Viet Tung Hoang
Viet Tung Hoang
Assistant Professor at Florida State University
Verified email at cs.fsu.edu - Homepage
Title
Cited by
Cited by
Year
Foundations of garbled circuits
M Bellare, VT Hoang, P Rogaway
Proceedings of the 2012 ACM Conference on Computer and Communications …, 2012
4762012
Efficient garbling from a fixed-key blockcipher
M Bellare, VT Hoang, S Keelveedhi, P Rogaway
IEEE Symposium of Security and Privacy, 478-492, 2013
3492013
Robust Authenticated-Encryption: AEZ and the Problem that it Solves
VT Hoang, T Krovetz, P Rogaway
Advances in Cryptology-EUROCRYPT 2015, 15-44, 2015
172*2015
On generalized Feistel networks
V Hoang, P Rogaway
Advances in Cryptology–CRYPTO 2010, 613-630, 2010
1322010
Adaptively secure garbling with applications to one-time programs and secure outsourcing
M Bellare, VT Hoang, P Rogaway
International Conference on the Theory and Application of Cryptology and …, 2012
1102012
Instantiating Random Oracles via UCEs
M Bellare, VT Hoang, S Keelveedhi
Advances in Cryptology–CRYPTO 2013, 2013
982013
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance
VT Hoang, R Reyhanitabar, P Rogaway, D Vizár
Advances in Cryptology-CRYPTO 2015, 2015
692015
Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model
M Bellare, VT Hoang
Advances in Cryptology-EUROCRYPT 2015, 2015, 627-656, 2015
632015
An enciphering scheme based on a card shuffle
VT Hoang, B Morris, P Rogaway
Annual Cryptology Conference, 1-13, 2012
632012
Key-alternating Ciphers and Key-length Extension: Exact Bounds and Multi-user Security
VT Hoang, S Tessaro
Advances in Cryptology–CRYPTO 2016, 2016
622016
Information-theoretic Indistinguishability via the Chi-squared Method
W Dai, VT Hoang, S Tessaro
CRYPTO 2017, 2017
482017
Adaptive Witness Encryption and Asymmetric Password-based Cryptography.
M Bellare, VT Hoang
Public Key Cryptography (PKC 2015), 308-331, 2015
362015
Message-recovery attacks on Feistel-based Format Preserving Encryption
M Bellare, VT Hoang, S Tessaro
ACM CCS 2016, 2016
302016
Automated Analysis and Synthesis of Authenticated Encryption Schemes
VT Hoang, J Katz, AJ Malozemoff
ACM CCS 2015, 2015
292015
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds
P Bose, VT Hoang, S Tessaro
EUROCRYPT 2018, 2018
252018
The Multi-User Security of Double Encryption
VT Hoang, S Tessaro
Advances in Cryptology–EUROCRYPT 2017, 2017
202017
Identity-Based Format-Preserving Encryption
M Bellare, VT Hoang
ACM CCS 2017, 2017
172017
Cryptography from compression functions: The UCE bridge to the ROM
M Bellare, VT Hoang, S Keelveedhi
CRYPTO 2014, 169-187, 2014
162014
Improved algorithms for maximum agreement and compatible supertrees
VT Hoang, WK Sung
Algorithmica 59 (2), 195-214, 2008
16*2008
Selective-Opening Security in the Presence of Randomness Failures
VT Hoang, J Katz, A O’Neill, M Zaheri
Advances in Cryptology–Asiacrypt 2016, 2016
142016
The system can't perform the operation now. Try again later.
Articles 1–20