Efficient secure matrix multiplication over LWE-based homomorphic encryption DH Duong, PK Mishra, M Yasuda Tatra mountains mathematical publications 67 (1), 69-83, 2016 | 52 | 2016 |
Practical post-quantum signature schemes from isomorphism problems of trilinear forms G Tang, DH Duong, A Joux, T Plantard, Y Qiao, W Susilo Annual international conference on the theory and applications of …, 2022 | 44 | 2022 |
A lattice-based public key encryption with equality test in standard model DH Duong, K Fukushima, S Kiyomoto, PS Roy, W Susilo Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019 | 32 | 2019 |
Fast secure matrix multiplications over ring-based homomorphic encryption PK Mishra, D Rathee, DH Duong, M Yasuda Information Security Journal: A Global Perspective 30 (4), 219-234, 2021 | 31 | 2021 |
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing H Wang, Y Li, W Susilo, DH Duong, F Luo Computer Standards & Interfaces 82, 103635, 2022 | 28 | 2022 |
Lattice-based HRA-secure attribute-based proxy re-encryption in standard model W Susilo, P Dutta, DH Duong, PS Roy Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021 | 26 | 2021 |
Collusion-resistant identity-based proxy re-encryption: lattice-based constructions in standard model P Dutta, W Susilo, DH Duong, PS Roy Theoretical Computer Science 871, 16-29, 2021 | 23 | 2021 |
Chosen-ciphertext secure homomorphic proxy re-encryption F Luo, S Al-Kuwari, W Susilo, DH Duong IEEE Transactions on Cloud Computing 10 (4), 2398-2408, 2020 | 23 | 2020 |
Lattice-based IBE with equality test in standard model DH Duong, HQ Le, PS Roy, W Susilo Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD …, 2019 | 23 | 2019 |
Uniform analytic properties of representation zeta functions of finitely generated nilpotent groups D Dung, C Voll Transactions of the American Mathematical Society 369 (9), 6327-6349, 2017 | 23 | 2017 |
An efficient multivariate threshold ring signature scheme DH Duong, HTN Tran, W Susilo Computer Standards & Interfaces 74, 103489, 2021 | 21 | 2021 |
From helpfulness prediction to helpful review retrieval for online product reviews C Vo, D Duong, D Nguyen, T Cao Proceedings of the 9th International Symposium on Information and …, 2018 | 20 | 2018 |
Enhancement for secure multiple matrix multiplications over ring-LWE homomorphic encryption PK Mishra, DH Duong, M Yasuda Information Security Practice and Experience: 13th International Conference …, 2017 | 18 | 2017 |
Attribute-based proxy re-signature from standard lattices and its applications F Luo, S Al-Kuwari, W Susilo, DH Duong Computer Standards & Interfaces 75, 103499, 2021 | 17 | 2021 |
Lattice-based signcryption with equality test in standard model HQ Le, DH Duong, PS Roy, W Susilo, K Fukushima, S Kiyomoto Computer Standards & Interfaces 76, 103515, 2021 | 15 | 2021 |
Lattice-based IBE with equality test supporting flexible authorization in the standard model GLD Nguyen, W Susilo, DH Duong, HQ Le, F Guo Progress in Cryptology–INDOCRYPT 2020: 21st International Conference on …, 2020 | 15 | 2020 |
A blind signature from module latices HQ Le, W Susilo, TX Khuc, MK Bui, DH Duong 2019 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2019 | 15 | 2019 |
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model PS Roy, DH Duong, W Susilo, A Sipasseuth, K Fukushima, S Kiyomoto Theoretical Computer Science 929, 124-139, 2022 | 14 | 2022 |
Efficient post-quantum identity-based encryption with equality test W Susilo, DH Duong, HQ Le 2020 IEEE 26th International Conference on Parallel and Distributed Systems …, 2020 | 14 | 2020 |
A multivariate blind ring signature scheme D Hoang Duong, W Susilo, HTN Tran The Computer Journal 63 (8), 1194-1202, 2020 | 14 | 2020 |