Browsing by Author "Chen, Yu Long"
Now showing 1 - 10 of 10
- Results Per Page
- Sort Options
Publication A Modular Approach to the Security Analysis of Two-Permutation Constructions
Chen, Yu LongProceedings paper2022, 28th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), DEC 05-09, 2022, p.379-409Publication Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation
;Chen, Yu LongTessaro, StefanoProceedings paper2021, 27th Annual International Conference on Theory and Application of Cryptology and Information Security, DEC 06-10, 2021, p.275-304Publication Categorization of Faulty Nonce Misuse Resistant Message Authentication
Proceedings paper2021, 27th Annual International Conference on Theory and Application of Cryptology and Information Security, DEC 06-10, 2021, p.520-550Publication Dumbo, Jumbo, and Delirium: Parallel authenticated encryption for the lightweight circus
;Beyne, Tim ;Chen, Yu Long ;Dobraunig, ChristophMennink, BartJournal article2020, IACR Transaction on Symmetric Cryptology - ToSC, SI1, p.5-30Publication Efficient length doubling from tweakable block ciphers
Journal article2017, IACR Transactions on Symmetric Cryptology, (2017) 3, p.253-270Publication Improved Multi-user Security Using the Squared-Ratio Method
;Chen, Yu Long ;Choi, WonseokLee, ChangminProceedings paper2023, 43rd International Cryptology Conference (CRYPTO), AUG 20-24, 2023, p.694-724Publication Key Committing Security of AEZ and More
;Chen, Yu Long ;Florez-Gutierrez, Antonio ;Inoue, Akiko ;Ito, RyomaIwata, TetsuJournal article2023, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, (2023) 4, p.452-488Publication Multi-user Security of the Elephant v2 Authenticated Encryption Mode
;Beyne, Tim ;Chen, Yu Long ;Dobraunig, ChristophMennink, BartProceedings paper2022, 28th International Conference on Selected Areas in Cryptography (SAC), SEP 29-OCT 01, 2021, p.155-178Publication Provably Secure Reflection Ciphers
;Beyne, TimChen, Yu LongProceedings paper2022, 42nd Annual International Cryptology Conference (CRYPTO), AUG 15-18, 2022, p.234-263Publication Systematic Security Analysis of Stream Encryption With Key Erasure
Journal article2021, IEEE TRANSACTIONS ON INFORMATION THEORY, (67) 11, p.7518-7534