Dung Hoang Duong
Dung Hoang Duong
Verified email at - Homepage
Cited by
Cited by
Efficient secure matrix multiplication over LWE-based homomorphic encryption
DH Duong, PK Mishra, M Yasuda
Tatra mountains mathematical publications 67 (1), 69-83, 2016
A lattice-based public key encryption with equality test in standard model
DH Duong, K Fukushima, S Kiyomoto, PS Roy, W Susilo
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019
Uniform analytic properties of representation zeta functions of finitely generated nilpotent groups
D Dung, C Voll
Transactions of the American Mathematical Society 369 (9), 6327-6349, 2017
Fast secure matrix multiplications over ring-based homomorphic encryption
PK Mishra, D Rathee, DH Duong, M Yasuda
Information Security Journal: A Global Perspective 30 (4), 219-234, 2021
Lattice-based IBE with equality test in standard model
DH Duong, HQ Le, PS Roy, W Susilo
Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD …, 2019
Revisiting the cubic UOV signature scheme
DH Duong, A Petzoldt, Y Wang, T Takagi
Information Security and Cryptology–ICISC 2016: 19th International …, 2017
On normal subgroups of division rings which are radical over a proper division subring
M Bien, D Dung
Studia Scientiarum Mathematicarum Hungarica 51 (2), 231-242, 2014
Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model
P Dutta, W Susilo, DH Duong, PS Roy
Theoretical Computer Science 871, 16-29, 2021
An efficient multivariate threshold ring signature scheme
DH Duong, HTN Tran, W Susilo
Computer Standards & Interfaces 74, 103489, 2021
Enhancement for secure multiple matrix multiplications over ring-LWE homomorphic encryption
PK Mishra, DH Duong, M Yasuda
Information Security Practice and Experience: 13th International Conference …, 2017
Lattice-based signcryption with equality test in standard model
HQ Le, DH Duong, PS Roy, W Susilo, K Fukushima, S Kiyomoto
Computer Standards & Interfaces 76, 103515, 2021
Attribute-based proxy re-signature from standard lattices and its applications
F Luo, S Al-Kuwari, W Susilo, DH Duong
Computer Standards & Interfaces 75, 103499, 2021
Wildcarded Identity-Based Encryption with Constant-size Ciphertext and Secret Key.
DH Duong, W Susilo, VC Trinh
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11 (2), 74-86, 2020
Lattice-based IBE with equality test supporting flexible authorization in the standard model
GLD Nguyen, W Susilo, DH Duong, HQ Le, F Guo
Progress in Cryptology–INDOCRYPT 2020: 21st International Conference on …, 2020
Puncturable encryption: a generic construction from delegatable fully key-homomorphic encryption
W Susilo, DH Duong, HQ Le, J Pieprzyk
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
Practical post-quantum signature schemes from isomorphism problems of trilinear forms
G Tang, DH Duong, A Joux, T Plantard, Y Qiao, W Susilo
Advances in Cryptology–EUROCRYPT 2022: 41st Annual International Conference …, 2022
Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions.
P Dutta, W Susilo, DH Duong, J Baek, PS Roy
J. Internet Serv. Inf. Secur. 10 (4), 1-22, 2020
A blind signature from module latices
HQ Le, W Susilo, TX Khuc, MK Bui, DH Duong
2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing
H Wang, Y Li, W Susilo, DH Duong, F Luo
Computer Standards & Interfaces 82, 103635, 2022
A multivariate blind ring signature scheme
D Hoang Duong, W Susilo, HTN Tran
The Computer Journal 63 (8), 1194-1202, 2020
The system can't perform the operation now. Try again later.
Articles 1–20