עקוב אחר
Yu Long Chen
Yu Long Chen
NIST, KU Leuven
כתובת אימייל מאומתת בדומיין kuleuven.be
כותרת
צוטט על ידי
צוטט על ידי
שנה
How to build pseudorandom functions from public random permutations
YL Chen, E Lambooij, B Mennink
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
482019
Elephant v2
T Beyne, YL Chen, C Dobraunig, B Mennink
NIST lightweight competition, 2021
442021
Dumbo, jumbo, and delirium: Parallel authenticated encryption for the lightweight circus
T Beyne, YL Chen, C Dobraunig, B Mennink
IACR Transactions on Symmetric Cryptology 2020, 5-30, 2020
422020
Multi-user security of the elephant v2 authenticated encryption mode
T Beyne, YL Chen, C Dobraunig, B Mennink
International Conference on Selected Areas in Cryptography, 155-178, 2021
142021
Better security-efficiency trade-offs in permutation-based two-party computation
YL Chen, S Tessaro
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
142021
Efficient length doubling from tweakable block ciphers
YL Chen, A Luykx, BJM Mennink, B Preneel
142017
Short variable length domain extenders with beyond birthday bound security
YL Chen, B Mennink, M Nandi
International Conference on the Theory and Application of Cryptology and …, 2018
112018
Key committing security of AEZ and more
YL Chen, A Flórez-Gutiérrez, A Inoue, R Ito, T Iwata, K Minematsu, ...
IACR Transactions on Symmetric Cryptology 2023 (4), 452-488, 2023
102023
Categorization of faulty nonce misuse resistant message authentication
YL Chen, B Mennink, B Preneel
International Conference on the Theory and Application of Cryptology and …, 2021
102021
Multi-user BBB security of public permutations based MAC
YL Chen, A Dutta, M Nandi
Cryptography and Communications 14 (5), 1145-1177, 2022
62022
Status update on elephant
T Beyne, YL Chen, C Dobraunig, B Mennink
Note at NIST Lightweight Cryptography, 2020
62020
A modular approach to the security analysis of two-permutation constructions
YL Chen
International Conference on the Theory and Application of Cryptology and …, 2022
52022
Provably secure reflection ciphers
T Beyne, YL Chen
Annual International Cryptology Conference, 234-263, 2022
42022
Proposal of requirements for an accordion mode
YL Chen, M Davidson, M Dworkin, J Kang, J Kelsey, Y Sasaki, MS Turan, ...
Discussion Draft for the NIST Accordion Mode Workshop 2024, 2024
22024
Information-theoretic security with asymmetries
T Beyne, YL Chen
Annual International Cryptology Conference, 463-494, 2024
2024
Updates on Elephant
T Beyne, YL Chen, C Dobraunig, B Mennink, KU Leuven
2020
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–16