Research

I am interested in cryptography and algorithms.  


Publications
  1. Viet Tung Hoang and Sanketh Menda. Robust AE with Committing Security, to appear in ASIACRYPT 2024.
  2. Mihir Bellare and Viet Tung Hoang. Succintly-Committing Authenticated Encryption, CRYPTO 2024, pages 305-339. .
  3. Viet Tung Hoang, Cong Wu, and Xin Yuan. Faster Yet Safer: Logging System Via Fixed-Key Blockcipher, Usenix Security 2022. Best Paper Award.
  4. Mihir Bellare and Viet Tung Hoang. Efficient Schemes for Committing Authenticated Encryption, EUROCRYPT 2022, pages 845-875. 
  5. Mehran Sadeghi Lahijani, Abu Naser, Cong Wu, Mohsen Gavahi, Viet Tung Hoang, Zhi Wang, and Xin Yuan. Efficient Algorithms for Encrypted All-gather Operation, IEEE IPDPS 2021, pages 372-381. 
  6. Viet Tung Hoang and Yaobin Shen. Security of Streaming Encryption in Google's Tink Library, CCS 2020, pages 243-262. 
  7. Viet Tung Hoang and Yaobin Shen. Security Analysis of NIST CTR-DRBG, CRYPTO 2020, pages 218-247. 
  8. Abu Naser, Mohsen Gavahi, Cong Wu, Viet Tung Hoang, Zhi Wang, and Xin Yuan. An Empirical Study of Cryptographic Libraries for MPI Communications, IEEE Cluster 2019, pages 1-11. 
  9. Viet Tung Hoang, David Miller, and Ni Trieu. Attacks Only Get Better: How to Break FF3 on Large Domains, EUROCRYPT 2019, pages  85-116.
  10. Viet Tung Hoang, Stefano Tessaro, and Aishwarya Thiruvengadam. The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization, CCS 2018, pages1429-1440.
  11. Viet Tung Hoang,  Stefano Tessaro, and Ni Trieu. The Curse of Small Domains: New Attacks on Format-Preserving Encryption, CRYPTO 2018, pages 221-251. 
  12. Priyanka Bose, Viet Tung Hoang,  and Stefano Tessaro. Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds, EUROCRYTP 2018, pages 468-499.
  13. Mihir Bellare and Viet Tung Hoang. Identity-based Format-Preserving Encryption, CCS 2017, pages 1515-1532.
  14. Wei Dai, Viet Tung Hoang, and Stefano Tessaro. Information-theoretic Indistinguishability via the Chi-Squared Method, CRYPTO 2017, pages 497-523
  15. Viet Tung Hoang and Stefano Tessaro. The multi-user security of Double Encryption, EUROCRYPT 2017, pages 381-411.
  16. Viet Tung Hoang, Jonathan Katz, Adam O'Neill, and Mohammad Zaheri. Selective-opening security in the presence of randomness failures,  ASIACRYPT 2016, pages 278-306. 
  17. Mihir Bellare, Viet Tung Hoang, and Stefano Tessaro. Message-recovery attacks on Feistel-based Format Preserving Encryption, ACM CCS 2016, pages 444-455. 
  18. Viet Tung Hoang and Stefano Tessaro. Key-alternating ciphers and key-length extension: Exact bounds and multi-user security, CRYPTO 2016, pages 3-32.  Invited to Journal of Cryptology
  19. Viet Tung Hoang, Jonathan Katz, and Alex MalozemoffAutomated analysis and synthesis of authenticated encryption schemes, ACM CCS 2015, pages 84-95. Best Paper Award.
  20. Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, and Damian VizárOnline authenticated-encryption and its nonce-reuse misuse-resistance, CRYPTO 2015, pages 493-517. 
  21. Mihir Bellare and Viet Tung Hoang. Resisting randomness subversion: Fast deterministic and hedged public-key encryption in the standard model, EUROCRYPT 2015, pages 627-656.  
  22. Viet Tung Hoang, Ted Krovetz,  and Phillip Rogaway. Robust authenticated-encryption: AEZ and the problem that it solves,  EUROCRYPT 2015, pages 15-44. Best Paper Honorable MentionAEZ homepage.
  23. Mihir Bellare and Viet Tung Hoang. Adaptive witness encryption and asymmetric password-based cryptography, PKC 2015, pages 308-331. 
  24. Mihir Bellare, Viet Tung Hoang, and Sriram Keelveedhi. Cryptography from compression functions: The UCE bridge to the ROM, CRYPTO 2014, pages 169-187.
  25. Mihir Bellare, Viet Tung Hoang, and Sriram Keelveedhi. Instantiating random oracles via UCEs, CRYPTO 2013, pages 398-415. Invited to Journal of Cryptology
  26. Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, and Phillip Rogaway. Efficient garbling from a fixed-key blockcipher, IEEE Security & Privacy 2013, pages 478-492.
  27. Mihir Bellare, Viet Tung Hoang, and Phillip Rogaway. Adaptively secure garbling with applications to one-time programs and secure outsourcing, ASIACRYPT 2012, pages 134-153.
  28. Mihir Bellare, Viet Tung Hoang, and Phillip Rogaway. Foundations of garbled circuits, ACM CCS 2012, pages 784-796.
  29. Viet Tung Hoang, Ben Morris, and Phillip Rogaway.  An enciphering scheme based on  a card shuffle,  CRYPTO 2012, pages 1-13.
  30. Viet Tung Hoang and Phillip Rogaway. On generalized Feistel networks,  CRYPTO 2010, pages 613-630.
  31. Viet Tung Hoang and Wing-Kin Sung.  Improved algorithms for maximum agreement and compatible supertrees, Algorithmica, volume 52, number 2, pages 195-214, 2011. A conference version, under the title "Fixed parameter polynomial time algorithms for maximum agreement and compatible supertrees", appeared in STACS 2008, pages 361-372.
Thesis
  1. Viet Tung Hoang. Foundations of  garbled circuits. UC Davis Ph.D. Thesis, June 2013. 
Specs
  1.  Viet Tung Hoang,  Ted Krovetz, and Phillip Rogaway. AEZ v5: Authenticated encryption by enciphering.  Manuscript, submitted to round 3 of the CAESAR competition, 2017. AEZ homepage.

         

Hoang's homepage