|
Search the dblp DataBase
Duong Hieu Phan:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Benoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval
Optimal Asymmetric Encryption and Signature Paddings. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:254-268 [Conf]
- Duong Hieu Phan, David Pointcheval
Chosen-Ciphertext Security without Redundancy. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2003, pp:1-18 [Conf]
- Duong Hieu Phan, David Pointcheval
OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2004, pp:63-77 [Conf]
- Hervé Chabanne, Duong Hieu Phan, David Pointcheval
Public Traceability in Traitor Tracing Schemes. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:542-558 [Conf]
- Duong Hieu Phan, Reihaneh Safavi-Naini, Dongvu Tonien
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. [Citation Graph (0, 0)][DBLP] ICALP (2), 2006, pp:264-275 [Conf]
- Duong Hieu Phan, David Pointcheval
Une comparaison entre deux méthodes de preuve de sécurité. [Citation Graph (0, 0)][DBLP] RIVF, 2003, pp:105-110 [Conf]
- Duong Hieu Phan, David Pointcheval
About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations). [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2004, pp:182-197 [Conf]
- Duong Hieu Phan, David Pointcheval
On the Security Notions for Public-Key Encryption Schemes. [Citation Graph (0, 0)][DBLP] SCN, 2004, pp:33-46 [Conf]
- Duong Hieu Phan
Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate. [Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:354-365 [Conf]
- Nguyen Thanh Thuy, Duong Hieu Phan, Takahiro Yamanoi
Some Preliminary Results on the Stableness of Extended F-rule Systems. [Citation Graph (0, 0)][DBLP] JACIII, 2003, v:7, n:3, pp:252-259 [Journal]
- Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan
Traitor Tracing with Optimal Transmission Rate. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:71-88 [Conf]
- Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart
Identity-Based Traitor Tracing. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2007, pp:361-376 [Conf]
Hybrid Damgård Is CCA1-Secure under the DDH Assumption. [Citation Graph (, )][DBLP]
Traitors Collaborating in Public: Pirates 2.0. [Citation Graph (, )][DBLP]
A CCA Secure Hybrid Damgård's ElGamal Encryption. [Citation Graph (, )][DBLP]
Efficient Traitor Tracing from Collusion Secure Codes. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|