Distributed hole-bypassing protocol in WSNs with constant stretch and load balancing P Le Nguyen, Y Ji, Z Liu, QH Vu, KV Nguyen Computer Networks 129, 232-250, 2017 | 39 | 2017 |
On Security Notions for Encryption in a Quantum World C Chevalier, E Ebrahimi, QH Vu | 33 | 2020 |
An energy efficient and load balanced distributed routing scheme for wireless sensor networks with holes KV Nguyen, P Le Nguyen, QH Vu, T Van Do Journal of Systems and Software 123, 92-105, 2017 | 31 | 2017 |
TELPAC: A time and energy efficient protocol for locating and patching coverage holes in WSNs P Le Nguyen, K Nguyen, QH Vu, Y Ji Journal of Network and Computer Applications, 102439, 2019 | 24 | 2019 |
Public-key encryption with quantum keys K Barooti, AB Grilo, L Huguenin-Dumittan, G Malavolta, O Sattath, QH Vu, ... Theory of Cryptography Conference, 198-227, 2023 | 11 | 2023 |
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions O Blazy, C Chevalier, QH Vu | 9 | 2019 |
Encryption with Quantum Public Keys AB Grilo, O Sattath, QH Vu arXiv preprint arXiv:2303.05368, 2023 | 6 | 2023 |
Semi-quantum copy-protection and more C Chevalier, P Hermouet, QH Vu Theory of Cryptography Conference, 155-182, 2023 | 4 | 2023 |
An efficient geographic algorithm for routing in the proximity of a large hole in wireless sensor networks QH Vu, TD Nguyen, CQ Nguyen, VK Nguyen Proceedings of the Seventh Symposium on Information and Communication …, 2016 | 3 | 2016 |
A Time and Energy Efficient Protocol for Locating Coverage Holes in WSNs P Le Nguyen, KV Nguyen, QH Vu, Y Ji 2016 IEEE 41st Conference on Local Computer Networks (LCN), 180-183, 2016 | 2 | 2016 |
Quantum bounds for compiled XOR games and -outcome CHSH games M Baroni, QH Vu, B Bourdoncle, E Diamanti, D Markham, I Šupić arXiv preprint arXiv:2403.05502, 2024 | 1 | 2024 |
Towards the Impossibility of Quantum Public Key Encryption with Classical Keys from One-Way Functions S Bouaziz, AB Grilo, D Vergnaud, QH Vu Cryptology ePrint Archive, 2023 | 1 | 2023 |
zk-SNARKs from Codes with Rank Metrics XT Do, DT Mac, QH Vu IMA International Conference on Cryptography and Coding, 99-119, 2023 | | 2023 |
Unclonable Cryptography in the Plain Model C Chevalier, P Hermouet, QH Vu arXiv preprint arXiv:2311.16663, 2023 | | 2023 |
Facing and Exploiting the Quantum Wave in Computing: New Security Definitions and Cryptographic Constructions QH Vu Université Paris-Panthéon-Assas, 2023 | | 2023 |
On Quantum Simulation-Soundness B Abdolmaleki, C Chevalier, E Ebrahimi, G Malavolta, QH Vu Cryptology ePrint Archive, 2023 | | 2023 |
Hole Aware Real-time Routing Protocol in WSNs PL Nguyen, QH Vu, Y Ji IEICE Technical Report; IEICE Tech. Rep. 116 (403), 1-6, 2017 | | 2017 |