Yu Long Chen

Orcid: 0000-0002-6281-6430

According to our database1, Yu Long Chen authored at least 13 papers between 2017 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Key Committing Security of AEZ and More.
IACR Trans. Symmetric Cryptol., 2023

Improved Multi-User Security Using the Squared-Ratio Method.
IACR Cryptol. ePrint Arch., 2023

2022
Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation.
IACR Cryptol. ePrint Arch., 2022

A Modular Approach to the Security Analysis of Two-Permutation Constructions.
IACR Cryptol. ePrint Arch., 2022

Provably Secure Reflection Ciphers.
IACR Cryptol. ePrint Arch., 2022

Multi-user BBB security of public permutations based MAC.
Cryptogr. Commun., 2022

2021
Systematic Security Analysis of Stream Encryption With Key Erasure.
IEEE Trans. Inf. Theory, 2021

Categorization of Faulty Nonce Misuse Resistant Message Authentication.
IACR Cryptol. ePrint Arch., 2021

Multi-user Security of the Elephant v2 Authenticated Encryption Mode.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

2020
Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus.
IACR Trans. Symmetric Cryptol., 2020

2019
How to Build Pseudorandom Functions From Public Random Permutations.
IACR Cryptol. ePrint Arch., 2019

2018
Short Variable Length Domain Extenders With Beyond Birthday Bound Security.
IACR Cryptol. ePrint Arch., 2018

2017
Efficient Length Doubling From Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2017


  Loading...