Search the dblp DataBase
Phong Q. Nguyen :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Phong Q. Nguyen A Montgomery-Like Square Root for the Number Field Sieve. [Citation Graph (0, 0)][DBLP ] ANTS, 1998, pp:151-168 [Conf ] Phong Q. Nguyen , Jacques Stern Lattice Reduction in Cryptology: An Update. [Citation Graph (0, 0)][DBLP ] ANTS, 2000, pp:85-112 [Conf ] Phong Q. Nguyen , Damien Stehlé Low-Dimensional Lattice Basis Reduction Revisited. [Citation Graph (0, 0)][DBLP ] ANTS, 2004, pp:338-357 [Conf ] Phong Q. Nguyen , Damien Stehlé LLL on the Average. [Citation Graph (0, 0)][DBLP ] ANTS, 2006, pp:238-256 [Conf ] Dario Catalano , Phong Q. Nguyen , Jacques Stern The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:299-310 [Conf ] Dan Boneh , Antoine Joux , Phong Q. Nguyen Why Textbook ElGamal and RSA Encryption Are Insecure. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:30-43 [Conf ] Glenn Durfee , Phong Q. Nguyen Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:14-29 [Conf ] Phong Q. Nguyen , Igor Shparlinski On the Insecurity of a Server-Aided RSA Protocol. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:21-35 [Conf ] Phong Q. Nguyen , Jacques Stern Adapting Density Attacks to Low-Weight Knapsacks. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2005, pp:41-58 [Conf ] Phong Q. Nguyen , Jacques Stern The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:372-379 [Conf ] Edwin El Mahassni , Phong Q. Nguyen , Igor Shparlinski The Insecurity of Nyberg-Rueppel and Other DSA-Like Signature Schemes with Partially Known Nonces. [Citation Graph (0, 0)][DBLP ] CaLC, 2001, pp:97-109 [Conf ] Phong Q. Nguyen , Jacques Stern The Two Faces of Lattices in Cryptology. [Citation Graph (0, 0)][DBLP ] CaLC, 2001, pp:146-180 [Conf ] Dario Catalano , Rosario Gennaro , Nick Howgrave-Graham , Phong Q. Nguyen Paillier's cryptosystem revisited. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:206-214 [Conf ] Nick Howgrave-Graham , Phong Q. Nguyen , David Pointcheval , John Proos , Joseph H. Silverman , Ari Singer , William Whyte The Impact of Decryption Failures on the Security of NTRU Encryption. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:226-246 [Conf ] Phong Q. Nguyen Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:288-304 [Conf ] Phong Q. Nguyen , David Pointcheval Analysis and Improvements of NTRU Encryption Paddings. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:210-225 [Conf ] Phong Q. Nguyen , Jacques Stern Merkle-Hellman Revisited: A Cryptoanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1997, pp:198-212 [Conf ] Phong Q. Nguyen , Jacques Stern Cryptanalysis of the Ajtai-Dwork Cryptosystem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:223-242 [Conf ] Phong Q. Nguyen , Jacques Stern The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:31-46 [Conf ] Nicolas Gama , Nick Howgrave-Graham , Henrik Koy , Phong Q. Nguyen Rankin's Constant and Blockwise Lattice Reduction. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2006, pp:112-130 [Conf ] Markus Jakobsson , Ari Juels , Phong Q. Nguyen Proprietary Certificates. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:164-181 [Conf ] Daniel Bleichenbacher , Phong Q. Nguyen Noisy Polynomial Interpolation and Noisy Chinese Remaindering. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2000, pp:53-69 [Conf ] Nicolas Gama , Nick Howgrave-Graham , Phong Q. Nguyen Symplectic Lattice Reduction and NTRU. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:233-253 [Conf ] Phong Q. Nguyen , Damien Stehlé Floating-Point LLL Revisited. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:215-233 [Conf ] Phong Q. Nguyen Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2004, pp:555-570 [Conf ] Phong Q. Nguyen , Oded Regev Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:271-288 [Conf ] Eli Biham , Louis Granboulan , Phong Q. Nguyen Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. [Citation Graph (0, 0)][DBLP ] FSE, 2005, pp:359-367 [Conf ] Christophe Coupé , Phong Q. Nguyen , Jacques Stern The Effectiveness of Lattice Attacks Against Low-Exponent RSA. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:204-218 [Conf ] David Naccache , Phong Q. Nguyen , Michael Tunstall , Claire Whelan Experimenting with Faults, Lattices and the DSA. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2005, pp:16-28 [Conf ] Phong Q. Nguyen The Two Faces of Lattices in Cryptology. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:313- [Conf ] Louis Granboulan , Phong Q. Nguyen , Fabrice Noilhan , Serge Vaudenay DFCv2. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2000, pp:57-71 [Conf ] Phong Q. Nguyen , Jacques Stern Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:213-218 [Conf ] Phong Q. Nguyen , Igor Shparlinski The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2003, v:30, n:2, pp:201-217 [Journal ] Phong Q. Nguyen , Jacques Stern A Converse to the Ajtai-Dwork Security Proof and its Cryptographic Implications [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 1998, v:5, n:10, pp:- [Journal ] Don Coppersmith , Nick Howgrave-Graham , Phong Q. Nguyen , Igor Shparlinski Testing set proportionality and the Ádám isomorphism of circulant graphs. [Citation Graph (0, 0)][DBLP ] J. Discrete Algorithms, 2006, v:4, n:2, pp:324-335 [Journal ] Phong Q. Nguyen , Igor Shparlinski The Insecurity of the Digital Signature Algorithm with Partially Known Nonces. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 2002, v:15, n:3, pp:151-176 [Journal ] Nick Howgrave-Graham , Phong Q. Nguyen , Igor Shparlinski Hidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiation. [Citation Graph (0, 0)][DBLP ] Math. Comput., 2003, v:72, n:243, pp:1473-1485 [Journal ] Pierre-Alain Fouque , Gaëtan Leurent , Phong Q. Nguyen Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2007, pp:13-30 [Conf ] Nicolas Gama , Phong Q. Nguyen New Chosen-Ciphertext Attacks on NTRU. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:89-106 [Conf ] Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses. [Citation Graph (, )][DBLP ] How Risky Is the Random-Oracle Model? [Citation Graph (, )][DBLP ] Predicting Lattice Reduction. [Citation Graph (, )][DBLP ] Lattice Enumeration Using Extreme Pruning. [Citation Graph (, )][DBLP ] Finding short lattice vectors within mordell's inequality. [Citation Graph (, )][DBLP ] Search in 0.084secs, Finished in 0.087secs