Follow
Viet Tung Hoang
Viet Tung Hoang
Associate Professor at Florida State University
Verified email at cs.fsu.edu - Homepage
Title
Cited by
Cited by
Year
Foundations of garbled circuits
M Bellare, VT Hoang, P Rogaway
Proceedings of the 2012 ACM Conference on Computer and Communications …, 2012
7262012
Efficient garbling from a fixed-key blockcipher
M Bellare, VT Hoang, S Keelveedhi, P Rogaway
IEEE Symposium of Security and Privacy, 478-492, 2013
4432013
Robust Authenticated-Encryption: AEZ and the Problem that it Solves
VT Hoang, T Krovetz, P Rogaway
Advances in Cryptology-EUROCRYPT 2015, 15-44, 2015
255*2015
On generalized Feistel networks
V Hoang, P Rogaway
Advances in Cryptology–CRYPTO 2010, 613-630, 2010
1772010
Adaptively secure garbling with applications to one-time programs and secure outsourcing
M Bellare, VT Hoang, P Rogaway
Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012
1432012
Key-alternating Ciphers and Key-length Extension: Exact Bounds and Multi-user Security
VT Hoang, S Tessaro
Advances in Cryptology–CRYPTO 2016, 2016
1342016
Instantiating Random Oracles via UCEs
M Bellare, VT Hoang, S Keelveedhi
Advances in Cryptology–CRYPTO 2013, 2013
1242013
Information-theoretic Indistinguishability via the Chi-squared Method
W Dai, VT Hoang, S Tessaro
CRYPTO 2017, 2017
1012017
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
VT Hoang, R Reyhanitabar, P Rogaway, D Vizár
Advances in Cryptology-CRYPTO 2015, 2015
882015
An enciphering scheme based on a card shuffle
VT Hoang, B Morris, P Rogaway
Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012
882012
Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model
M Bellare, VT Hoang
Advances in Cryptology-EUROCRYPT 2015, 2015, 627-656, 2015
852015
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds
P Bose, VT Hoang, S Tessaro
EUROCRYPT 2018, 2018
622018
Adaptive Witness Encryption and Asymmetric Password-based Cryptography.
M Bellare, VT Hoang
Public Key Cryptography (PKC 2015), 308-331, 2015
542015
The Multi-User Security of Double Encryption
VT Hoang, S Tessaro
Advances in Cryptology–EUROCRYPT 2017, 2017
472017
Automated Analysis and Synthesis of Authenticated Encryption Schemes
VT Hoang, J Katz, AJ Malozemoff
ACM CCS 2015, 2015
432015
The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization
VT Hoang, S Tessaro, A Thiruvengadam
CCS 2018, 1429-1440, 2018
402018
Efficient Schemes for Committing Authenticated Encryption
M Bellare, VT Hoang
EURORYPT 2022, 2022
392022
Message-recovery attacks on Feistel-based Format Preserving Encryption
M Bellare, VT Hoang, S Tessaro
ACM CCS 2016, 2016
382016
Identity-Based Format-Preserving Encryption
M Bellare, VT Hoang
ACM CCS 2017, 2017
212017
Cryptography from compression functions: The UCE bridge to the ROM
M Bellare, VT Hoang, S Keelveedhi
CRYPTO 2014, 169-187, 2014
212014
The system can't perform the operation now. Try again later.
Articles 1–20