Yu Long Chen

Orcid: 0000-0002-6281-6430

According to our database1, Yu Long Chen authored at least 16 papers between 2017 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A Robust Variant of ChaCha20-Poly1305.
IACR Cryptol. ePrint Arch., 2025

Towards Optimally Secure Deterministic Authenticated Encryption Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2024
Information-Theoretic Security with Asymmetries.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Key Committing Security of AEZ and More.
IACR Trans. Symmetric Cryptol., 2023

Improved Multi-user Security Using the Squared-Ratio Method.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
Multi-User BBB Security of Public Permutations Based MAC.
IACR Cryptol. ePrint Arch., 2022

Provably Secure Reflection Ciphers.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

A Modular Approach to the Security Analysis of Two-Permutation Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Systematic Security Analysis of Stream Encryption With Key Erasure.
IEEE Trans. Inf. Theory, 2021

Multi-user Security of the Elephant v2 Authenticated Encryption Mode.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Categorization of Faulty Nonce Misuse Resistant Message Authentication.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus.
IACR Trans. Symmetric Cryptol., 2020

2019
How to Build Pseudorandom Functions from Public Random Permutations.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Short Variable Length Domain Extenders with Beyond Birthday Bound Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Efficient Length Doubling From Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2017


  Loading...