[go: up one dir, main page]

Follow
Shan Chen
Shan Chen
Assistant Professor, Southern University of Science and Technology (SUSTech)
Verified email at sustech.edu.cn - Homepage
Title
Cited by
Cited by
Year
Tight security bounds for key-alternating ciphers
S Chen, J Steinberger
Annual International Conference on the Theory and Applications of …, 2014
3612014
Minimizing the two-round Even-Mansour cipher
S Chen, R Lampe, J Lee, Y Seurin, J Steinberger
Annual Cryptology Conference, 39-56, 2014
1152014
Provable security analysis of FIDO2
M Barbosa, A Boldyreva, S Chen, B Warinschi
Annual International Cryptology Conference, 125-156, 2021
872021
Minimizing the two-round Even-Mansour cipher
S Chen, R Lampe, J Lee, Y Seurin, J Steinberger
Journal of Cryptology 31, 1064-1119, 2018
342018
Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC
S Chen, S Jero, M Jagielski, A Boldyreva, C Nita-Rotaru
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
252019
Secure communication channel establishment: TLS 1.3 (over TCP Fast Open) versus QUIC
S Chen, S Jero, M Jagielski, A Boldyreva, C Nita-Rotaru
Journal of Cryptology 34 (3), 26, 2021
212021
Human computing for handling strong corruptions in authenticated key exchange
A Boldyreva, S Chen, PA Dupont, D Pointcheval
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 159-175, 2017
122017
Integrating causality in messaging channels
S Chen, M Fischlin
Annual International Conference on the Theory and Applications of …, 2024
62024
Committing authenticated encryption: generic transforms with hash functions
S Chen, V Karadžić
Annual International Conference on the Theory and Applications of …, 2025
12025
Privacy and security of FIDO2 revisited
M Barbosa, A Boldyreva, S Chen, K Cheng, L Esquível
Proceedings on Privacy Enhancing Technologies, 2025
12025
Towards Secure Communication and Authentication: Provable Security Analysis and New Constructions
S Chen
Georgia Institute of Technology, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–11