Viet Tung Hoang

Orcid: 0000-0003-3092-6405

According to our database1, Viet Tung Hoang authored at least 38 papers between 2008 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Rethinking Tamper-Evident Logging: A High-Performance, Co-Designed Auditing System.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

The OCH Authenticated Encryption Scheme.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
Succinctly-Committing Authenticated Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Robust AE With Committing Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2022
Faster Yet Safer: Logging System Via Fixed-Key Blockcipher.
Proceedings of the 31st USENIX Security Symposium, 2022

Efficient Schemes for Committing Authenticated Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
Efficient Algorithms for Encrypted All-gather Operation.
Proceedings of the 35th IEEE International Parallel and Distributed Processing Symposium, 2021

2020
CryptMPI: A Fast Encrypted MPI Library.
CoRR, 2020

Performance Evaluation and Modeling of Cryptographic Libraries for MPI Communications.
CoRR, 2020

Security Analysis of NIST CTR-DRBG.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Security of Streaming Encryption in Google's Tink Library.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Attacks only Get Better: How to Break FF3 on Large Domains.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

An Empirical Study of Cryptographic Libraries for MPI Communications.
Proceedings of the 2019 IEEE International Conference on Cluster Computing, 2019

2018
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

The Curse of Small Domains: New Attacks on Format-Preserving Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
The Multi-user Security of Double Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Information-Theoretic Indistinguishability via the Chi-Squared Method.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

Identity-Based Format-Preserving Encryption.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Message-Recovery Attacks on Feistel-Based Format Preserving Encryption.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Selective-Opening Security in the Presence of Randomness Failures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Adaptive Witness Encryption and Asymmetric Password-Based Cryptography.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Robust Authenticated-Encryption AEZ and the Problem That It Solves.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Automated Analysis and Synthesis of Authenticated Encryption Schemes.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
UCE+LTDFs: Efficient, Subversion-Resistant PKE in the Standard Model.
IACR Cryptol. ePrint Arch., 2014

Cryptography from Compression Functions: The UCE Bridge to the ROM.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Efficient Garbling from a Fixed-Key Blockcipher.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Instantiating Random Oracles via UCEs.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Garbling Schemes.
IACR Cryptol. ePrint Arch., 2012

An Enciphering Scheme Based on a Card Shuffle.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

Foundations of garbled circuits.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Improved Algorithms for Maximum Agreement and Compatible Supertrees.
Algorithmica, 2011

2010
On Generalized Feistel Networks.
Proceedings of the Advances in Cryptology, 2010

2008
Fixed Parameter Polynomial Time Algorithms for Maximum Agreement and Compatible Supertrees.
Proceedings of the 25th Annual Symposium on Theoretical Aspects of Computer Science, 2008


  Loading...