What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Dung Hoang Duong
Google Scholar
ORCID:
0000-0001-8057-4060
27
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Symphony of Speeds: Harmonizing Classic McEliece Cryptography With GPU Innovation.
Wen Wu
Jiankuo Dong
Zhen Xu
Zhenjiang Dong
Dung Hoang Duong
Fu Xiao
Jingqiang Lin
2024
journals/tifs
Quantum-Safe Puncturable Signatures With Their Application in Blockchain.
Mei Jiang
Yannan Li
Willy Susilo
Dung Hoang Duong
2024
conf/acisp
Threshold Ring Signatures with Accountability.
Thanh Xuan Khuc
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2024
conf/acisp
A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems.
Tuong Ngoc Nguyen
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2024
conf/provsec
Tightly Secure Identity-Based Signature from Cryptographic Group Actions.
Thanh Xuan Khuc
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Hyungrok Jo
Tsuyoshi Takagi
2024
conf/provsec
Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from Standard Assumptions.
Thanh Xuan Khuc
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2023
conf/provsec
Threshold Ring Signature Scheme from Cryptographic Group Action.
Minh Thuy Truc Pham
Dung Hoang Duong
Yannan Li
Willy Susilo
2022
conf/provsec
Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices.
Priyanka Dutta
Dung Hoang Duong
Willy Susilo
Kazuhide Fukushima
Shinsaku Kiyomoto
2022
conf/esorics
Puncturable Signature: A Generic Construction and Instantiations.
Mei Jiang
Dung Hoang Duong
Willy Susilo
2022
conf/esorics
Spatial Encryption Revisited: From Delegatable Multiple Inner Product Encryption and More.
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
Josef Pieprzyk
2022
conf/esorics
Efficient Unique Ring Signatures from Lattices.
Tuong Ngoc Nguyen
Anh The Ta
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2022
conf/asiaccs
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security.
Priyanka Dutta
Mei Jiang
Dung Hoang Duong
Willy Susilo
Kazuhide Fukushima
Shinsaku Kiyomoto
2022
conf/eurocrypt
Practical Post-Quantum Signature Schemes from Isomorphism Problems of Trilinear Forms.
Gang Tang
Dung Hoang Duong
Antoine Joux
Thomas Plantard
Youming Qiao
Willy Susilo
2021
conf/acisp
Puncturable Identity-Based Encryption from Lattices.
Priyanka Dutta
Willy Susilo
Dung Hoang Duong
Partha Sarathi Roy
2021
conf/acisp
Efficient Unique Ring Signature for Blockchain Privacy Protection.
Anh The Ta
Thanh Xuan Khuc
Tuong Ngoc Nguyen
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
Kazuhide Fukushima
Shinsaku Kiyomoto
2021
conf/esorics
Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Model.
Willy Susilo
Priyanka Dutta
Dung Hoang Duong
Partha Sarathi Roy
2020
conf/acisp
Lattice Blind Signatures with Forward Security.
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
Ha Thanh Nguyen Tran
Viet Cuong Trinh
Josef Pieprzyk
Thomas Plantard
2020
conf/acns
Trapdoor Delegation and HIBE from Middle-Product LWE in Standard Model.
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
Josef Pieprzyk
2020
conf/esorics
Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption.
Willy Susilo
Dung Hoang Duong
Huy Quoc Le
Josef Pieprzyk
2020
conf/wisa
Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction.
Priyanka Dutta
Willy Susilo
Dung Hoang Duong
Joonsang Baek
Partha Sarathi Roy
2019
conf/acisp
A Lattice-Based Public Key Encryption with Equality Test in Standard Model.
Dung Hoang Duong
Kazuhide Fukushima
Shinsaku Kiyomoto
Partha Sarathi Roy
Willy Susilo
2019
conf/provsec
Lattice-Based IBE with Equality Test in Standard Model.
Dung Hoang Duong
Huy Quoc Le
Partha Sarathi Roy
Willy Susilo
2019
conf/wisa
A Blind Ring Signature Based on the Short Integer Solution Problem.
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
2018
conf/acisp
Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes.
Yacheng Wang
Yasuhiko Ikematsu
Dung Hoang Duong
Tsuyoshi Takagi
2018
conf/cans
Solving LWR via BDD Strategy: Modulus Switching Approach.
Huy Quoc Le
Pradeep Kumar Mishra
Dung Hoang Duong
Masaya Yasuda
2016
conf/acisp
Reducing the Key Size of the SRP Encryption Scheme.
Dung Hoang Duong
Albrecht Petzoldt
Tsuyoshi Takagi
2016
conf/icisc
Revisiting the Cubic UOV Signature Scheme.
Dung Hoang Duong
Albrecht Petzoldt
Yacheng Wang
Tsuyoshi Takagi
Coauthors
Albrecht Petzoldt
(2)
Anh The Ta
(2)
Antoine Joux
(1)
Dung Hoang Duong
(27)
Fu Xiao
(1)
Fuchun Guo
(5)
Gang Tang
(1)
Ha Thanh Nguyen Tran
(1)
Huy Quoc Le
(9)
Hyungrok Jo
(1)
Jiankuo Dong
(1)
Jingqiang Lin
(1)
Joonsang Baek
(1)
Josef Pieprzyk
(4)
Kazuhide Fukushima
(8)
Masaya Yasuda
(1)
Mei Jiang
(3)
Minh Thuy Truc Pham
(1)
Partha Sarathi Roy
(5)
Pradeep Kumar Mishra
(1)
Priyanka Dutta
(5)
Shinsaku Kiyomoto
(8)
Thanh Xuan Khuc
(4)
Thomas Plantard
(2)
Tsuyoshi Takagi
(4)
Tuong Ngoc Nguyen
(3)
Viet Cuong Trinh
(1)
Wen Wu
(1)
Willy Susilo
(22)
Yacheng Wang
(2)
Yannan Li
(2)
Yasuhiko Ikematsu
(1)
Youming Qiao
(1)
Zhen Xu
(1)
Zhenjiang Dong
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to