Yu Long Chen

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Towards optimally secure deterministic authenticated encryption schemes2025-11-20Paper
Information-theoretic security with asymmetries2024-12-13Paper
Multi-user security of the Elephant v2 authenticated encryption mode2024-10-14Paper
Improved multi-user security using the squared-ratio method
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
A modular approach to the security analysis of two-permutation constructions
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Provably secure reflection ciphers
Advances in Cryptology – CRYPTO 2022
2023-07-07Paper
Categorization of faulty nonce misuse resistant message authentication
Lecture Notes in Computer Science
2023-05-12Paper
Better security-efficiency trade-offs in permutation-based two-party computation
Lecture Notes in Computer Science
2023-05-12Paper
Multi-user BBB security of public permutations based MAC
Cryptography and Communications
2022-10-06Paper
The min-p robust optimization approach for facility location problem under uncertainty
Journal of Combinatorial Optimization
2022-08-19Paper
Systematic Security Analysis of Stream Encryption With Key Erasure
IEEE Transactions on Information Theory
2022-02-17Paper
How to build pseudorandom functions from public random permutations2020-05-20Paper
Short variable length domain extenders with beyond birthday bound security2018-12-20Paper


Research outcomes over time


This page was built for person: Yu Long Chen