[go: up one dir, main page]

Follow
Quoc-Huy Vu
Quoc-Huy Vu
DVRC, De Vinci Higher Education
Verified email at ens.fr - Homepage
Title
Cited by
Cited by
Year
On security notions for encryption in a quantum world
C Chevalier, E Ebrahimi, QH Vu
Designs, Codes and Cryptography 93 (10), 4355-4402, 2025
462025
Distributed hole-bypassing protocol in WSNs with constant stretch and load balancing
P Le Nguyen, Y Ji, Z Liu, QH Vu, KV Nguyen
Computer Networks 129, 232-250, 2017
412017
Public-key encryption with quantum keys
K Barooti, AB Grilo, L Huguenin-Dumittan, G Malavolta, O Sattath, QH Vu, ...
Theory of Cryptography Conference, 198-227, 2023
392023
An energy efficient and load balanced distributed routing scheme for wireless sensor networks with holes
KV Nguyen, P Le Nguyen, QH Vu, T Van Do
Journal of Systems and Software 123, 92-105, 2017
322017
TELPAC: A time and energy efficient protocol for locating and patching coverage holes in WSNs
P Le Nguyen, K Nguyen, QH Vu, Y Ji
Journal of Network and Computer Applications, 102439, 2019
292019
Semi-quantum copy-protection and more
C Chevalier, P Hermouet, QH Vu
Theory of Cryptography Conference, 155-182, 2023
132023
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions
O Blazy, C Chevalier, QH Vu
122019
Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions
S Bouaziz, AB Grilo, D Vergnaud, QH Vu
Cryptology ePrint Archive, 2023
102023
Encryption with Quantum Public Keys
AB Grilo, O Sattath, QH Vu
arXiv preprint arXiv:2303.05368, 2023
82023
Quantum bounds for compiled XOR games and -outcome CHSH games
M Baroni, QH Vu, B Bourdoncle, E Diamanti, D Markham, I Šupić
Quantum 9, 1894, 2025
72025
On Quantum Simulation-Soundness
B Abdolmaleki, C Chevalier, E Ebrahimi, G Malavolta, QH Vu
Cryptology ePrint Archive, 2023
42023
A Time and Energy Efficient Protocol for Locating Coverage Holes in WSNs
P Le Nguyen, KV Nguyen, QH Vu, Y Ji
2016 IEEE 41st Conference on Local Computer Networks (LCN), 180-183, 2016
42016
An efficient geographic algorithm for routing in the proximity of a large hole in wireless sensor networks
QH Vu, TD Nguyen, CQ Nguyen, VK Nguyen
Proceedings of the Seventh Symposium on Information and Communication …, 2016
32016
zk-SNARKs from Codes with Rank Metrics
XT Do, DT Mac, QH Vu
IMA International Conference on Cryptography and Coding, 99-119, 2023
22023
On limits on the provable consequences of quantum pseudorandomness
S Bouaziz, M Hhan, G Muguruza, QH Vu
Cryptology ePrint Archive, 2025
12025
Towards Unclonable Cryptography in the Plain Model
C Chevalier, P Hermouet, QH Vu
arXiv preprint arXiv:2311.16663, 2023
12023
Security Models and Cryptographic Protocols in a Quantum World
C Chevalier, P Hermouet, QH Vu
Cryptology ePrint Archive, 2025
2025
Traitor Tracing in Multi-sender Setting (: Traceable Multi-client Functional Encryption)
XT Do, DT Mac, K Nguyen, DH Phan, QH Vu
Cryptology ePrint Archive, 2025
2025
Facing and Exploiting the Quantum Wave in Computing: New Security Definitions and Cryptographic Constructions
QH Vu
Université Paris-Panthéon-Assas, 2023
2023
Hole Aware Real-time Routing Protocol in WSNs
PL Nguyen, QH Vu, Y Ji
IEICE Technical Report; IEICE Tech. Rep. 116 (403), 1-6, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20