Follow
Viet Tung Hoang
Viet Tung Hoang
Associate Professor at Florida State University
Verified email at cs.fsu.edu - Homepage
Title
Cited by
Cited by
Year
Foundations of garbled circuits
M Bellare, VT Hoang, P Rogaway
Proceedings of the 2012 ACM Conference on Computer and Communications …, 2012
7492012
Efficient garbling from a fixed-key blockcipher
M Bellare, VT Hoang, S Keelveedhi, P Rogaway
IEEE Symposium of Security and Privacy, 478-492, 2013
4502013
Robust Authenticated-Encryption: AEZ and the Problem that it Solves
VT Hoang, T Krovetz, P Rogaway
Advances in Cryptology-EUROCRYPT 2015, 15-44, 2015
258*2015
On generalized Feistel networks
V Hoang, P Rogaway
Advances in Cryptology–CRYPTO 2010, 613-630, 2010
1822010
Adaptively secure garbling with applications to one-time programs and secure outsourcing
M Bellare, VT Hoang, P Rogaway
Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012
1442012
Key-alternating Ciphers and Key-length Extension: Exact Bounds and Multi-user Security
VT Hoang, S Tessaro
Advances in Cryptology–CRYPTO 2016, 2016
1412016
Instantiating Random Oracles via UCEs
M Bellare, VT Hoang, S Keelveedhi
Advances in Cryptology–CRYPTO 2013, 2013
1242013
Information-theoretic Indistinguishability via the Chi-squared Method
W Dai, VT Hoang, S Tessaro
CRYPTO 2017, 2017
1062017
An enciphering scheme based on a card shuffle
VT Hoang, B Morris, P Rogaway
Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012
912012
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
VT Hoang, R Reyhanitabar, P Rogaway, D Vizár
Advances in Cryptology-CRYPTO 2015, 2015
902015
Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model
M Bellare, VT Hoang
Advances in Cryptology-EUROCRYPT 2015, 2015, 627-656, 2015
862015
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds
P Bose, VT Hoang, S Tessaro
EUROCRYPT 2018, 2018
652018
Adaptive Witness Encryption and Asymmetric Password-based Cryptography.
M Bellare, VT Hoang
Public Key Cryptography (PKC 2015), 308-331, 2015
552015
The Multi-User Security of Double Encryption
VT Hoang, S Tessaro
Advances in Cryptology–EUROCRYPT 2017, 2017
492017
Efficient Schemes for Committing Authenticated Encryption
M Bellare, VT Hoang
EURORYPT 2022, 2022
452022
Automated Analysis and Synthesis of Authenticated Encryption Schemes
VT Hoang, J Katz, AJ Malozemoff
ACM CCS 2015, 2015
442015
The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization
VT Hoang, S Tessaro, A Thiruvengadam
CCS 2018, 1429-1440, 2018
412018
Message-recovery attacks on Feistel-based Format Preserving Encryption
M Bellare, VT Hoang, S Tessaro
ACM CCS 2016, 2016
392016
Identity-Based Format-Preserving Encryption
M Bellare, VT Hoang
ACM CCS 2017, 2017
212017
Cryptography from compression functions: The UCE bridge to the ROM
M Bellare, VT Hoang, S Keelveedhi
CRYPTO 2014, 169-187, 2014
212014
The system can't perform the operation now. Try again later.
Articles 1–20