dblp.uni-trier.dewww.uni-trier.de

Phong Q. Nguyen

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
45EEPhong Q. Nguyen, Oded Regev: Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures. J. Cryptology 22(2): 139-160 (2009)
2008
44EENicolas Gama, Phong Q. Nguyen: Predicting Lattice Reduction. EUROCRYPT 2008: 31-51
43EENicolas Gama, Phong Q. Nguyen: Finding short lattice vectors within mordell's inequality. STOC 2008: 207-216
2007
42EEPierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen: Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. CRYPTO 2007: 13-30
41EENicolas Gama, Phong Q. Nguyen: New Chosen-Ciphertext Attacks on NTRU. Public Key Cryptography 2007: 89-106
2006
40 Phong Q. Nguyen: Progressin Cryptology - VIETCRYPT 2006, First International Conferenceon Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers Springer 2006
39EEPhong Q. Nguyen, Damien Stehlé: LLL on the Average. ANTS 2006: 238-256
38EENicolas Gama, Nick Howgrave-Graham, Henrik Koy, Phong Q. Nguyen: Rankin's Constant and Blockwise Lattice Reduction. CRYPTO 2006: 112-130
37EENicolas Gama, Nick Howgrave-Graham, Phong Q. Nguyen: Symplectic Lattice Reduction and NTRU. EUROCRYPT 2006: 233-253
36EEPhong Q. Nguyen, Oded Regev: Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures. EUROCRYPT 2006: 271-288
35EEDon Coppersmith, Nick Howgrave-Graham, Phong Q. Nguyen, Igor Shparlinski: Testing set proportionality and the Ádám isomorphism of circulant graphs. J. Discrete Algorithms 4(2): 324-335 (2006)
2005
34EEPhong Q. Nguyen, Jacques Stern: Adapting Density Attacks to Low-Weight Knapsacks. ASIACRYPT 2005: 41-58
33EEPhong Q. Nguyen, Damien Stehlé: Floating-Point LLL Revisited. EUROCRYPT 2005: 215-233
32EEEli Biham, Louis Granboulan, Phong Q. Nguyen: Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. FSE 2005: 359-367
31EEDavid Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan: Experimenting with Faults, Lattices and the DSA. Public Key Cryptography 2005: 16-28
30EEPhong Q. Nguyen: Lattice Reduction. Encyclopedia of Cryptography and Security 2005
29EEPhong Q. Nguyen: Lattice. Encyclopedia of Cryptography and Security 2005
2004
28EEPhong Q. Nguyen, Damien Stehlé: Low-Dimensional Lattice Basis Reduction Revisited. ANTS 2004: 338-357
27EEPhong Q. Nguyen: Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. EUROCRYPT 2004: 555-570
2003
26EENick Howgrave-Graham, Phong Q. Nguyen, David Pointcheval, John Proos, Joseph H. Silverman, Ari Singer, William Whyte: The Impact of Decryption Failures on the Security of NTRU Encryption. CRYPTO 2003: 226-246
25EEPhong Q. Nguyen, Igor Shparlinski: The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces. Des. Codes Cryptography 30(2): 201-217 (2003)
24 Nick Howgrave-Graham, Phong Q. Nguyen, Igor Shparlinski: Hidden number problem with hidden multipliers, timed-release crypto, and noisy exponentiation. Math. Comput. 72(243): 1473-1485 (2003)
2002
23EEDario Catalano, Phong Q. Nguyen, Jacques Stern: The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. ASIACRYPT 2002: 299-310
22EEPhong Q. Nguyen, David Pointcheval: Analysis and Improvements of NTRU Encryption Paddings. CRYPTO 2002: 210-225
21EEMarkus Jakobsson, Ari Juels, Phong Q. Nguyen: Proprietary Certificates. CT-RSA 2002: 164-181
20EEPhong Q. Nguyen, Igor Shparlinski: The Insecurity of the Digital Signature Algorithm with Partially Known Nonces. J. Cryptology 15(3): 151-176 (2002)
2001
19EEDario Catalano, Rosario Gennaro, Nick Howgrave-Graham, Phong Q. Nguyen: Paillier's cryptosystem revisited. ACM Conference on Computer and Communications Security 2001: 206-214
18EEPhong Q. Nguyen, Igor Shparlinski: On the Insecurity of a Server-Aided RSA Protocol. ASIACRYPT 2001: 21-35
17EEPhong Q. Nguyen, Jacques Stern: The Two Faces of Lattices in Cryptology. CaLC 2001: 146-180
16EEEdwin El Mahassni, Phong Q. Nguyen, Igor Shparlinski: The Insecurity of Nyberg-Rueppel and Other DSA-Like Signature Schemes with Partially Known Nonces. CaLC 2001: 97-109
15EEPhong Q. Nguyen: The Two Faces of Lattices in Cryptology. Selected Areas in Cryptography 2001: 313
2000
14 Phong Q. Nguyen, Jacques Stern: Lattice Reduction in Cryptology: An Update. ANTS 2000: 85-112
13EEGlenn Durfee, Phong Q. Nguyen: Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99. ASIACRYPT 2000: 14-29
12EEDan Boneh, Antoine Joux, Phong Q. Nguyen: Why Textbook ElGamal and RSA Encryption Are Insecure. ASIACRYPT 2000: 30-43
11EEDaniel Bleichenbacher, Phong Q. Nguyen: Noisy Polynomial Interpolation and Noisy Chinese Remaindering. EUROCRYPT 2000: 53-69
10EELouis Granboulan, Phong Q. Nguyen, Fabrice Noilhan, Serge Vaudenay: DFCv2. Selected Areas in Cryptography 2000: 57-71
1999
9EEPhong Q. Nguyen: Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97. CRYPTO 1999: 288-304
8EEPhong Q. Nguyen, Jacques Stern: The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications. CRYPTO 1999: 31-46
7EEChristophe Coupé, Phong Q. Nguyen, Jacques Stern: The Effectiveness of Lattice Attacks Against Low-Exponent RSA. Public Key Cryptography 1999: 204-218
1998
6EEPhong Q. Nguyen: A Montgomery-Like Square Root for the Number Field Sieve. ANTS 1998: 151-168
5EEPhong Q. Nguyen, Jacques Stern: The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. ASIACRYPT 1998: 372-379
4EEPhong Q. Nguyen, Jacques Stern: Cryptanalysis of the Ajtai-Dwork Cryptosystem. CRYPTO 1998: 223-242
3EEPhong Q. Nguyen, Jacques Stern: Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC '97. Selected Areas in Cryptography 1998: 213-218
2EEPhong Q. Nguyen, Jacques Stern: A Converse to the Ajtai-Dwork Security Proof and its Cryptographic Implications Electronic Colloquium on Computational Complexity (ECCC) 5(10): (1998)
1997
1EEPhong Q. Nguyen, Jacques Stern: Merkle-Hellman Revisited: A Cryptoanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations. CRYPTO 1997: 198-212

Coauthor Index

1Eli Biham [32]
2Daniel Bleichenbacher [11]
3Dan Boneh [12]
4Dario Catalano [19] [23]
5Don Coppersmith [35]
6Christophe Coupé [7]
7Glenn Durfee [13]
8Pierre-Alain Fouque [42]
9Nicolas Gama [37] [38] [41] [43] [44]
10Rosario Gennaro [19]
11Louis Granboulan [10] [32]
12Nick Howgrave-Graham [19] [24] [26] [35] [37] [38]
13Markus Jakobsson [21]
14Antoine Joux [12]
15Ari Juels [21]
16Henrik Koy [38]
17Gaëtan Leurent [42]
18Edwin El Mahassni [16]
19David Naccache [31]
20Fabrice Noilhan [10]
21David Pointcheval [22] [26]
22John Proos [26]
23Oded Regev [36] [45]
24Igor Shparlinski [16] [18] [20] [24] [25] [35]
25Joseph H. Silverman [26]
26Ari Singer [26]
27Damien Stehlé [28] [33] [39]
28Jacques Stern [1] [2] [3] [4] [5] [7] [8] [14] [17] [23] [34]
29Michael Tunstall [31]
30Serge Vaudenay [10]
31Claire Whelan [31]
32William Whyte [26]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)