Elephant v2 T Beyne, YL Chen, C Dobraunig, B Mennink NIST lightweight competition, 2021 | 46 | 2021 |
How to build pseudorandom functions from public random permutations YL Chen, E Lambooij, B Mennink Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 45 | 2019 |
Dumbo, jumbo, and delirium: Parallel authenticated encryption for the lightweight circus T Beyne, YL Chen, C Dobraunig, B Mennink IACR Transactions on Symmetric Cryptology 2020, 5-30, 2020 | 38 | 2020 |
Multi-user security of the elephant v2 authenticated encryption mode T Beyne, YL Chen, C Dobraunig, B Mennink International Conference on Selected Areas in Cryptography, 155-178, 2021 | 14 | 2021 |
Efficient length doubling from tweakable block ciphers YL Chen, A Luykx, BJM Mennink, B Preneel | 14 | 2017 |
Better security-efficiency trade-offs in permutation-based two-party computation YL Chen, S Tessaro Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 12 | 2021 |
Short variable length domain extenders with beyond birthday bound security YL Chen, B Mennink, M Nandi International Conference on the Theory and Application of Cryptology and …, 2018 | 11 | 2018 |
Categorization of faulty nonce misuse resistant message authentication YL Chen, B Mennink, B Preneel International Conference on the Theory and Application of Cryptology and …, 2021 | 9 | 2021 |
Key committing security of AEZ and more YL Chen, A Flórez-Gutiérrez, A Inoue, R Ito, T Iwata, K Minematsu, ... IACR Transactions on Symmetric Cryptology 2023 (4), 452-488, 2023 | 7 | 2023 |
Multi-user BBB security of public permutations based MAC YL Chen, A Dutta, M Nandi Cryptography and Communications 14 (5), 1145-1177, 2022 | 6 | 2022 |
Status update on elephant T Beyne, YL Chen, C Dobraunig, B Mennink Note at NIST Lightweight Cryptography, 2020 | 6 | 2020 |
A modular approach to the security analysis of two-permutation constructions YL Chen International Conference on the Theory and Application of Cryptology and …, 2022 | 5 | 2022 |
Provably secure reflection ciphers T Beyne, YL Chen Annual International Cryptology Conference, 234-263, 2022 | 4 | 2022 |
Proposal of Requirements for an Accordion Mode YL Chen, M Davidson, M Dworkin, J Kang, J Kelsey, Y Sasaki, MS Turan, ... Discussion Draft for the NIST Accordion Mode Workshop 2024, 2024 | 1 | 2024 |
Information-theoretic security with asymmetries T Beyne, YL Chen Annual International Cryptology Conference, 463-494, 2024 | | 2024 |
Updates on Elephant T Beyne, YL Chen, C Dobraunig, B Mennink, KU Leuven | | 2020 |