Repository logo Institutional repository
  • Communities & Collections
  • Browse
  • Site
Search repository
High contrast
  1. Home
  2. Browse by Author

Browsing by Author "Chen, Yu Long"

Filter results by typing the first few letters
Now showing 1 - 10 of 10
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Publication

    A Modular Approach to the Security Analysis of Two-Permutation Constructions

    Chen, Yu Long
    Proceedings paper
    2022, 28th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT), DEC 05-09, 2022, p.379-409
  • Loading...
    Thumbnail Image
    Publication

    Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation

    Chen, Yu Long
    ;
    Tessaro, Stefano
    Proceedings paper
    2021, 27th Annual International Conference on Theory and Application of Cryptology and Information Security, DEC 06-10, 2021, p.275-304
  • Loading...
    Thumbnail Image
    Publication

    Categorization of Faulty Nonce Misuse Resistant Message Authentication

    Chen, Yu Long
    ;
    Mennink, Bart
    ;
    Preneel, Bart  
    Proceedings paper
    2021, 27th Annual International Conference on Theory and Application of Cryptology and Information Security, DEC 06-10, 2021, p.520-550
  • Loading...
    Thumbnail Image
    Publication

    Dumbo, Jumbo, and Delirium: Parallel authenticated encryption for the lightweight circus

    Beyne, Tim
    ;
    Chen, Yu Long
    ;
    Dobraunig, Christoph
    ;
    Mennink, Bart
    Journal article
    2020, IACR Transaction on Symmetric Cryptology - ToSC, SI1, p.5-30
  • Loading...
    Thumbnail Image
    Publication

    Efficient length doubling from tweakable block ciphers

    Chen, Yu Long
    ;
    Luykx, Atul
    ;
    Mennink, Bart
    ;
    Preneel, Bart  
    Journal article
    2017, IACR Transactions on Symmetric Cryptology, (2017) 3, p.253-270
  • Loading...
    Thumbnail Image
    Publication

    Improved Multi-user Security Using the Squared-Ratio Method

    Chen, Yu Long
    ;
    Choi, Wonseok
    ;
    Lee, Changmin
    Proceedings paper
    2023, 43rd International Cryptology Conference (CRYPTO), AUG 20-24, 2023, p.694-724
  • Loading...
    Thumbnail Image
    Publication

    Key Committing Security of AEZ and More

    Chen, Yu Long
    ;
    Florez-Gutierrez, Antonio
    ;
    Inoue, Akiko
    ;
    Ito, Ryoma
    ;
    Iwata, Tetsu
    Journal article
    2023, IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, (2023) 4, p.452-488
  • Loading...
    Thumbnail Image
    Publication

    Multi-user Security of the Elephant v2 Authenticated Encryption Mode

    Beyne, Tim
    ;
    Chen, Yu Long
    ;
    Dobraunig, Christoph
    ;
    Mennink, Bart
    Proceedings paper
    2022, 28th International Conference on Selected Areas in Cryptography (SAC), SEP 29-OCT 01, 2021, p.155-178
  • Loading...
    Thumbnail Image
    Publication

    Provably Secure Reflection Ciphers

    Beyne, Tim
    ;
    Chen, Yu Long
    Proceedings paper
    2022, 42nd Annual International Cryptology Conference (CRYPTO), AUG 15-18, 2022, p.234-263
  • Loading...
    Thumbnail Image
    Publication

    Systematic Security Analysis of Stream Encryption With Key Erasure

    Chen, Yu Long
    ;
    Luykx, Atul
    ;
    Mennink, Bart
    ;
    Preneel, Bart  
    Journal article
    2021, IEEE TRANSACTIONS ON INFORMATION THEORY, (67) 11, p.7518-7534

Follow imec on

VimeoLinkedInFacebook

The repository

  • Contact us
  • Policy
  • About imec
Privacy statement | Cookie settings