Dung Hoang Duong
Orcid: 0000-0001-8057-4060
According to our database1,
Dung Hoang Duong
authored at least 67 papers
between 2016 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Forensics Secur., 2024
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024
Proceedings of the Information Security Practice and Experience, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Future Internet, 2023
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023
Blockchain Oracles: Implications for Smart Contracts in Legal Reasoning and Addressing the Oracle Problem.
Proceedings of the 12th International Symposium on Information and Communication Technology, 2023
Proceedings of the Provable and Practical Security, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model.
Theor. Comput. Sci., 2022
Theor. Comput. Sci., 2022
Chosen-ciphertext lattice-based public key encryption with equality test in standard model.
Theor. Comput. Sci., 2022
IEEE Trans. Cloud Comput., 2022
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms.
IACR Cryptol. ePrint Arch., 2022
Lattice-based Public Key Encryption with Multi-Ciphertexts Equality Test in Cloud Computing.
IACR Cryptol. ePrint Arch., 2022
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More.
IACR Cryptol. ePrint Arch., 2022
On digital signatures based on isomorphism problems: QROM security and ring signatures.
IACR Cryptol. ePrint Arch., 2022
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing.
Comput. Stand. Interfaces, 2022
Proceedings of the Provable and Practical Security, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model.
Theor. Comput. Sci., 2021
Inf. Secur. J. A Glob. Perspect., 2021
Comput. Stand. Interfaces, 2021
Comput. Stand. Interfaces, 2021
Comput. Stand. Interfaces, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
Identity-based Unidirectional Proxy Re-Encryption and Re-Signature in Standard Model: Lattice-based Constructions.
J. Internet Serv. Inf. Secur., 2020
A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme.
Inf., 2020
Int. J. Netw. Comput., 2020
IET Inf. Secur., 2020
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction.
Proceedings of the Information Security Applications - 21st International Conference, 2020
Lattice-Based IBE with Equality Test Supporting Flexible Authorization in the Standard Model.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem EFC.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Provable Security, 2019
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard Model.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption.
Proceedings of the Information Security Practice and Experience, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016