Duc-Phong Le
Duc-Phong Le
Fintech Technical Researcher (Cryptographer), Bank of Canada
Adresse e-mail validée de - Page d'accueil
Citée par
Citée par
BIFF: A blockchain-based IoT forensics framework with identity privacy
DP Le, H Meng, L Su, SL Yeo, V Thing
TENCON 2018-2018 IEEE region 10 conference, 2372-2377, 2018
Multisignatures as secure as the Diffie-Hellman problem in the plain public-key model
DP Le, A Bonnecaze, A Gabillon
International Conference on Pairing-Based Cryptography, 35-51, 2009
A review of blockchain in fintech: taxonomy, challenges, and future directions
K Nelaturu, H Du, DP Le
Cryptography 6 (2), 18, 2022
A variant of miller’s formula and algorithm
J Boxall, N El Mrabet, F Laguillaumie, DP Le
Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010
Speeding up Ate Pairing Computation in Affine Coordinates
DP Le, CH Tan
The 15th international conference on Information Security and Cryptology …, 2012
Randomizing the montgomery powering ladder
DP Le, CH Tan, M Tunstall
Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015
A new multisignature scheme with public key aggregation for blockchain
DP Le, G Yang, A Ghorbani
2019 17th International Conference on Privacy, Security and Trust (PST), 1-7, 2019
Algebraic differential fault analysis on simon block cipher
DP Le, SL Yeo, K Khoo
IEEE Transactions on Computers 68 (11), 1561-1572, 2019
Fast point quadrupling on elliptic curves
DP Le, BP Nguyen
Proceedings of the 3rd Symposium on Information and Communication Technology …, 2012
On Double Exponentiation for Securing RSA against Fault Analysis
DP Le, M Rivain, CH Tan
CT-RSA 2014, 152--168, 2014
Improved algebraic attacks on lightweight block ciphers
SL Yeo, DP Le, K Khoo
Journal of Cryptographic Engineering 11, 1-19, 2021
Signtiming scheme based on aggregate signature
DP Le, A Bonnecaze, A Gabillon
2008 IEEE International Conference on Intelligence and Security Informatics …, 2008
Improved Miller’s algorithm for computing pairings on Edwards curves
DP Le, CH Tan
IEEE Transactions on Computers 63 (10), 2626-2632, 2013
Refinements of Miller's algorithm over Weierstrass curves revisited
DP Le, CL Liu
The Computer Journal 54 (10), 1582-1591, 2011
Improved fault analysis on SIMECK ciphers
DP Le, R Lu, AA Ghorbani
Journal of Cryptographic Engineering 12 (2), 169-180, 2022
On near prime-order elliptic curves with small embedding degrees
DP Le, N El Mrabet, CH Tan
International Conference on Algebraic Informatics, 140-151, 2015
A new multisignature scheme based on strong Diffie-Hellman assumption
DP Le, A Gabillon
Proceedings of the third International Conference on Pairing-based …, 2009
Breaking an ID-based encryption based on discrete logarithm and factorization problems
CH Tan, TF Prabowo, DP Le
Information Processing Letters 116 (2), 116-119, 2016
A secure round-based timestamping scheme with absolute timestamps (short paper)
DP Le, A Bonnecaze, A Gabillon
International Conference on Information Systems Security, 116-123, 2008
Data breach: analysis, countermeasures and challenges
X Zhang, MM Yadollahi, S Dadkhah, H Isah, DP Le, AA Ghorbani
International Journal of Information and Computer Security 19 (3-4), 402-442, 2022
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20