Follow
Dung Hoang Duong
Dung Hoang Duong
Verified email at uow.edu.au - Homepage
Title
Cited by
Cited by
Year
Efficient secure matrix multiplication over LWE-based homomorphic encryption
DH Duong, PK Mishra, M Yasuda
Tatra mountains mathematical publications 67 (1), 69-83, 2016
422016
Practical post-quantum signature schemes from isomorphism problems of trilinear forms
G Tang, DH Duong, A Joux, T Plantard, Y Qiao, W Susilo
Annual International Conference on the Theory and Applications of …, 2022
292022
A lattice-based public key encryption with equality test in standard model
DH Duong, K Fukushima, S Kiyomoto, PS Roy, W Susilo
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019
292019
Fast secure matrix multiplications over ring-based homomorphic encryption
PK Mishra, D Rathee, DH Duong, M Yasuda
Information Security Journal: A Global Perspective 30 (4), 219-234, 2021
282021
Lattice-based IBE with equality test in standard model
DH Duong, HQ Le, PS Roy, W Susilo
Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD …, 2019
222019
Uniform analytic properties of representation zeta functions of finitely generated nilpotent groups
D Dung, C Voll
Transactions of the American Mathematical Society 369 (9), 6327-6349, 2017
222017
Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model
P Dutta, W Susilo, DH Duong, PS Roy
Theoretical Computer Science 871, 16-29, 2021
212021
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing
H Wang, Y Li, W Susilo, DH Duong, F Luo
Computer Standards & Interfaces 82, 103635, 2022
202022
From helpfulness prediction to helpful review retrieval for online product reviews
C Vo, D Duong, D Nguyen, T Cao
Proceedings of the 9th International Symposium on Information and …, 2018
192018
Lattice-based HRA-secure attribute-based proxy re-encryption in standard model
W Susilo, P Dutta, DH Duong, PS Roy
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
182021
An efficient multivariate threshold ring signature scheme
DH Duong, HTN Tran, W Susilo
Computer Standards & Interfaces 74, 103489, 2021
162021
Chosen-ciphertext secure homomorphic proxy re-encryption
F Luo, S Al-Kuwari, W Susilo, DH Duong
IEEE Transactions on Cloud Computing 10 (4), 2398-2408, 2020
142020
Wildcarded Identity-Based Encryption with Constant-size Ciphertext and Secret Key.
DH Duong, W Susilo, VC Trinh
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11 (2), 74-86, 2020
132020
Lattice-based IBE with equality test supporting flexible authorization in the standard model
GLD Nguyen, W Susilo, DH Duong, HQ Le, F Guo
Progress in Cryptology–INDOCRYPT 2020: 21st International Conference on …, 2020
132020
Puncturable encryption: a generic construction from delegatable fully key-homomorphic encryption
W Susilo, DH Duong, HQ Le, J Pieprzyk
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
132020
A blind signature from module latices
HQ Le, W Susilo, TX Khuc, MK Bui, DH Duong
2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019
132019
Enhancement for secure multiple matrix multiplications over ring-LWE homomorphic encryption
PK Mishra, DH Duong, M Yasuda
Information Security Practice and Experience: 13th International Conference …, 2017
132017
Lattice-based signcryption with equality test in standard model
HQ Le, DH Duong, PS Roy, W Susilo, K Fukushima, S Kiyomoto
Computer Standards & Interfaces 76, 103515, 2021
122021
Attribute-based proxy re-signature from standard lattices and its applications
F Luo, S Al-Kuwari, W Susilo, DH Duong
Computer Standards & Interfaces 75, 103499, 2021
122021
On normal subgroups of division rings which are radical over a proper division subring
M Bien, D Dung
Studia Scientiarum Mathematicarum Hungarica 51 (2), 231-242, 2014
122014
The system can't perform the operation now. Try again later.
Articles 1–20