[go: up one dir, main page]

Follow
Yu Long Chen
Yu Long Chen
NIST, KU Leuven
Verified email at kuleuven.be
Title
Cited by
Cited by
Year
How to build pseudorandom functions from public random permutations
YL Chen, E Lambooij, B Mennink
Annual International Cryptology Conference, 266-293, 2019
602019
Elephant v2
T Beyne, YL Chen, C Dobraunig, B Mennink
NIST lightweight competition, 2021
482021
Dumbo, jumbo, and delirium: Parallel authenticated encryption for the lightweight circus
T Beyne, YL Chen, C Dobraunig, B Mennink
IACR Transactions on Symmetric Cryptology 2020, 5-30, 2020
442020
Better security-efficiency trade-offs in permutation-based two-party computation
YL Chen, S Tessaro
International Conference on the Theory and Application of Cryptology and …, 2021
192021
Key committing security of AEZ and more
YL Chen, A Flórez-Gutiérrez, A Inoue, R Ito, T Iwata, K Minematsu, ...
IACR Transactions on Symmetric Cryptology 2023 (4), 452-488, 2023
172023
Efficient length doubling from tweakable block ciphers
YL Chen, A Luykx, BJM Mennink, B Preneel
172017
Multi-user security of the elephant v2 authenticated encryption mode
T Beyne, YL Chen, C Dobraunig, B Mennink
International Conference on Selected Areas in Cryptography, 155-178, 2021
152021
Short variable length domain extenders with beyond birthday bound security
YL Chen, B Mennink, M Nandi
International Conference on the Theory and Application of Cryptology and …, 2018
132018
Categorization of faulty nonce misuse resistant message authentication
YL Chen, B Mennink, B Preneel
International Conference on the Theory and Application of Cryptology and …, 2021
112021
Multi-user BBB security of public permutations based MAC
YL Chen, A Dutta, M Nandi
Cryptography and Communications 14 (5), 1145-1177, 2022
92022
A modular approach to the security analysis of two-permutation constructions
YL Chen
International Conference on the Theory and Application of Cryptology and …, 2022
82022
Provably secure reflection ciphers
T Beyne, YL Chen
Annual International Cryptology Conference, 234-263, 2022
62022
Status update on elephant
T Beyne, YL Chen, C Dobraunig, B Mennink
Note at NIST Lightweight Cryptography, 2020
62020
Proposal of requirements for an accordion mode
YL Chen, M Davidson, M Dworkin, J Kang, J Kelsey, Y Sasaki, MS Turan, ...
Discussion Draft for the NIST Accordion Mode Workshop 2024, 2024
32024
Information-theoretic security with asymmetries
T Beyne, YL Chen
Annual International Cryptology Conference, 463-494, 2024
12024
Updates on Elephant
T Beyne, YL Chen, C Dobraunig, B Mennink, KU Leuven
2020
The system can't perform the operation now. Try again later.
Articles 1–16