-
1Conference
المؤلفون: Hervé Debar, Gilles Dusserre, Gouenou Coitrieux, Jean Max Dutertre, Frederick Benaben, Duong Hieu PHAN
مصطلحات موضوعية: sécurité, résilience, cybersécurité, infrastructures critiques, données
Relation: https://doi.org/10.5281/zenodo.7937269; https://doi.org/10.5281/zenodo.7937270; oai:zenodo.org:7937270
-
2Conference
المصدر: Crypto 2020, Crypto 2020, Virtual, 17-21 August 2020
مصطلحات موضوعية: Dynamic, Decentralized, Functional Encryption, Inner Product
Relation: https://zenodo.org/communities/eu; https://doi.org/10.5281/zenodo.3949876; https://doi.org/10.5281/zenodo.3949877; oai:zenodo.org:3949877
-
3
المؤلفون: Duong HIEU PHAN
المصدر: Asymmetric Cryptography. :121-149
-
4Conference
مصطلحات موضوعية: Decentralized, Multi-Client, Functional Encryption, Inner Product
Relation: https://zenodo.org/communities/eu; https://doi.org/10.5281/zenodo.3406030; https://doi.org/10.5281/zenodo.3406031; oai:zenodo.org:3406031
-
5
المؤلفون: Ky Nguyen, Duong Hieu Phan, David Pointcheval
المصدر: Applied Cryptography and Network Security ISBN: 9783031334900
-
6Periodical
المؤلفون: RAPHAËL CW PHAN, MASAYUKI ABE, LYNN BATTEN, JUNG HEE CHEON, DAWSON, ED, GALBRAITH, STEVEN, JIAN GUO, LUCAS HUI, KWANGJO KIM, XUEJIA LAI, DONG HOON LEE, MITSURU MATSUI, TSUTOMU MATSUMOTO, SHIHO MORIAI, PHONG NGUYEN, DINGYI PEI, DUONG HIEU PHAN, PIEPRZYK, JOSEF, HUAXIONG WANG, HANK WOLFE
المصدر: Communications of the ACM; Apr2020, Vol. 63 Issue 4, p76-81, 6p, 3 Color Photographs, 1 Chart
مصطلحات موضوعية: COMPUTER security software, CRYPTOGRAPHY
مصطلحات جغرافية: ASIA
-
7
المؤلفون: Giuseppe Persiano, Duong Hieu Phan, Moti Yung
المصدر: Advances in Cryptology – EUROCRYPT 2022 ISBN: 9783031070846
-
8
المؤلفون: Ky Nguyen, Duong Hieu Phan, David Pointcheval
المصدر: Advances in Cryptology – ASIACRYPT 2022 ISBN: 9783031229626
-
9
المؤلفون: Damien Stehlé, Olivier Blazy, Duong Hieu Phan, Huyen Nguyen, Sayantan Mukherjee
المساهمون: XLIM (XLIM), Université de Limoges (UNILIM)-Centre National de la Recherche Scientifique (CNRS), Arithmetic and Computing (ARIC), Inria Grenoble - Rhône-Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire de l'Informatique du Parallélisme (LIP), École normale supérieure - Lyon (ENS Lyon)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure - Lyon (ENS Lyon)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Université de Lyon-Centre National de la Recherche Scientifique (CNRS), Laboratoire de l'Informatique du Parallélisme (LIP), Université de Lyon-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS), Institut Polytechnique de Paris (IP Paris), Département Informatique et Réseaux (INFRES), Télécom ParisTech, École normale supérieure de Lyon (ENS de Lyon)-Université Claude Bernard Lyon 1 (UCBL), Université de Lyon-Université de Lyon-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-École normale supérieure de Lyon (ENS de Lyon)-Université Claude Bernard Lyon 1 (UCBL), Cybersécurité et Cryptographie (C2), Laboratoire Traitement et Communication de l'Information (LTCI), Institut Mines-Télécom [Paris] (IMT)-Télécom Paris-Institut Mines-Télécom [Paris] (IMT)-Télécom Paris, ANR-16-CE39-0004,IDFIX,Cryptographie basée sur l'identité, pour l'identification et les échanges(2016)
المصدر: ACISP 2021-Australasian Conference on Information Security and Privacy
ACISP 2021-Australasian Conference on Information Security and Privacy, Dec 2021, Perth, Australia. pp.214-233, ⟨10.1007/978-3-030-90567-5_11⟩
Information Security and Privacy ISBN: 9783030905668
ACISP
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Information Security and Privacy
Information Security and Privacy. ACISP 2021مصطلحات موضوعية: 0303 health sciences, Software_OPERATINGSYSTEMS, Cryptographic primitive, Traceability, Revocation, business.industry, Computer science, Data_CODINGANDINFORMATIONTHEORY, 0102 computer and information sciences, 01 natural sciences, Set (abstract data type), 03 medical and health sciences, 010201 computation theory & mathematics, Ciphertext, [INFO]Computer Science [cs], business, Broadcast encryption, 030304 developmental biology, Functional encryption, Computer network, Anonymity
-
10eBook
المؤلفون: Clemente Galdi, Duong Hieu Phan
Resource Type: eBook.
الموضوعات: Cryptography, Data encryption (Computer science), Application software, Data protection, Computer networks—Security measures, Computer networks
Categories: COMPUTERS / Security / Cryptography & Encryption, COMPUTERS / Business & Productivity Software / General, COMPUTERS / Networking / General, COMPUTERS / Security / Network Security, COMPUTERS / Security / General
-
11
المؤلفون: Duong Hieu Phan, San Ling, Hanh Tang, Huaxiong Wang, Khoa D. Nguyen
المصدر: Post-Quantum Cryptography ISBN: 9783030812928
PQCryptoمصطلحات موضوعية: Discrete mathematics, Development (topology), Block (permutation group theory), Function (mathematics), Zero-knowledge proof, Mathematical proof, Boolean function, Mathematics
-
12Academic Journal
المساهمون: The Pennsylvania State University CiteSeerX Archives
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.406.6906; http://www.di.ens.fr/users/pointche/Documents/Papers/2013_ijis.pdf
-
13Academic Journal
المؤلفون: Thèse De Doctorat, Docteur De L’école Normale Supérieure, Mario Strefler, École Normale Supérieure, Marc Joye, Kenneth G. Paterson (royal Holloway, Duong Hieu Phan (université Paris
المساهمون: The Pennsylvania State University CiteSeerX Archives
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.405.6516; http://tel.archives-ouvertes.fr/docs/00/87/09/10/PDF/Stref13Thesis.pdf
-
14
المؤلفون: Lynn Batten, Tzong-Chen Wu, Yu Yu, Henry B. Wolfe, Siu-Ming Yiu, Steven D. Galbraith, Bo-Yin Yang, Lucas Hui, Dingyi Pei, Mitsuru Matsui, Raphaël Cw Phan, Jian Guo, Ed Dawson, Duncan S. Wong, Huaxiong Wang, Dong Hoon Lee, Shiho Moriai, Kwangjo Kim, Xuejia Lai, Masayuki Abe, Duong Hieu Phan, Jianying Zhou, Tsutomu Matsumoto, Josef Pieprzyk, Jung Hee Cheon, Phong Q. Nguyen
المساهمون: Tokyo University of Agriculture and Technology (TUAT), Deakin University [Burwood], Seoul National University [Seoul] (SNU), Department of Mathematics [Auckland], University of Auckland [Auckland], Nanayang Technological University (NTU), The University of Hong Kong (HKU), Korea University [Seoul], Yokohama National University, National Institute of Information and Communications Technology [Tokyo, Japan] (NICT), Département d'informatique - ENS Paris (DI-ENS), École normale supérieure - Paris (ENS-PSL), Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS), Département Informatique et Réseaux (INFRES), Télécom ParisTech, Institut Polytechnique de Paris (IP Paris), Cybersécurité et Cryptographie (C2), Laboratoire Traitement et Communication de l'Information (LTCI), Institut Mines-Télécom [Paris] (IMT)-Télécom Paris-Institut Mines-Télécom [Paris] (IMT)-Télécom Paris, Centre for Advanced Computing - Algorithms and Cryptography (ACAC), Macquarie University, Nanyang Technological University [Singapour]
المصدر: Communications of the ACM
Communications of the ACM, 2020, 63 (4), pp.76-81. ⟨10.1145/3378428⟩مصطلحات موضوعية: [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], General Computer Science, Work (electrical), business.industry, 020204 information systems, Association (object-oriented programming), 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, Sociology, Public relations, business
-
15Academic Journal
المساهمون: The Pennsylvania State University CiteSeerX Archives
المصدر: https://eprint.iacr.org/2012/216.pdf.
وصف الملف: application/pdf
-
16Academic Journal
المؤلفون: Olivier Billet, Duong Hieu Phan
المساهمون: The Pennsylvania State University CiteSeerX Archives
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.456.3775; http://www.iacr.org/archive/eurocrypt2009/54790190/54790190.pdf
-
17Academic Journal
المؤلفون: Michel Abdalla, Er W. Dent, John Malone-lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart
المساهمون: The Pennsylvania State University CiteSeerX Archives
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.332.3732; http://www.iacr.org/archive/pkc2007/44500361/44500361.pdf
-
18Academic Journal
المؤلفون: Nigel Smart (bris, Michel Abdalla (ens, Endre Bangerter (ibm, Dario Catalano (ens, Alex Dent (rhul, Louis Granboulan (ens, Duong Hieu Phan (ens, Caroline Kudla (rhul, John Malone-lee (bris, Gregory Neven (kul, David Pointcheval (ens, Ahmad-reza Sadeghi (rub, Frederik Vercauteren (kul, Bogdan Warinschi (bris
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: 2.2.1 Discrete Logarithms and Diffie-Hellman Problems. 5
وصف الملف: application/pdf
-
19Academic Journal
المؤلفون: Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Key words, Traitor Tracing, Constant Transmission Rate, Fingerprint Codes, Bilinear Maps
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.434.6758; http://www.cs.nyu.edu/~nicolosi/papers/ott.pdf
-
20Academic Journal
المؤلفون: Duong Hieu Phan
المساهمون: The Pennsylvania State University CiteSeerX Archives
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.7766; http://www.adastral.ucl.ac.uk/~hieuphan/2006_vietcrypt.pdf