Public traceability in traitor tracing schemes H Chabanne, DH Phan, D Pointcheval Advances in Cryptology–EUROCRYPT 2005, 605-605, 2005 | 139 | 2005 |
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts DH Phan, D Pointcheval, SF Shahandashti, M Strefler International journal of information security 12 (4), 251-265, 2013 | 92 | 2013 |
About the security of ciphers (semantic security and pseudo-random permutations) DH Phan, D Pointcheval Selected Areas in Cryptography, 182-197, 2005 | 81 | 2005 |
Chosen-ciphertext security without redundancy DH Phan, D Pointcheval Advances in Cryptology-ASIACRYPT 2003, 1-18, 2003 | 59 | 2003 |
OAEP 3-round: A generic and secure asymmetric encryption padding DH Phan, D Pointcheval Advances in Cryptology-ASIACRYPT 2004, 53-67, 2004 | 51 | 2004 |
Identity-based traitor tracing M Abdalla, A Dent, J Malone-Lee, G Neven, DH Phan, N Smart Public Key Cryptography–PKC 2007, 361-376, 2007 | 50 | 2007 |
Hardness of k-LWE and Applications in Traitor Tracing S Ling, DH Phan, D Stehlé, R Steinfeld Advances in Cryptology–CRYPTO 2014, 2014 | 46 | 2014 |
Decentralized multi-client functional encryption for inner product J Chotard, ED Sans, R Gay, DH Phan, D Pointcheval International Conference on the Theory and Application of Cryptology and …, 2018 | 43 | 2018 |
Efficient traitor tracing from collusion secure codes O Billet, DH Phan Information Theoretic Security, 171-182, 2008 | 42 | 2008 |
Identity-based encryption from codes with rank metric P Gaborit, A Hauteville, DH Phan, JP Tillich Annual International Cryptology Conference, 194-224, 2017 | 37 | 2017 |
Generic construction of hybrid public key traitor tracing with full-public-traceability DH Phan, R Safavi-Naini, D Tonien Automata, Languages and Programming, 264-275, 2006 | 36 | 2006 |
Security notions for broadcast encryption DH Phan, D Pointcheval, M Strefler Applied Cryptography and Network Security, 377-394, 2011 | 31 | 2011 |
Decentralized dynamic broadcast encryption DH Phan, D Pointcheval, M Strefler International Conference on Security and Cryptography for Networks, 166-183, 2012 | 27 | 2012 |
Traitors collaborating in public: Pirates 2.0 O Billet, DH Phan Advances in Cryptology-EUROCRYPT 2009, 189-205, 2009 | 26 | 2009 |
Traitor tracing with optimal transmission rate N Fazio, A Nicolosi, DH Phan International Conference on Information Security, 71-88, 2007 | 26 | 2007 |
Efficient public trace and revoke from standard assumptions S Agrawal, S Bhattacherjee, DH Phan, D Stehlé, S Yamada Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 23 | 2017 |
Optimal asymmetric encryption and signature paddings B Chevallier-Mames, DH Phan, D Pointcheval Applied Cryptography and Network Security, 225-239, 2005 | 20 | 2005 |
Identity-based trace and revoke schemes DH Phan, VC Trinh Provable Security, 204-221, 2011 | 18 | 2011 |
Multi-channel broadcast encryption DH Phan, D Pointcheval, VC Trinh Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 17 | 2013 |
On the security notions for public-key encryption schemes DH Phan, D Pointcheval International Conference on Security in Communication Networks, 33-46, 2004 | 15 | 2004 |