Puncturable identity-based and attribute-based encryption from lattices
Dutta, Priyanka, Susilo, Willy, Duong, Dung Hoang, Roy, Partha Sarathi
Published in Theoretical computer science (11.09.2022)
Published in Theoretical computer science (11.09.2022)
Get full text
Journal Article
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model
Roy, Partha Sarathi, Duong, Dung Hoang, Susilo, Willy, Sipasseuth, Arnaud, Fukushima, Kazuhide, Kiyomoto, Shinsaku
Published in Theoretical computer science (11.09.2022)
Published in Theoretical computer science (11.09.2022)
Get full text
Journal Article
Attribute-based proxy re-signature from standard lattices and its applications
Luo, Fucai, Al-Kuwari, Saif, Susilo, Willy, Duong, Dung Hoang
Published in Computer standards and interfaces (01.04.2021)
Published in Computer standards and interfaces (01.04.2021)
Get full text
Journal Article
Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption
Luo, Fucai, Al-Kuwari, Saif, Susilo, Willy, Duong, Dung Hoang
Published in IEEE transactions on cloud computing (01.10.2022)
Published in IEEE transactions on cloud computing (01.10.2022)
Get full text
Journal Article
Wildcarded identity-based encryption from lattices
Pham, Minh Thuy Truc, Nguyen, Ngoc Ai Van, Jiang, Mei, Duong, Dung Hoang, Susilo, Willy
Published in Theoretical computer science (18.01.2022)
Published in Theoretical computer science (18.01.2022)
Get full text
Journal Article
Efficient Post-quantum Identity-based Encryption with Equality Test
Susilo, Willy, Duong, Dung Hoang, Le, Huy Quoc
Published in 2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS) (01.12.2020)
Published in 2020 IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS) (01.12.2020)
Get full text
Conference Proceeding
Efficient Secure Matrix Multiplication Over LWE-Based Homomorphic Encryption
Duong, Dung Hoang, Mishra, Pradeep Kumar, Yasuda, Masaya
Published in Tatra Mountains mathematical publications (01.09.2016)
Published in Tatra Mountains mathematical publications (01.09.2016)
Get full text
Journal Article
Fast secure matrix multiplications over ring-based homomorphic encryption
Mishra, Pradeep Kumar, Rathee, Deevashwer, Duong, Dung Hoang, Yasuda, Masaya
Published in Information security journal. (04.07.2021)
Published in Information security journal. (04.07.2021)
Get full text
Journal Article
HeFUN: Homomorphic Encryption for Unconstrained Secure Neural Network Inference
Nguyen, Duy Tung Khanh, Duong, Dung Hoang, Susilo, Willy, Chow, Yang-Wai, Ta, The Anh
Published in Future internet (01.12.2023)
Published in Future internet (01.12.2023)
Get full text
Journal Article
Identity-Based Linkable Ring Signatures From Lattices
Le, Huy Quoc, Vo, Bay, Duong, Dung Hoang, Susilo, Willy, Le, Ngoc T., Fukushima, Kazuhide, Kiyomoto, Shinsaku
Published in IEEE access (2021)
Published in IEEE access (2021)
Get full text
Journal Article
Impact of the modulus switching technique on some attacks against learning problems
Le, Huy Quoc, Mishra, Pradeep Kumar, Nakamura, Satoshi, Kinjo, Koha, Duong, Dung Hoang, Yasuda, Masaya
Published in IET information security (01.05.2020)
Published in IET information security (01.05.2020)
Get full text
Journal Article
An Efficient MQ-based Signature with Tight Security Proof
Furue, Hiroki, Duong, Dung Hoang, Takagi, Tsuyoshi
Published in International Journal of Networking and Computing (2020)
Published in International Journal of Networking and Computing (2020)
Get full text
Journal Article