Seguir
Yu Long Chen
Yu Long Chen
COSIC-ESAT, KU Leuven
Email confirmado em kuleuven.be
Título
Citado por
Citado por
Ano
Elephant v2
T Beyne, YL Chen, C Dobraunig, B Mennink
NIST lightweight competition, 2021
452021
How to build pseudorandom functions from public random permutations
YL Chen, E Lambooij, B Mennink
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
442019
Dumbo, jumbo, and delirium: Parallel authenticated encryption for the lightweight circus
T Beyne, YL Chen, C Dobraunig, B Mennink
IACR Transactions on Symmetric Cryptology 2020, 5-30, 2020
362020
Efficient length doubling from tweakable block ciphers
YL Chen, A Luykx, BJM Mennink, B Preneel
142017
Multi-user security of the elephant v2 authenticated encryption mode
T Beyne, YL Chen, C Dobraunig, B Mennink
International Conference on Selected Areas in Cryptography, 155-178, 2021
122021
Better security-efficiency trade-offs in permutation-based two-party computation
YL Chen, S Tessaro
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
122021
Short variable length domain extenders with beyond birthday bound security
YL Chen, B Mennink, M Nandi
International Conference on the Theory and Application of Cryptology and …, 2018
112018
Categorization of faulty nonce misuse resistant message authentication
YL Chen, B Mennink, B Preneel
International Conference on the Theory and Application of Cryptology and …, 2021
92021
Key committing security of AEZ and more
YL Chen, A Flórez-Gutiérrez, A Inoue, R Ito, T Iwata, K Minematsu, ...
IACR Transactions on Symmetric Cryptology 2023 (4), 452-488, 2023
62023
Multi-user BBB security of public permutations based MAC
YL Chen, A Dutta, M Nandi
Cryptography and Communications 14 (5), 1145-1177, 2022
62022
A modular approach to the security analysis of two-permutation constructions
YL Chen
International Conference on the Theory and Application of Cryptology and …, 2022
52022
Status update on elephant
T Beyne, YL Chen, C Dobraunig, B Mennink
Note at NIST Lightweight Cryptography, 2020
52020
Provably secure reflection ciphers
T Beyne, YL Chen
Annual International Cryptology Conference, 234-263, 2022
42022
Proposal of Requirements for an Accordion Mode
YL Chen, M Davidson, M Dworkin, J Kang, J Kelsey, Y Sasaki, MS Turan, ...
Discussion Draft for the NIST Accordion Mode Workshop 2024, 2024
12024
Information-theoretic security with asymmetries
T Beyne, YL Chen
Annual International Cryptology Conference, 463-494, 2024
2024
Updates on Elephant
T Beyne, YL Chen, C Dobraunig, B Mennink, KU Leuven
2020
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–16