Projects per year
Personal profile
Personal profile
I obtained my Ph. D at School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore. My research interests are in the areas of coding theory and cryptography, with recent focus on code-based privacy-preserving cryptographic protocols.
Person Types
- Staff
Fingerprint
Collaborations and top research areas from the last five years
Projects
- 1 Finished
-
Code-Based Privacy-Preserving Cryptographic Constructions with New and Enhanced Features
Zeng, N. & Nguyen, K.
1/09/22 → 15/10/24
Project: Internal Research Project
-
Group encryption: Full dynamicity, message filtering and code-based instantiation
Nguyen, K., Safavi-Naini, R., Susilo, W., Wang, H., Xu, Y. & Zeng, N., 29 Jul 2024, In: Theoretical Computer Science. 1007, 114678.Research output: Contribution to journal › Article › peer-review
-
Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation
Nguyen, K., Safavi-Naini, R., Susilo, W., Wang, H., Xu, Y. & Zeng, N., 2021, Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings. Garay, J. A. (ed.). Springer Science and Business Media Deutschland GmbH, p. 678-708 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12711 LNCS).Research output: Chapter in Book or Report/Conference proceeding › Conference Proceeding › peer-review
2 Citations (Scopus) -
Lightweight Key Encapsulation Using LDPC Codes on FPGAs
Hu, J., Baldi, M., Santini, P., Zeng, N., Ling, S. & Wang, H., 1 Mar 2020, In: IEEE Transactions on Computers. 69, 3, p. 327-341 15 p., 8877876.Research output: Contribution to journal › Article › peer-review
10 Citations (Scopus) -
New Code-Based Privacy-Preserving Cryptographic Constructions
Nguyen, K., Tang, H., Wang, H. & Zeng, N., 2019, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 25-55 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11922 LNCS).Research output: Chapter in Book or Report/Conference proceeding › Conference Proceeding › peer-review
12 Citations (Scopus) -
Threshold Changeable Ramp Secret Sharing
Lin, F., Ling, S., Wang, H. & Zeng, N., 2019, Cryptology and Network Security - 18th International Conference, CANS 2019, Proceedings. Mu, Y., Huang, X. & Deng, R. H. (eds.). Springer, p. 308-327 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11829 LNCS).Research output: Chapter in Book or Report/Conference proceeding › Conference Proceeding › peer-review
3 Citations (Scopus)