Duc-Phong Le
Duc-Phong Le
Fintech Technical Researcher (Cryptographer), Bank of Canada
Verified email at - Homepage
Cited by
Cited by
BIFF: A blockchain-based IoT forensics framework with identity privacy
DP Le, H Meng, L Su, SL Yeo, V Thing
TENCON 2018-2018 IEEE region 10 conference, 2372-2377, 2018
Multisignatures as secure as the Diffie-Hellman problem in the plain public-key model
DP Le, A Bonnecaze, A Gabillon
Pairing-Based Cryptography–Pairing 2009: Third International Conference Palo …, 2009
A variant of miller’s formula and algorithm
J Boxall, N El Mrabet, F Laguillaumie, DP Le
Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010
Speeding up Ate Pairing Computation in Affine Coordinates
DP Le, CH Tan
The 15th international conference on Information Security and Cryptology …, 2012
Fast point quadrupling on elliptic curves
DP Le, BP Nguyen
Proceedings of the 3rd Symposium on Information and Communication Technology …, 2012
A new multisignature scheme with public key aggregation for blockchain
DP Le, G Yang, A Ghorbani
2019 17th International Conference on Privacy, Security and Trust (PST), 1-7, 2019
Randomizing the montgomery powering ladder
DP Le, CH Tan, M Tunstall
Information Security Theory and Practice: 9th IFIP WG 11.2 International …, 2015
Algebraic differential fault analysis on simon block cipher
DP Le, SL Yeo, K Khoo
IEEE Transactions on Computers 68 (11), 1561-1572, 2019
A Review of Blockchain in Fintech: Taxonomy, Challenges, and Future Directions
K Nelaturu, H Du, DP Le
Cryptography 6 (2), 18, 2022
On Double Exponentiation for Securing RSA against Fault Analysis
DP Le, M Rivain, CH Tan
CT-RSA 2014, 152--168, 2014
Signtiming scheme based on aggregate signature
DP Le, A Bonnecaze, A Gabillon
2008 IEEE International Conference on Intelligence and Security Informatics …, 2008
Refinements of Miller's algorithm over Weierstrass curves revisited
DP Le, CL Liu
The Computer Journal 54 (10), 1582-1591, 2011
Improved Miller’s algorithm for computing pairings on Edwards curves
DP Le, CH Tan
IEEE Transactions on Computers 63 (10), 2626-2632, 2013
On near prime-order elliptic curves with small embedding degrees
DP Le, N El Mrabet, CH Tan
Algebraic Informatics: 6th International Conference, CAI 2015, Stuttgart …, 2015
Improved fault analysis on SIMECK ciphers
DP Le, R Lu, AA Ghorbani
Journal of Cryptographic Engineering 12 (2), 169-180, 2022
Improved algebraic attacks on lightweight block ciphers
SL Yeo, DP Le, K Khoo
Journal of Cryptographic Engineering 11, 1-19, 2021
A new multisignature scheme based on strong Diffie-Hellman assumption
DP Le, A Gabillon
Proceedings of the third International Conference on Pairing-based …, 2009
Breaking an ID-based encryption based on discrete logarithm and factorization problems
CH Tan, TF Prabowo, DP Le
Information Processing Letters 116 (2), 116-119, 2016
A secure round-based timestamping scheme with absolute timestamps (short paper)
DP Le, A Bonnecaze, A Gabillon
Information Systems Security: 4th International Conference, ICISS 2008 …, 2008
On the near prime-order MNT curves
DP Le, NE Mrabet, S Haloui, CH Tan
Applicable Algebra in Engineering, Communication and Computing 30, 107-125, 2019
The system can't perform the operation now. Try again later.
Articles 1–20