The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Phong Q. Nguyen: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Phong Q. Nguyen
    A Montgomery-Like Square Root for the Number Field Sieve. [Citation Graph (0, 0)][DBLP]
    ANTS, 1998, pp:151-168 [Conf]
  2. Phong Q. Nguyen, Jacques Stern
    Lattice Reduction in Cryptology: An Update. [Citation Graph (0, 0)][DBLP]
    ANTS, 2000, pp:85-112 [Conf]
  3. Phong Q. Nguyen, Damien Stehlé
    Low-Dimensional Lattice Basis Reduction Revisited. [Citation Graph (0, 0)][DBLP]
    ANTS, 2004, pp:338-357 [Conf]
  4. Phong Q. Nguyen, Damien Stehlé
    LLL on the Average. [Citation Graph (0, 0)][DBLP]
    ANTS, 2006, pp:238-256 [Conf]
  5. Dario Catalano, Phong Q. Nguyen, Jacques Stern
    The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:299-310 [Conf]
  6. Dan Boneh, Antoine Joux, Phong Q. Nguyen
    Why Textbook ElGamal and RSA Encryption Are Insecure. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:30-43 [Conf]
  7. Glenn Durfee, Phong Q. Nguyen
    Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:14-29 [Conf]
  8. Phong Q. Nguyen, Igor Shparlinski
    On the Insecurity of a Server-Aided RSA Protocol. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:21-35 [Conf]
  9. Phong Q. Nguyen, Jacques Stern
    Adapting Density Attacks to Low-Weight Knapsacks. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:41-58 [Conf]
  10. Phong Q. Nguyen, Jacques Stern
    The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:372-379 [Conf]
  11. Edwin El Mahassni, Phong Q. Nguyen, Igor Shparlinski
    The Insecurity of Nyberg-Rueppel and Other DSA-Like Signature Schemes with Partially Known Nonces. [Citation Graph (0, 0)][DBLP]
    CaLC, 2001, pp:97-109 [Conf]
  12. Phong Q. Nguyen, Jacques Stern
    The Two Faces of Lattices in Cryptology. [Citation Graph (0, 0)][DBLP]
    CaLC, 2001, pp:146-180 [Conf]
  13. Dario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen
    Paillier's cryptosystem revisited. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:206-214 [Conf]
  14. Nick Howgrave-Graham, Phong Q. Nguyen, David Pointcheval, John Proos, Joseph H. Silverman, Ari Singer, William Whyte
    The Impact of Decryption Failures on the Security of NTRU Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:226-246 [Conf]
  15. Phong Q. Nguyen
    Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:288-304 [Conf]
  16. Phong Q. Nguyen, David Pointcheval
    Analysis and Improvements of NTRU Encryption Paddings. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:210-225 [Conf]
  17. Phong Q. Nguyen, Jacques Stern
    Merkle-Hellman Revisited: A Cryptoanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:198-212 [Conf]
  18. Phong Q. Nguyen, Jacques Stern
    Cryptanalysis of the Ajtai-Dwork Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:223-242 [Conf]
  19. Phong Q. Nguyen, Jacques Stern
    The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:31-46 [Conf]
  20. Nicolas Gama, Nick Howgrave-Graham, Henrik Koy, Phong Q. Nguyen
    Rankin's Constant and Blockwise Lattice Reduction. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2006, pp:112-130 [Conf]
  21. Markus Jakobsson, Ari Juels, Phong Q. Nguyen
    Proprietary Certificates. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:164-181 [Conf]
  22. Daniel Bleichenbacher, Phong Q. Nguyen
    Noisy Polynomial Interpolation and Noisy Chinese Remaindering. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:53-69 [Conf]
  23. Nicolas Gama, Nick Howgrave-Graham, Phong Q. Nguyen
    Symplectic Lattice Reduction and NTRU. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:233-253 [Conf]
  24. Phong Q. Nguyen, Damien Stehlé
    Floating-Point LLL Revisited. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:215-233 [Conf]
  25. Phong Q. Nguyen
    Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:555-570 [Conf]
  26. Phong Q. Nguyen, Oded Regev
    Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:271-288 [Conf]
  27. Eli Biham, Louis Granboulan, Phong Q. Nguyen
    Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:359-367 [Conf]
  28. Christophe Coupé, Phong Q. Nguyen, Jacques Stern
    The Effectiveness of Lattice Attacks Against Low-Exponent RSA. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:204-218 [Conf]
  29. David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan
    Experimenting with Faults, Lattices and the DSA. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:16-28 [Conf]
  30. Phong Q. Nguyen
    The Two Faces of Lattices in Cryptology. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:313- [Conf]
  31. Louis Granboulan, Phong Q. Nguyen, Fabrice Noilhan, Serge Vaudenay
    DFCv2. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:57-71 [Conf]
  32. Phong Q. Nguyen, Jacques Stern
    Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:213-218 [Conf]
  33. Phong Q. Nguyen, Igor Shparlinski
    The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2003, v:30, n:2, pp:201-217 [Journal]
  34. Phong Q. Nguyen, Jacques Stern
    A Converse to the Ajtai-Dwork Security Proof and its Cryptographic Implications [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 1998, v:5, n:10, pp:- [Journal]
  35. Don Coppersmith, Nick Howgrave-Graham, Phong Q. Nguyen, Igor Shparlinski
    Testing set proportionality and the Ádám isomorphism of circulant graphs. [Citation Graph (0, 0)][DBLP]
    J. Discrete Algorithms, 2006, v:4, n:2, pp:324-335 [Journal]
  36. Phong Q. Nguyen, Igor Shparlinski
    The Insecurity of the Digital Signature Algorithm with Partially Known Nonces. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2002, v:15, n:3, pp:151-176 [Journal]
  37. Nick Howgrave-Graham, Phong Q. Nguyen, Igor Shparlinski
    Hidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiation. [Citation Graph (0, 0)][DBLP]
    Math. Comput., 2003, v:72, n:243, pp:1473-1485 [Journal]
  38. Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen
    Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:13-30 [Conf]
  39. Nicolas Gama, Phong Q. Nguyen
    New Chosen-Ciphertext Attacks on NTRU. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:89-106 [Conf]

  40. Factoring pq2 with Quadratic Forms: Nice Cryptanalyses. [Citation Graph (, )][DBLP]


  41. How Risky Is the Random-Oracle Model? [Citation Graph (, )][DBLP]


  42. Predicting Lattice Reduction. [Citation Graph (, )][DBLP]


  43. Lattice Enumeration Using Extreme Pruning. [Citation Graph (, )][DBLP]


  44. Finding short lattice vectors within mordell's inequality. [Citation Graph (, )][DBLP]


Search in 1.090secs, Finished in 1.092secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002