Follow
Manh Ha Nguyen
Manh Ha Nguyen
Verified email at is.titech.ac.jp
Title
Cited by
Cited by
Year
Proxy re-encryption in a stronger security model extended from CT-RSA2012
T Isshiki, MH Nguyen, K Tanaka
Topics in Cryptology–CT-RSA 2013: The Cryptographers’ Track at the RSA …, 2013
512013
Proxy re-encryption schemes with key privacy from LWE
L Wang, Y Aono, MH Nguyen, X Boyen
Cryptology ePrint Archive, 2016
292016
Attacks to the proxy re-encryption schemes from IWSEC2011
T Isshiki, MH Nguyen, K Tanaka
Advances in Information and Computer Security: 8th International Workshop on …, 2013
92013
Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs
MH Nguyen, K Tanaka, K Yasunaga
Information Security and Privacy - 17th Australasian Conference, ACISP 2012 …, 2012
92012
Factoring-based proxy re-encryption schemes
T Isshiki, MH Nguyen, K Tanaka
Provable Security: 7th International Conference, ProvSec 2013, Melaka …, 2013
22013
Leakage-resilient CCA2 public-key encryption from 4-wise independent hash functions
MH Nguyen, K Yasunaga, K Tanaka
The 2011 International Conference on Advanced Technologies for …, 2011
22011
Generic Constructions of Public-Key Encryption in the Presence of Key Leakage
MH Nguyen, K Yasunaga, K Tanaka
情報処理学会第 73 回全国大会 1, 1, 2011
2011
The system can't perform the operation now. Try again later.
Articles 1–7