Yu Long Chen

Orcid: 0000-0002-6281-6430

According to our database1, Yu Long Chen authored at least 18 papers between 2017 and 2026.

Collaborative distances:

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
Key Committing Security of HCTR2, Revisited.
IACR Cryptol. ePrint Arch., 2026

2025
A Robust Variant of ChaCha20-Poly1305.
IACR Cryptol. ePrint Arch., 2025

Towards Optimally Secure Deterministic Authenticated Encryption Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Beyond-Birthday-Bound Security with HCTR2: Cascaded Construction and Tweak-Based Key Derivation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2025, 2025

2024
Information-Theoretic Security with Asymmetries.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Key Committing Security of AEZ and More.
IACR Trans. Symmetric Cryptol., 2023

Improved Multi-user Security Using the Squared-Ratio Method.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
Multi-User BBB Security of Public Permutations Based MAC.
IACR Cryptol. ePrint Arch., 2022

Provably Secure Reflection Ciphers.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

A Modular Approach to the Security Analysis of Two-Permutation Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Systematic Security Analysis of Stream Encryption With Key Erasure.
IEEE Trans. Inf. Theory, 2021

Multi-user Security of the Elephant v2 Authenticated Encryption Mode.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

Categorization of Faulty Nonce Misuse Resistant Message Authentication.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus.
IACR Trans. Symmetric Cryptol., 2020

2019
How to Build Pseudorandom Functions from Public Random Permutations.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Short Variable Length Domain Extenders with Beyond Birthday Bound Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Efficient Length Doubling From Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2017


  Loading...