关注
Quoc-Huy Vu
Quoc-Huy Vu
DVRC, Pôle Léonard de Vinci
在 ens.fr 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Distributed hole-bypassing protocol in WSNs with constant stretch and load balancing
P Le Nguyen, Y Ji, Z Liu, QH Vu, KV Nguyen
Computer Networks 129, 232-250, 2017
392017
On Security Notions for Encryption in a Quantum World
C Chevalier, E Ebrahimi, QH Vu
332020
An energy efficient and load balanced distributed routing scheme for wireless sensor networks with holes
KV Nguyen, P Le Nguyen, QH Vu, T Van Do
Journal of Systems and Software 123, 92-105, 2017
312017
TELPAC: A time and energy efficient protocol for locating and patching coverage holes in WSNs
P Le Nguyen, K Nguyen, QH Vu, Y Ji
Journal of Network and Computer Applications, 102439, 2019
242019
Public-key encryption with quantum keys
K Barooti, AB Grilo, L Huguenin-Dumittan, G Malavolta, O Sattath, QH Vu, ...
Theory of Cryptography Conference, 198-227, 2023
112023
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions
O Blazy, C Chevalier, QH Vu
92019
Encryption with Quantum Public Keys
AB Grilo, O Sattath, QH Vu
arXiv preprint arXiv:2303.05368, 2023
62023
Semi-quantum copy-protection and more
C Chevalier, P Hermouet, QH Vu
Theory of Cryptography Conference, 155-182, 2023
42023
An efficient geographic algorithm for routing in the proximity of a large hole in wireless sensor networks
QH Vu, TD Nguyen, CQ Nguyen, VK Nguyen
Proceedings of the Seventh Symposium on Information and Communication …, 2016
32016
A Time and Energy Efficient Protocol for Locating Coverage Holes in WSNs
P Le Nguyen, KV Nguyen, QH Vu, Y Ji
2016 IEEE 41st Conference on Local Computer Networks (LCN), 180-183, 2016
22016
Quantum bounds for compiled XOR games and -outcome CHSH games
M Baroni, QH Vu, B Bourdoncle, E Diamanti, D Markham, I Šupić
arXiv preprint arXiv:2403.05502, 2024
12024
Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions
S Bouaziz, AB Grilo, D Vergnaud, QH Vu
Cryptology ePrint Archive, 2023
12023
zk-SNARKs from Codes with Rank Metrics
XT Do, DT Mac, QH Vu
IMA International Conference on Cryptography and Coding, 99-119, 2023
2023
Unclonable Cryptography in the Plain Model
C Chevalier, P Hermouet, QH Vu
arXiv preprint arXiv:2311.16663, 2023
2023
Facing and Exploiting the Quantum Wave in Computing: New Security Definitions and Cryptographic Constructions
QH Vu
Université Paris-Panthéon-Assas, 2023
2023
On Quantum Simulation-Soundness
B Abdolmaleki, C Chevalier, E Ebrahimi, G Malavolta, QH Vu
Cryptology ePrint Archive, 2023
2023
Hole Aware Real-time Routing Protocol in WSNs
PL Nguyen, QH Vu, Y Ji
IEICE Technical Report; IEICE Tech. Rep. 116 (403), 1-6, 2017
2017
系统目前无法执行此操作,请稍后再试。
文章 1–17