Follow
Viet Tung Hoang
Viet Tung Hoang
Associate Professor at Florida State University
Verified email at cs.fsu.edu - Homepage
Title
Cited by
Cited by
Year
Foundations of garbled circuits
M Bellare, VT Hoang, P Rogaway
Proceedings of the 2012 ACM Conference on Computer and Communications …, 2012
6802012
Efficient garbling from a fixed-key blockcipher
M Bellare, VT Hoang, S Keelveedhi, P Rogaway
IEEE Symposium of Security and Privacy, 478-492, 2013
4352013
Robust Authenticated-Encryption: AEZ and the Problem that it Solves
VT Hoang, T Krovetz, P Rogaway
Advances in Cryptology-EUROCRYPT 2015, 15-44, 2015
236*2015
On generalized Feistel networks
V Hoang, P Rogaway
Advances in Cryptology–CRYPTO 2010, 613-630, 2010
1662010
Adaptively secure garbling with applications to one-time programs and secure outsourcing
M Bellare, VT Hoang, P Rogaway
Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012
1322012
Instantiating Random Oracles via UCEs
M Bellare, VT Hoang, S Keelveedhi
Advances in Cryptology–CRYPTO 2013, 2013
1192013
Key-alternating Ciphers and Key-length Extension: Exact Bounds and Multi-user Security
VT Hoang, S Tessaro
Advances in Cryptology–CRYPTO 2016, 2016
1182016
Information-theoretic Indistinguishability via the Chi-squared Method
W Dai, VT Hoang, S Tessaro
CRYPTO 2017, 2017
872017
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
VT Hoang, R Reyhanitabar, P Rogaway, D Vizár
Advances in Cryptology-CRYPTO 2015, 2015
822015
Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model
M Bellare, VT Hoang
Advances in Cryptology-EUROCRYPT 2015, 2015, 627-656, 2015
802015
An enciphering scheme based on a card shuffle
VT Hoang, B Morris, P Rogaway
Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012
792012
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds
P Bose, VT Hoang, S Tessaro
EUROCRYPT 2018, 2018
542018
Adaptive Witness Encryption and Asymmetric Password-based Cryptography.
M Bellare, VT Hoang
Public Key Cryptography (PKC 2015), 308-331, 2015
492015
The Multi-User Security of Double Encryption
VT Hoang, S Tessaro
Advances in Cryptology–EUROCRYPT 2017, 2017
412017
Automated Analysis and Synthesis of Authenticated Encryption Schemes
VT Hoang, J Katz, AJ Malozemoff
ACM CCS 2015, 2015
402015
Message-recovery attacks on Feistel-based Format Preserving Encryption
M Bellare, VT Hoang, S Tessaro
ACM CCS 2016, 2016
372016
The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization
VT Hoang, S Tessaro, A Thiruvengadam
CCS 2018, 1429-1440, 2018
332018
Efficient Schemes for Committing Authenticated Encryption
M Bellare, VT Hoang
EURORYPT 2022, 2022
242022
Cryptography from compression functions: The UCE bridge to the ROM
M Bellare, VT Hoang, S Keelveedhi
CRYPTO 2014, 169-187, 2014
212014
Selective-Opening Security in the Presence of Randomness Failures
VT Hoang, J Katz, A O’Neill, M Zaheri
Advances in Cryptology–Asiacrypt 2016, 2016
202016
The system can't perform the operation now. Try again later.
Articles 1–20