default search action
Dung Hoang Duong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Mei Jiang, Yannan Li, Willy Susilo, Dung Hoang Duong:
Quantum-Safe Puncturable Signatures With Their Application in Blockchain. IEEE Trans. Inf. Forensics Secur. 19: 2761-2770 (2024) - [c37]Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems. ACISP (2) 2024: 269-289 - [c36]Thanh Xuan Khuc, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Threshold Ring Signatures with Accountability. ACISP (1) 2024: 368-388 - [c35]Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Shrinkable Ring Signatures: It Wasn't Them! ISPEC 2024: 75-93 - [c34]Markus Bläser, Zhili Chen, Dung Hoang Duong, Antoine Joux, Tuong Ngoc Nguyen, Thomas Plantard, Youming Qiao, Willy Susilo, Gang Tang:
On Digital Signatures Based on Group Actions: QROM Security and Ring Signatures. PQCrypto (1) 2024: 227-261 - 2023
- [j24]Duy Tung Khanh Nguyen, Dung Hoang Duong, Willy Susilo, Yang-Wai Chow, Anh The Ta:
HeFUN: Homomorphic Encryption for Unconstrained Secure Neural Network Inference. Future Internet 15(12): 407 (2023) - [c33]Thanh Xuan Khuc, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Compact Accountable Ring Signatures in the Plain Model. Inscrypt (1) 2023: 23-43 - [c32]Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Compact Ring Signatures with Post-Quantum Security in Standard Model. Inscrypt (1) 2023: 65-84 - [c31]Minh Thuy Truc Pham, Dung Hoang Duong, Yannan Li, Willy Susilo:
Threshold Ring Signature Scheme from Cryptographic Group Action. ProvSec 2023: 207-227 - [c30]Minh Vu Nguyen, Ngoc-Thuy Le, Dung Hoang Duong, Yannan Li, Madhav Mukherjee:
Blockchain Oracles: Implications for Smart Contracts in Legal Reasoning and Addressing the Oracle Problem. SoICT 2023: 296-303 - [c29]Thanh Xuan Khuc, Anh The Ta, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism Problems. SPACE 2023: 214-241 - 2022
- [j23]Haiyan Wang, Yuan Li, Willy Susilo, Dung Hoang Duong, Fucai Luo:
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing. Comput. Stand. Interfaces 82: 103635 (2022) - [j22]Fucai Luo, Saif M. Al-Kuwari, Willy Susilo, Dung Hoang Duong:
Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption. IEEE Trans. Cloud Comput. 10(4): 2398-2408 (2022) - [j21]Minh Thuy Truc Pham, Ngoc Ai Van Nguyen, Mei Jiang, Dung Hoang Duong, Willy Susilo:
Wildcarded identity-based encryption from lattices. Theor. Comput. Sci. 902: 41-53 (2022) - [j20]Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto, Arnaud Sipasseuth:
Chosen-ciphertext lattice-based public key encryption with equality test in standard model. Theor. Comput. Sci. 905: 31-53 (2022) - [j19]Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Partha Sarathi Roy:
Puncturable identity-based and attribute-based encryption from lattices. Theor. Comput. Sci. 929: 18-38 (2022) - [j18]Partha Sarathi Roy, Dung Hoang Duong, Willy Susilo, Arnaud Sipasseuth, Kazuhide Fukushima, Shinsaku Kiyomoto:
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model. Theor. Comput. Sci. 929: 124-139 (2022) - [c28]Priyanka Dutta, Mei Jiang, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security. AsiaCCS 2022: 408-422 - [c27]Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk:
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More. ESORICS (1) 2022: 283-302 - [c26]Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signatures from Lattices. ESORICS (2) 2022: 447-466 - [c25]Mei Jiang, Dung Hoang Duong, Willy Susilo:
Puncturable Signature: A Generic Construction and Instantiations. ESORICS (2) 2022: 507-527 - [c24]Gang Tang, Dung Hoang Duong, Antoine Joux, Thomas Plantard, Youming Qiao, Willy Susilo:
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms. EUROCRYPT (3) 2022: 582-612 - [c23]Priyanka Dutta, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices. ProvSec 2022: 121-136 - [i20]Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk:
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More. IACR Cryptol. ePrint Arch. 2022: 95 (2022) - [i19]Giang Linh Duc Nguyen, Dung Hoang Duong, Huy Quoc Le, Willy Susilo:
Lattice-based Public Key Encryption with Multi-Ciphertexts Equality Test in Cloud Computing. IACR Cryptol. ePrint Arch. 2022: 199 (2022) - [i18]Gang Tang, Dung Hoang Duong, Antoine Joux, Thomas Plantard, Youming Qiao, Willy Susilo:
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms. IACR Cryptol. ePrint Arch. 2022: 267 (2022) - [i17]Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signatures From Lattices. IACR Cryptol. ePrint Arch. 2022: 1070 (2022) - [i16]Zhili Chen, Dung Hoang Duong, Tuong Ngoc Nguyen, Youming Qiao, Willy Susilo, Gang Tang:
On digital signatures based on isomorphism problems: QROM security and ring signatures. IACR Cryptol. ePrint Arch. 2022: 1184 (2022) - 2021
- [j17]Huy Quoc Le, Bay Vo, Dung Hoang Duong, Willy Susilo, Ngoc-Thuy Le, Kazuhide Fukushima, Shinsaku Kiyomoto:
Identity-Based Linkable Ring Signatures From Lattices. IEEE Access 9: 84739-84755 (2021) - [j16]Dung Hoang Duong, Ha Thanh Nguyen Tran, Willy Susilo, Le Van Luyen:
An efficient multivariate threshold ring signature scheme. Comput. Stand. Interfaces 74: 103489 (2021) - [j15]Fucai Luo, Saif M. Al-Kuwari, Willy Susilo, Dung Hoang Duong:
Attribute-based proxy re-signature from standard lattices and its applications. Comput. Stand. Interfaces 75: 103499 (2021) - [j14]Huy Quoc Le, Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Lattice-based signcryption with equality test in standard model. Comput. Stand. Interfaces 76: 103515 (2021) - [j13]Pradeep Kumar Mishra, Deevashwer Rathee, Dung Hoang Duong, Masaya Yasuda:
Fast secure matrix multiplications over ring-based homomorphic encryption. Inf. Secur. J. A Glob. Perspect. 30(4): 219-234 (2021) - [j12]Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Partha Sarathi Roy:
Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model. Theor. Comput. Sci. 871: 16-29 (2021) - [c22]Anh The Ta, Thanh Xuan Khuc, Tuong Ngoc Nguyen, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signature for Blockchain Privacy Protection. ACISP 2021: 391-407 - [c21]Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Partha Sarathi Roy:
Puncturable Identity-Based Encryption from Lattices. ACISP 2021: 571-589 - [c20]Willy Susilo, Priyanka Dutta, Dung Hoang Duong, Partha Sarathi Roy:
Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Model. ESORICS (2) 2021: 169-191 - 2020
- [j11]Dung Hoang Duong, Willy Susilo, Ha Thanh Nguyen Tran:
A Multivariate Blind Ring Signature Scheme. Comput. J. 63(8): 1194-1202 (2020) - [j10]Zhichao Yang, Dung Hoang Duong, Willy Susilo, Guomin Yang, Chao Li, Rongmao Chen:
Hierarchical Identity-Based Signature in Polynomial Rings. Comput. J. 63(10): 1490-1499 (2020) - [j9]Dung Hoang Duong, Le Van Luyen, Ha Thanh Nguyen Tran:
Choosing subfields for LUOV and lifting fields for rainbow. IET Inf. Secur. 14(2): 196-201 (2020) - [j8]Huy Quoc Le, Pradeep Kumar Mishra, Satoshi Nakamura, Koha Kinjo, Dung Hoang Duong, Masaya Yasuda:
Impact of the modulus switching technique on some attacks against learning problems. IET Inf. Secur. 14(3): 286-303 (2020) - [j7]Hiroki Furue, Dung Hoang Duong, Tsuyoshi Takagi:
An Efficient MQ-based Signature with Tight Security Proof. Int. J. Netw. Comput. 10(2): 308-324 (2020) - [j6]Dung Hoang Duong, Willy Susilo, Viet Cuong Trinh:
A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme. Inf. 11(5): 260 (2020) - [j5]Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Joonsang Baek, Partha Sarathi Roy:
Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions. J. Internet Serv. Inf. Secur. 10(4): 1-22 (2020) - [j4]Dung Hoang Duong, Willy Susilo, Viet Cuong Trinh:
Wildcarded Identity-Based Encryption with Constant-size Ciphertext and Secret Key. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(2): 74-86 (2020) - [c19]Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Ha Thanh Nguyen Tran, Viet Cuong Trinh, Josef Pieprzyk, Thomas Plantard:
Lattice Blind Signatures with Forward Security. ACISP 2020: 3-22 - [c18]Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk:
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model. ACNS (1) 2020: 130-149 - [c17]Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk:
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption. ESORICS (2) 2020: 107-127 - [c16]Willy Susilo, Dung Hoang Duong, Huy Quoc Le:
Efficient Post-quantum Identity-based Encryption with Equality Test. ICPADS 2020: 633-640 - [c15]Giang Linh Duc Nguyen, Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Fuchun Guo:
Lattice-Based IBE with Equality Test Supporting Flexible Authorization in the Standard Model. INDOCRYPT 2020: 624-643 - [c14]Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Joonsang Baek, Partha Sarathi Roy:
Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction. WISA 2020: 245-257 - [i15]Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto, Arnaud Sipasseuth:
Lattice-based public key encryption with equality test in standard model, revisited. CoRR abs/2005.03178 (2020) - [i14]Dung Hoang Duong, Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy, Arnaud Sipasseuth, Willy Susilo:
Lattice-based public key encryption with equality test supporting flexible authorization in standard model. CoRR abs/2005.05308 (2020) - [i13]Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Joonsang Baek, Partha Sarathi Roy:
Lattice-based Unidirectional IBPRE Secure in Standard Model. CoRR abs/2005.06741 (2020) - [i12]Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk:
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption. CoRR abs/2007.06353 (2020) - [i11]Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Josef Pieprzyk:
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model. CoRR abs/2007.06881 (2020) - [i10]Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Ha Thanh Nguyen Tran, Viet Cuong Trinh, Josef Pieprzyk, Thomas Plantard:
Lattice Blind Signatures with Forward Security. CoRR abs/2007.06884 (2020) - [i9]Giang L. D. Nguyen, Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Fuchun Guo:
Lattice-based IBE with Equality Test Supporting Flexible Authorization in the Standard Model. CoRR abs/2010.14077 (2020) - [i8]Priyanka Dutta, Willy Susilo, Dung Hoang Duong, Partha Sarathi Roy:
Collusion-Resistant Identity-based Proxy Re-Encryption: Lattice-based Constructions in Standard Model. CoRR abs/2011.08456 (2020) - [i7]Huy Quoc Le, Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Lattice-based Signcryption with Equality Test in Standard Model. CoRR abs/2012.15423 (2020) - [i6]Willy Susilo, Dung Hoang Duong, Huy Quoc Le, Josef Pieprzyk:
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2020: 882 (2020)
2010 – 2019
- 2019
- [j3]Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi:
The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem EFC. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1028-1036 (2019) - [c13]Dung Hoang Duong, Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy, Willy Susilo:
A Lattice-Based Public Key Encryption with Equality Test in Standard Model. ACISP 2019: 138-155 - [c12]Dung Hoang Duong, Willy Susilo, Minh Kim Bui, Thanh Xuan Khuc:
A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model. Inscrypt 2019: 50-65 - [c11]Huy Quoc Le, Willy Susilo, Thanh Xuan Khuc, Minh Kim Bui, Dung Hoang Duong:
A Blind Signature from Module Latices. DSC 2019: 1-8 - [c10]Hiroki Furue, Dung Hoang Duong, Tsuyoshi Takagi:
An Efficient MQ-Based Signature in the QROM. CANDAR 2019: 10-17 - [c9]Dung Hoang Duong, Huy Quoc Le, Partha Sarathi Roy, Willy Susilo:
Lattice-Based IBE with Equality Test in Standard Model. ProvSec 2019: 19-40 - [c8]Huy Quoc Le, Dung Hoang Duong, Willy Susilo:
A Blind Ring Signature Based on the Short Integer Solution Problem. WISA 2019: 92-111 - 2018
- [j2]Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
An Efficient Key Generation of ZHFE Public Key Cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 29-38 (2018) - [c7]Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi:
Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes. ACISP 2018: 487-501 - [c6]Huy Quoc Le, Pradeep Kumar Mishra, Dung Hoang Duong, Masaya Yasuda:
Solving LWR via BDD Strategy: Modulus Switching Approach. CANS 2018: 357-376 - [i5]Pradeep Kumar Mishra, Deevashwer Rathee, Dung Hoang Duong, Masaya Yasuda:
Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2018: 663 (2018) - 2017
- [j1]Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
CyclicSRP - A Multivariate Encryption Scheme with a Partially Cyclic Public Key. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(12): 2691-2698 (2017) - [c5]Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
Revisiting the Efficient Key Generation of ZHFE. C2SI 2017: 195-212 - [c4]Pradeep Kumar Mishra, Dung Hoang Duong, Masaya Yasuda:
Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption. ISPEC 2017: 320-330 - [c3]Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi:
Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU. ISC 2017: 79-91 - [e1]Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong:
Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project. Mathematics for Industry, Springer Singapore 2017, ISBN 978-981-10-5064-0 [contents] - [i4]Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi:
Choosing Parameters for the Subfield Lattice Attack against overstretched NTRU. IACR Cryptol. ePrint Arch. 2017: 959 (2017) - 2016
- [c2]Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
Reducing the Key Size of the SRP Encryption Scheme. ACISP (2) 2016: 427-434 - [c1]Dung Hoang Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi:
Revisiting the Cubic UOV Signature Scheme. ICISC 2016: 223-238 - [i3]Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
Reducing the Key Size of the SRP Encryption Scheme - Extended version. IACR Cryptol. ePrint Arch. 2016: 383 (2016) - [i2]Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
Revisiting the Efficient Key Generation of ZHFE. IACR Cryptol. ePrint Arch. 2016: 1065 (2016) - [i1]Dung Hoang Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi:
Revisiting the Cubic UOV Signature Scheme. IACR Cryptol. ePrint Arch. 2016: 1079 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint