Hieu Phan and Damien Stehl{\'{e}} and Ron Steinfeld}, title = {Hardness of k-LWE and Applications in Traitor Tracing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {494}, year = {2014}, url = {http://eprint.iacr.org/2014/494}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LingPSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/NgoPP13, author = {Hung Q. Ngo and Duong Hieu Phan and David Pointcheval}, title = {Black-Box Trace{\&}Revoke Codes}, journal = {Algorithmica}, volume = {67}, number = {3}, pages = {418--448}, year = {2013}, url = {https://doi.org/10.1007/s00453-012-9702-y}, doi = {10.1007/S00453-012-9702-Y}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/NgoPP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/PhanPSS13, author = {Duong Hieu Phan and David Pointcheval and Siamak Fayyaz Shahandashti and Mario Strefler}, title = {Adaptive {CCA} broadcast encryption with constant-size secret keys and ciphertexts}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {4}, pages = {251--265}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0190-0}, doi = {10.1007/S10207-013-0190-0}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/PhanPSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/GuillotNPT13, author = {Philippe Guillot and Abdelkrim Nimour and Duong Hieu Phan and Viet Cuong Trinh}, editor = {Amr M. Youssef and Abderrahmane Nitaj and Aboul Ella Hassanien}, title = {Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7918}, pages = {140--155}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38553-7\_8}, doi = {10.1007/978-3-642-38553-7\_8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/GuillotNPT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/PhanT13, author = {Duong Hieu Phan and Viet Cuong Trinh}, editor = {Amr M. Youssef and Abderrahmane Nitaj and Aboul Ella Hassanien}, title = {Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7918}, pages = {342--358}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38553-7\_20}, doi = {10.1007/978-3-642-38553-7\_20}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/PhanT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PhanPT13, author = {Duong Hieu Phan and David Pointcheval and Viet Cuong Trinh}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Multi-channel broadcast encryption}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {277--286}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484348}, doi = {10.1145/2484313.2484348}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PhanPT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/AbdallaCP12, author = {Michel Abdalla and Angelo De Caro and Duong Hieu Phan}, title = {Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {6}, pages = {1695--1706}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2012.2213594}, doi = {10.1109/TIFS.2012.2213594}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/AbdallaCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PhanPSS12, author = {Duong Hieu Phan and David Pointcheval and Siamak Fayyaz Shahandashti and Mario Strefler}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Adaptive {CCA} Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {308--321}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_23}, doi = {10.1007/978-3-642-31448-3\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PhanPSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/PhanPS12, author = {Duong Hieu Phan and David Pointcheval and Mario Strefler}, editor = {Alejandro Hevia and Gregory Neven}, title = {Message-Based Traitor Tracing with Optimal Ciphertext Rate}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2012 - 2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7533}, pages = {56--77}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33481-8\_4}, doi = {10.1007/978-3-642-33481-8\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/PhanPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PhanPS12, author = {Duong Hieu Phan and David Pointcheval and Mario Strefler}, editor = {Ivan Visconti and Roberto De Prisco}, title = {Decentralized Dynamic Broadcast Encryption}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {166--183}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_10}, doi = {10.1007/978-3-642-32928-9\_10}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/PhanPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhanPSS12, author = {Duong Hieu Phan and David Pointcheval and Siamak Fayyaz Shahandashti and Mario Strefler}, title = {Adaptive {CCA} Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {216}, year = {2012}, url = {http://eprint.iacr.org/2012/216}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhanPSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhanT12, author = {Duong Hieu Phan and Viet Cuong Trinh}, title = {Resistance to Pirates 2.0: {A} Method from Leakage Resilient Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2012}, url = {http://eprint.iacr.org/2012/305}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhanT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhanPT12, author = {Duong Hieu Phan and David Pointcheval and Viet Cuong Trinh}, title = {Multi-Channel Broadcast Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {307}, year = {2012}, url = {http://eprint.iacr.org/2012/307}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhanPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/PhanPS11, author = {Duong Hieu Phan and David Pointcheval and Mario Strefler}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Security Notions for Broadcast Encryption}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {377--394}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_22}, doi = {10.1007/978-3-642-21554-4\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/PhanPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/PhanT11, author = {Duong Hieu Phan and Viet Cuong Trinh}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Identity-Based Trace and Revoke Schemes}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {204--221}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_15}, doi = {10.1007/978-3-642-24316-5\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/PhanT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhanPS11, author = {Duong Hieu Phan and David Pointcheval and Mario Strefler}, title = {Adaptively Secure Broadcast Encryption with Forward Secrecy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {463}, year = {2011}, url = {http://eprint.iacr.org/2011/463}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhanPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BilletP09, author = {Olivier Billet and Duong Hieu Phan}, editor = {Antoine Joux}, title = {Traitors Collaborating in Public: Pirates 2.0}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {189--205}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_11}, doi = {10.1007/978-3-642-01001-9\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BilletP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/DesmedtLP08, author = {Yvo Desmedt and Helger Lipmaa and Duong Hieu Phan}, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {Hybrid Damg{\aa}rd Is CCA1-Secure under the {DDH} Assumption}, booktitle = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, pages = {18--30}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8\_2}, doi = {10.1007/978-3-540-89641-8\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/DesmedtLP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/BilletP08, author = {Olivier Billet and Duong Hieu Phan}, editor = {Reihaneh Safavi{-}Naini}, title = {Efficient Traitor Tracing from Collusion Secure Codes}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {171--182}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_17}, doi = {10.1007/978-3-540-85093-9\_17}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/BilletP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/DesmedtP08, author = {Yvo Desmedt and Duong Hieu Phan}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {A {CCA} Secure Hybrid Damg{\aa}rd's ElGamal Encryption}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {68--82}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_5}, doi = {10.1007/978-3-540-88733-1\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/DesmedtP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/FazioNP07, author = {Nelly Fazio and Antonio Nicolosi and Duong Hieu Phan}, editor = {Juan A. Garay and Arjen K. Lenstra and Masahiro Mambo and Ren{\'{e}} Peralta}, title = {Traitor Tracing with Optimal Transmission Rate}, booktitle = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so, Chile, October 9-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4779}, pages = {71--88}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75496-1\_5}, doi = {10.1007/978-3-540-75496-1\_5}, timestamp = {Fri, 03 Feb 2023 21:39:19 +0100}, biburl = {https://dblp.org/rec/conf/isw/FazioNP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaDMNPS07, author = {Michel Abdalla and Alexander W. Dent and John Malone{-}Lee and Gregory Neven and Duong Hieu Phan and Nigel P. Smart}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Identity-Based Traitor Tracing}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {361--376}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_24}, doi = {10.1007/978-3-540-71677-8\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaDMNPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/PhanST06, author = {Duong Hieu Phan and Reihaneh Safavi{-}Naini and Dongvu Tonien}, editor = {Michele Bugliesi and Bart Preneel and Vladimiro Sassone and Ingo Wegener}, title = {Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability}, booktitle = {Automata, Languages and Programming, 33rd International Colloquium, {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4052}, pages = {264--275}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11787006\_23}, doi = {10.1007/11787006\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/PhanST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vietcrypt/Phan06, author = {Duong Hieu Phan}, editor = {Phong Q. Nguyen}, title = {Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate}, booktitle = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4341}, pages = {354--365}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11958239\_24}, doi = {10.1007/11958239\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vietcrypt/Phan06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/hal/Phan05, author = {Duong Hieu Phan}, title = {S{\'{e}}curit{\'{e}} et efficacit{\'{e}} des sch{\'{e}}mas cryptographiques. (Security and Efficiency of Cryptographic Schemes)}, school = {{\'{E}}cole Polytechnique, Palaiseau, France}, year = {2005}, url = {https://tel.archives-ouvertes.fr/pastel-00001442}, timestamp = {Tue, 21 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/hal/Phan05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Chevallier-MamesPP05, author = {Beno{\^{\i}}t Chevallier{-}Mames and Duong Hieu Phan and David Pointcheval}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Optimal Asymmetric Encryption and Signature Paddings}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {254--268}, year = {2005}, url = {https://doi.org/10.1007/11496137\_18}, doi = {10.1007/11496137\_18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Chevallier-MamesPP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ChabannePP05, author = {Herv{\'{e}} Chabanne and Duong Hieu Phan and David Pointcheval}, editor = {Ronald Cramer}, title = {Public Traceability in Traitor Tracing Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {542--558}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_32}, doi = {10.1007/11426639\_32}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ChabannePP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PhanP04, author = {Duong Hieu Phan and David Pointcheval}, editor = {Pil Joong Lee}, title = {{OAEP} 3-Round: {A} Generic and Secure Asymmetric Encryption Padding}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3329}, pages = {63--77}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30539-2\_5}, doi = {10.1007/978-3-540-30539-2\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PhanP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/PhanP04, author = {Duong Hieu Phan and David Pointcheval}, editor = {Helena Handschuh and M. Anwar Hasan}, title = {About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations)}, booktitle = {Selected Areas in Cryptography, 11th International Workshop, {SAC} 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3357}, pages = {182--197}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30564-4\_13}, doi = {10.1007/978-3-540-30564-4\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/PhanP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PhanP04, author = {Duong Hieu Phan and David Pointcheval}, editor = {Carlo Blundo and Stelvio Cimato}, title = {On the Security Notions for Public-Key Encryption Schemes}, booktitle = {Security in Communication Networks, 4th International Conference, {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3352}, pages = {33--46}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30598-9\_3}, doi = {10.1007/978-3-540-30598-9\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/PhanP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaciii/ThuyHY03, author = {Nguyen Thanh Thuy and Duong Hieu Phan and Takahiro Yamanoi}, title = {Some Preliminary Results on the Stableness of Extended F-rule Systems}, journal = {J. Adv. Comput. Intell. Intell. Informatics}, volume = {7}, number = {3}, pages = {252--259}, year = {2003}, url = {https://doi.org/10.20965/jaciii.2003.p0252}, doi = {10.20965/JACIII.2003.P0252}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaciii/ThuyHY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PhanP03, author = {Duong Hieu Phan and David Pointcheval}, editor = {Chi{-}Sung Laih}, title = {Chosen-Ciphertext Security without Redundancy}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {1--18}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_1}, doi = {10.1007/978-3-540-40061-5\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PhanP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rivf/PhanP03, author = {Duong Hieu Phan and David Pointcheval}, title = {Une comparaison entre deux m{\'{e}}thodes de preuve de s{\'{e}}curit{\'{e}}}, booktitle = {Actes de la Premi{\`{e}}re Conf{\'{e}}rence Internationale RIVF'03 Rencontres en Informatique Vietnam-France, RIVF'03, Hanoi, Vietnam, 10-13 F{\'{e}}vrier, 2003}, pages = {105--110}, publisher = {Editions Suger, Paris}, year = {2003}, url = {http://www.e-ifi.org/rivf2003/proceedings/p105-110.pdf}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rivf/PhanP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.