Folgen
Yu Long Chen
Yu Long Chen
COSIC-ESAT, KU Leuven
Bestätigte E-Mail-Adresse bei kuleuven.be
Titel
Zitiert von
Zitiert von
Jahr
How to build pseudorandom functions from public random permutations
YL Chen, E Lambooij, B Mennink
Annual International Cryptology Conference, 266-293, 2019
272019
Elephant v1
T Beyne, Y Chen, C Dobraunig, B Mennink
NIST Lightweight Cryptography Project. https://www. esat. kuleuven. be/cosic …, 2019
172019
Dumbo, jumbo, and delirium: Parallel authenticated encryption for the lightweight circus
T Beyne, YL Chen, C Dobraunig, B Mennink
IACR Transactions on Symmetric Cryptology 2020, 5-30, 2020
122020
Efficient length doubling from tweakable block ciphers
YL Chen, A Luykx, BJM Mennink, B Preneel
112017
Better Security-Efficiency Trade-Offs in Permutation-Based Two-Party Computation
YL Chen, S Tessaro
International Conference on the Theory and Application of Cryptology and …, 2021
72021
Short variable length domain extenders with beyond birthday bound security
YL Chen, B Mennink, M Nandi
International Conference on the Theory and Application of Cryptology and …, 2018
72018
Status update on Elephant
T Beyne, YL Chen, C Dobraunig, B Mennink
Note at NIST Lightweight Cryptography, 2020
32020
Categorization of Faulty Nonce Misuse Resistant Message Authentication
YL Chen, B Mennink, B Preneel
International Conference on the Theory and Application of Cryptology and …, 2021
22021
Multi-user BBB security of public permutations based MAC
YL Chen, A Dutta, M Nandi
Cryptography and Communications, 1-33, 2022
12022
Multi-user Security of the Elephant v2 Authenticated Encryption Mode
T Beyne, YL Chen, C Dobraunig, B Mennink
International Conference on Selected Areas in Cryptography, 155-178, 2022
12022
Provably Secure Reflection Ciphers
T Beyne, YL Chen
Annual International Cryptology Conference, 234-263, 2022
2022
Updates on Elephant
T Beyne, YL Chen, C Dobraunig, B Mennink, KU Leuven
2020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–12