What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Phong Q. Nguyen
Google Scholar
51
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/joc
Correction to: A Complete Analysis of the BKZ Lattice Reduction Algorithm.
Jianwei Li
Phong Q. Nguyen
2025
journals/joc
A Complete Analysis of the BKZ Lattice Reduction Algorithm.
Jianwei Li
Phong Q. Nguyen
2020
conf/crypto
Slide Reduction, Revisited - Filling the Gaps in SVP Approximation.
Divesh Aggarwal
Jianwei Li
Phong Q. Nguyen
Noah Stephens-Davidowitz
2018
conf/crypto
Lower Bounds on Lattice Enumeration with Extreme Pruning.
Yoshinori Aono
Phong Q. Nguyen
Takenobu Seito
Junji Shikata
2018
conf/asiacrypt
Quantum Lattice Enumeration and Tweaking Discrete Pruning.
Yoshinori Aono
Phong Q. Nguyen
Yixin Shen
2017
conf/eurocrypt
Random Sampling Revisited: Lattice Enumeration with Discrete Pruning.
Yoshinori Aono
Phong Q. Nguyen
2016
conf/eurocrypt
Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems.
Nicolas Gama
Malika Izabachène
Phong Q. Nguyen
Xiang Xie
2015
conf/pkc
Simpler Efficient Group Signatures from Lattices.
Phong Q. Nguyen
Jiang Zhang
Zhenfeng Zhang
2014
conf/pkc
Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences.
Jingguo Bi
Jean-Sébastien Coron
Jean-Charles Faugère
Phong Q. Nguyen
Guénaël Renault
Rina Zeitoun
2013
conf/ctrsa
Solving BDD by Enumeration: An Update.
Mingjie Liu
Phong Q. Nguyen
2012
conf/eurocrypt
Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers.
Yuanmi Chen
Phong Q. Nguyen
2012
conf/asiacrypt
Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures.
Léo Ducas
Phong Q. Nguyen
2012
conf/asiacrypt
Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic.
Léo Ducas
Phong Q. Nguyen
2011
conf/ches
Modulus Fault Attacks against RSA-CRT Signatures.
Eric Brier
David Naccache
Phong Q. Nguyen
Mehdi Tibouchi
2011
conf/eurocrypt
Lattice Reduction Algorithms: Theory and Practice.
Phong Q. Nguyen
2011
conf/asiacrypt
BKZ 2.0: Better Lattice Security Estimates.
Yuanmi Chen
Phong Q. Nguyen
2011
conf/cans
Breaking Fully-Homomorphic-Encryption Challenges.
Phong Q. Nguyen
2010
conf/eurocrypt
Lattice Enumeration Using Extreme Pruning.
Nicolas Gama
Phong Q. Nguyen
Oded Regev
2009
journals/joc
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures.
Phong Q. Nguyen
Oded Regev
2009
conf/crypto
How Risky Is the Random-Oracle Model?
Gaëtan Leurent
Phong Q. Nguyen
2009
conf/asiacrypt
<sup>2</sup> with Quadratic Forms: Nice Cryptanalyses.
Guilhem Castagnos
Antoine Joux
Fabien Laguillaumie
Phong Q. Nguyen
2008
conf/eurocrypt
Predicting Lattice Reduction.
Nicolas Gama
Phong Q. Nguyen
2007
conf/crypto
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.
Pierre-Alain Fouque
Gaëtan Leurent
Phong Q. Nguyen
2007
conf/pkc
New Chosen-Ciphertext Attacks on NTRU.
Nicolas Gama
Phong Q. Nguyen
2006
conf/crypto
Rankin's Constant and Blockwise Lattice Reduction.
Nicolas Gama
Nick Howgrave-Graham
Henrik Koy
Phong Q. Nguyen
2006
conf/eurocrypt
Symplectic Lattice Reduction and NTRU.
Nicolas Gama
Nick Howgrave-Graham
Phong Q. Nguyen
2006
conf/eurocrypt
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures.
Phong Q. Nguyen
Oded Regev
2005
conf/fse
Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4.
Eli Biham
Louis Granboulan
Phong Q. Nguyen
2005
conf/pkc
Experimenting with Faults, Lattices and the DSA.
David Naccache
Phong Q. Nguyen
Michael Tunstall
Claire Whelan
2005
conf/eurocrypt
Floating-Point LLL Revisited.
Phong Q. Nguyen
Damien Stehlé
2005
conf/asiacrypt
Adapting Density Attacks to Low-Weight Knapsacks.
Phong Q. Nguyen
Jacques Stern
2004
conf/eurocrypt
Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3.
Phong Q. Nguyen
2003
conf/crypto
The Impact of Decryption Failures on the Security of NTRU Encryption.
Nick Howgrave-Graham
Phong Q. Nguyen
David Pointcheval
John Proos
Joseph H. Silverman
Ari Singer
William Whyte
2002
journals/joc
The Insecurity of the Digital Signature Algorithm with Partially Known Nonces.
Phong Q. Nguyen
Igor E. Shparlinski
2002
conf/crypto
Analysis and Improvements of NTRU Encryption Paddings.
Phong Q. Nguyen
David Pointcheval
2002
conf/ctrsa
Proprietary Certificates.
Markus Jakobsson
Ari Juels
Phong Q. Nguyen
2002
conf/asiacrypt
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm.
Dario Catalano
Phong Q. Nguyen
Jacques Stern
2001
conf/ccs
Paillier's cryptosystem revisited.
Dario Catalano
Rosario Gennaro
Nick Howgrave-Graham
Phong Q. Nguyen
2001
conf/asiacrypt
On the Insecurity of a Server-Aided RSA Protocol.
Phong Q. Nguyen
Igor E. Shparlinski
2001
conf/sacrypt
The Two Faces of Lattices in Cryptology.
Phong Q. Nguyen
2000
conf/eurocrypt
Noisy Polynomial Interpolation and Noisy Chinese Remaindering.
Daniel Bleichenbacher
Phong Q. Nguyen
2000
conf/asiacrypt
Why Textbook ElGamal and RSA Encryption Are Insecure.
Dan Boneh
Antoine Joux
Phong Q. Nguyen
2000
conf/asiacrypt
Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99.
Glenn Durfee
Phong Q. Nguyen
2000
conf/sacrypt
DFCv2.
Louis Granboulan
Phong Q. Nguyen
Fabrice Noilhan
Serge Vaudenay
1999
conf/crypto
The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications.
Phong Q. Nguyen
Jacques Stern
1999
conf/crypto
Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97.
Phong Q. Nguyen
1999
conf/pkc
The Effectiveness of Lattice Attacks Against Low-Exponent RSA.
Christophe Coupé
Phong Q. Nguyen
Jacques Stern
1998
conf/crypto
Cryptanalysis of the Ajtai-Dwork Cryptosystem.
Phong Q. Nguyen
Jacques Stern
1998
conf/asiacrypt
The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure.
Phong Q. Nguyen
Jacques Stern
1998
conf/sacrypt
Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97.
Phong Q. Nguyen
Jacques Stern
1997
conf/crypto
Merkle-Hellman Revisited: A Cryptanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations.
Phong Q. Nguyen
Jacques Stern
Coauthors
Antoine Joux
(2)
Ari Juels
(1)
Ari Singer
(1)
Christophe Coupé
(1)
Claire Whelan
(1)
Damien Stehlé
(1)
Dan Boneh
(1)
Daniel Bleichenbacher
(1)
Dario Catalano
(2)
David Naccache
(2)
David Pointcheval
(2)
Divesh Aggarwal
(1)
Eli Biham
(1)
Eric Brier
(1)
Fabien Laguillaumie
(1)
Fabrice Noilhan
(1)
Gaëtan Leurent
(2)
Glenn Durfee
(1)
Guénaël Renault
(1)
Guilhem Castagnos
(1)
Henrik Koy
(1)
Igor E. Shparlinski
(2)
Jacques Stern
(8)
Jean-Charles Faugère
(1)
Jean-Sébastien Coron
(1)
Jiang Zhang
(1)
Jianwei Li
(3)
Jingguo Bi
(1)
John Proos
(1)
Joseph H. Silverman
(1)
Junji Shikata
(1)
Léo Ducas
(2)
Louis Granboulan
(2)
Malika Izabachène
(1)
Markus Jakobsson
(1)
Mehdi Tibouchi
(1)
Michael Tunstall
(1)
Mingjie Liu
(1)
Nick Howgrave-Graham
(4)
Nicolas Gama
(6)
Noah Stephens-Davidowitz
(1)
Oded Regev
(3)
Phong Q. Nguyen
(51)
Pierre-Alain Fouque
(1)
Rina Zeitoun
(1)
Rosario Gennaro
(1)
Serge Vaudenay
(1)
Takenobu Seito
(1)
William Whyte
(1)
Xiang Xie
(1)
Yixin Shen
(1)
Yoshinori Aono
(3)
Yuanmi Chen
(2)
Zhenfeng Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to