Foundations of garbled circuits M Bellare, VT Hoang, P Rogaway Proceedings of the 2012 ACM Conference on Computer and Communications …, 2012 | 707 | 2012 |
Efficient garbling from a fixed-key blockcipher M Bellare, VT Hoang, S Keelveedhi, P Rogaway IEEE Symposium of Security and Privacy, 478-492, 2013 | 434 | 2013 |
Robust Authenticated-Encryption: AEZ and the Problem that it Solves VT Hoang, T Krovetz, P Rogaway Advances in Cryptology-EUROCRYPT 2015, 15-44, 2015 | 247* | 2015 |
On generalized Feistel networks V Hoang, P Rogaway Advances in Cryptology–CRYPTO 2010, 613-630, 2010 | 176 | 2010 |
Adaptively secure garbling with applications to one-time programs and secure outsourcing M Bellare, VT Hoang, P Rogaway Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012 | 139 | 2012 |
Key-alternating Ciphers and Key-length Extension: Exact Bounds and Multi-user Security VT Hoang, S Tessaro Advances in Cryptology–CRYPTO 2016, 2016 | 127 | 2016 |
Instantiating Random Oracles via UCEs M Bellare, VT Hoang, S Keelveedhi Advances in Cryptology–CRYPTO 2013, 2013 | 124 | 2013 |
Information-theoretic Indistinguishability via the Chi-squared Method W Dai, VT Hoang, S Tessaro CRYPTO 2017, 2017 | 95 | 2017 |
An enciphering scheme based on a card shuffle VT Hoang, B Morris, P Rogaway Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012 | 86 | 2012 |
Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance VT Hoang, R Reyhanitabar, P Rogaway, D Vizár Advances in Cryptology-CRYPTO 2015, 2015 | 84 | 2015 |
Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model M Bellare, VT Hoang Advances in Cryptology-EUROCRYPT 2015, 2015, 627-656, 2015 | 84 | 2015 |
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds P Bose, VT Hoang, S Tessaro EUROCRYPT 2018, 2018 | 61 | 2018 |
Adaptive Witness Encryption and Asymmetric Password-based Cryptography. M Bellare, VT Hoang Public Key Cryptography (PKC 2015), 308-331, 2015 | 52 | 2015 |
The Multi-User Security of Double Encryption VT Hoang, S Tessaro Advances in Cryptology–EUROCRYPT 2017, 2017 | 45 | 2017 |
Automated Analysis and Synthesis of Authenticated Encryption Schemes VT Hoang, J Katz, AJ Malozemoff ACM CCS 2015, 2015 | 41 | 2015 |
The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization VT Hoang, S Tessaro, A Thiruvengadam CCS 2018, 1429-1440, 2018 | 38 | 2018 |
Message-recovery attacks on Feistel-based Format Preserving Encryption M Bellare, VT Hoang, S Tessaro ACM CCS 2016, 2016 | 37 | 2016 |
Efficient Schemes for Committing Authenticated Encryption M Bellare, VT Hoang EURORYPT 2022, 2022 | 34 | 2022 |
Cryptography from compression functions: The UCE bridge to the ROM M Bellare, VT Hoang, S Keelveedhi CRYPTO 2014, 169-187, 2014 | 21 | 2014 |
Selective-Opening Security in the Presence of Randomness Failures VT Hoang, J Katz, A O’Neill, M Zaheri Advances in Cryptology–Asiacrypt 2016, 2016 | 20 | 2016 |