Duc-Phong Le
Duc-Phong Le
Fintech Technical Researcher (Cryptographer), Bank of Canada
Verified email at - Homepage
Cited by
Cited by
BIFF: A blockchain-based IoT forensics framework with identity privacy
DP Le, H Meng, L Su, SL Yeo, V Thing
TENCON 2018-2018 IEEE region 10 conference, 2372-2377, 2018
A review of blockchain in fintech: taxonomy, challenges, and future directions
K Nelaturu, H Du, DP Le
Cryptography 6 (2), 18, 2022
Multisignatures as secure as the Diffie-Hellman problem in the plain public-key model
DP Le, A Bonnecaze, A Gabillon
International Conference on Pairing-Based Cryptography, 35-51, 2009
A variant of miller’s formula and algorithm
J Boxall, N El Mrabet, F Laguillaumie, DP Le
Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010
Algebraic differential fault analysis on simon block cipher
DP Le, SL Yeo, K Khoo
IEEE Transactions on Computers 68 (11), 1561-1572, 2019
Speeding up Ate Pairing Computation in Affine Coordinates
DP Le, CH Tan
The 15th international conference on Information Security and Cryptology …, 2012
A new multisignature scheme with public key aggregation for blockchain
DP Le, G Yang, A Ghorbani
2019 17th International Conference on Privacy, Security and Trust (PST), 1-7, 2019
Randomizing the montgomery powering ladder
DP Le, CH Tan, M Tunstall
Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015
Fast point quadrupling on elliptic curves
DP Le, BP Nguyen
Proceedings of the 3rd Symposium on Information and Communication Technology …, 2012
On Double Exponentiation for Securing RSA against Fault Analysis
DP Le, M Rivain, CH Tan
CT-RSA 2014, 152--168, 2014
Improved algebraic attacks on lightweight block ciphers
SL Yeo, DP Le, K Khoo
Journal of Cryptographic Engineering 11, 1-19, 2021
Signtiming scheme based on aggregate signature
DP Le, A Bonnecaze, A Gabillon
2008 IEEE International Conference on Intelligence and Security Informatics …, 2008
Improved Miller’s algorithm for computing pairings on Edwards curves
DP Le, CH Tan
IEEE Transactions on Computers 63 (10), 2626-2632, 2013
Refinements of Miller's algorithm over Weierstrass curves revisited
DP Le, CL Liu
The Computer Journal 54 (10), 1582-1591, 2011
Improved fault analysis on SIMECK ciphers
DP Le, R Lu, AA Ghorbani
Journal of Cryptographic Engineering 12 (2), 169-180, 2022
Data breach: analysis, countermeasures and challenges
X Zhang, MM Yadollahi, S Dadkhah, H Isah, DP Le, AA Ghorbani
International Journal of Information and Computer Security 19 (3-4), 402-442, 2022
On near prime-order elliptic curves with small embedding degrees
DP Le, N El Mrabet, CH Tan
International Conference on Algebraic Informatics, 140-151, 2015
A new multisignature scheme based on strong Diffie-Hellman assumption
DP Le, A Gabillon
Proceedings of the third International Conference on Pairing-based …, 2009
Breaking an ID-based encryption based on discrete logarithm and factorization problems
CH Tan, TF Prabowo, DP Le
Information Processing Letters 116 (2), 116-119, 2016
A secure round-based timestamping scheme with absolute timestamps (short paper)
DP Le, A Bonnecaze, A Gabillon
International Conference on Information Systems Security, 116-123, 2008
The system can't perform the operation now. Try again later.
Articles 1–20