The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Duong Hieu Phan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Benoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval
    Optimal Asymmetric Encryption and Signature Paddings. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:254-268 [Conf]
  2. Duong Hieu Phan, David Pointcheval
    Chosen-Ciphertext Security without Redundancy. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:1-18 [Conf]
  3. Duong Hieu Phan, David Pointcheval
    OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:63-77 [Conf]
  4. Hervé Chabanne, Duong Hieu Phan, David Pointcheval
    Public Traceability in Traitor Tracing Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:542-558 [Conf]
  5. Duong Hieu Phan, Reihaneh Safavi-Naini, Dongvu Tonien
    Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:264-275 [Conf]
  6. Duong Hieu Phan, David Pointcheval
    Une comparaison entre deux méthodes de preuve de sécurité. [Citation Graph (0, 0)][DBLP]
    RIVF, 2003, pp:105-110 [Conf]
  7. Duong Hieu Phan, David Pointcheval
    About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations). [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2004, pp:182-197 [Conf]
  8. Duong Hieu Phan, David Pointcheval
    On the Security Notions for Public-Key Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:33-46 [Conf]
  9. Duong Hieu Phan
    Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:354-365 [Conf]
  10. Nguyen Thanh Thuy, Duong Hieu Phan, Takahiro Yamanoi
    Some Preliminary Results on the Stableness of Extended F-rule Systems. [Citation Graph (0, 0)][DBLP]
    JACIII, 2003, v:7, n:3, pp:252-259 [Journal]
  11. Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan
    Traitor Tracing with Optimal Transmission Rate. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:71-88 [Conf]
  12. Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart
    Identity-Based Traitor Tracing. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:361-376 [Conf]

  13. Hybrid Damgård Is CCA1-Secure under the DDH Assumption. [Citation Graph (, )][DBLP]


  14. Traitors Collaborating in Public: Pirates 2.0. [Citation Graph (, )][DBLP]


  15. A CCA Secure Hybrid Damgård's ElGamal Encryption. [Citation Graph (, )][DBLP]


  16. Efficient Traitor Tracing from Collusion Secure Codes. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002