Yaobin Shen

Orcid: 0000-0002-9549-4538

According to our database1, Yaobin Shen authored at least 26 papers between 2018 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Security Analysis of NIST Key Derivation Using Pseudorandom Functions.
IACR Cryptol. ePrint Arch., 2025

Proxying Is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability.
Proceedings of the 7th Conference on Advances in Financial Technologies, 2025

2024
Multiplex: TBC-based Authenticated Encryption with Sponge-Like Rate.
IACR Cryptol. ePrint Arch., 2024

Efficient Variants of TNT with BBB Security.
Proceedings of the Provable and Practical Security, 2024

Security Analysis of CMAC in the Multi-user Model.
Proceedings of the Information Security - 27th International Conference, 2024

The Committing Security of MACs with Applications to Generic Composition.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Multi-User Security of CCM Authenticated Encryption Mode.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

A Resource-Friendly Random Number Generation Algorithm for IoT.
Proceedings of the 7th International Conference on Algorithms, 2024

2023
Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers.
IACR Cryptol. ePrint Arch., 2023

Revisiting the Indifferentiability of the Sum of Permutations.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Forgery Attacks on Several Beyond-Birthday-Bound Secure MACs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Triplex: an Efficient and One-Pass Leakage-Resistant Mode of Operation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Secure Message Authentication in the Presence of Leakage and Faults.
IACR Cryptol. ePrint Arch., 2022

Key-Reduced Variants of 3kf9 with Beyond-Birthday-Bound Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
LedMAC: More Efficient Variants of LightMAC.
IACR Cryptol. ePrint Arch., 2021

Secure key-alternating Feistel ciphers without key schedule.
Sci. China Inf. Sci., 2021

Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting.
IACR Cryptol. ePrint Arch., 2020

Improved Security Bounds for Generalized Feistel Networks.
IACR Cryptol. ePrint Arch., 2020

Security Analysis of NIST CTR-DRBG.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Security of Streaming Encryption in Google's Tink Library.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Tweaking Key-Alternating Feistel Block Ciphers.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
On Beyond-Birthday-Bound Security: Revisiting the Development of ISO/IEC 9797-1 MACs.
IACR Trans. Symmetric Cryptol., 2019

Beyond-birthday secure domain-preserving PRFs from a single permutation.
Des. Codes Cryptogr., 2019

2018
ISO/IEC 9797-1 Revisited: Beyond Birthday Bound.
IACR Cryptol. ePrint Arch., 2018

Length-Preserving Encryption Based on Single-Key Tweakable Block Cipher.
Proceedings of the Provable Security, 2018


  Loading...