Research
I am interested in cryptography and algorithms.
Publications
- Viet Tung Hoang and Sanketh Menda. Robust AE with Committing Security, to appear in ASIACRYPT 2024.
- Mihir Bellare and Viet Tung Hoang. Succintly-Committing Authenticated Encryption, CRYPTO 2024, pages 305-339. .
- Viet Tung Hoang, Cong Wu, and Xin Yuan. Faster Yet Safer: Logging System Via Fixed-Key Blockcipher, Usenix Security 2022. Best
Paper Award.
- Mihir Bellare and Viet Tung Hoang. Efficient Schemes for Committing Authenticated Encryption, EUROCRYPT 2022, pages 845-875.
- Mehran Sadeghi Lahijani, Abu
Naser, Cong Wu, Mohsen
Gavahi, Viet Tung Hoang, Zhi Wang, and Xin Yuan. Efficient
Algorithms for Encrypted All-gather Operation, IEEE IPDPS
2021, pages 372-381.
- Viet
Tung Hoang and Yaobin Shen. Security of Streaming Encryption in Google's Tink Library, CCS 2020, pages 243-262.
- Viet
Tung Hoang and Yaobin Shen. Security Analysis of NIST CTR-DRBG, CRYPTO 2020, pages 218-247.
- Abu
Naser, Mohsen Gavahi, Cong Wu, Viet Tung Hoang, Zhi Wang, and Xin Yuan.
An Empirical Study of Cryptographic Libraries for MPI Communications,
IEEE Cluster 2019, pages 1-11.
- Viet
Tung Hoang, David Miller, and Ni Trieu. Attacks Only Get Better: How to Break FF3 on Large Domains, EUROCRYPT 2019, pages 85-116.
- Viet
Tung Hoang, Stefano Tessaro, and Aishwarya Thiruvengadam. The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization, CCS 2018, pages1429-1440.
- Viet
Tung Hoang, Stefano Tessaro, and Ni Trieu. The Curse of Small Domains: New Attacks on Format-Preserving Encryption, CRYPTO 2018, pages 221-251.
- Priyanka Bose, Viet
Tung Hoang, and Stefano Tessaro. Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds, EUROCRYTP 2018, pages 468-499.
- Mihir Bellare and Viet
Tung Hoang. Identity-based Format-Preserving Encryption, CCS 2017, pages 1515-1532.
- Wei Dai, Viet
Tung Hoang, and Stefano Tessaro. Information-theoretic Indistinguishability via the Chi-Squared Method, CRYPTO 2017, pages 497-523.
- Viet
Tung Hoang and Stefano Tessaro. The multi-user security of Double Encryption, EUROCRYPT 2017, pages 381-411.
- Viet
Tung Hoang, Jonathan Katz, Adam O'Neill, and Mohammad Zaheri.
Selective-opening security in the presence of randomness failures, ASIACRYPT 2016, pages 278-306.
- Mihir Bellare, Viet Tung Hoang, and Stefano
Tessaro. Message-recovery attacks on Feistel-based Format Preserving
Encryption, ACM CCS 2016, pages 444-455.
- Viet
Tung Hoang and Stefano Tessaro. Key-alternating
ciphers and key-length extension: Exact bounds and multi-user security, CRYPTO 2016, pages 3-32. Invited to Journal of Cryptology.
- Viet
Tung Hoang, Jonathan Katz, and Alex Malozemoff. Automated
analysis and synthesis of authenticated encryption schemes,
ACM CCS 2015, pages 84-95. Best
Paper Award.
- Viet
Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, and Damian Vizár. Online
authenticated-encryption and its nonce-reuse misuse-resistance, CRYPTO
2015, pages 493-517.
- Mihir
Bellare and Viet Tung Hoang. Resisting
randomness subversion: Fast deterministic and hedged public-key
encryption in the standard model, EUROCRYPT 2015, pages
627-656.
- Viet
Tung Hoang, Ted Krovetz,
and Phillip Rogaway. Robust
authenticated-encryption: AEZ and the problem that it solves,
EUROCRYPT 2015, pages 15-44. Best
Paper Honorable Mention. AEZ homepage.
- Mihir
Bellare and Viet Tung Hoang. Adaptive witness
encryption and asymmetric password-based cryptography, PKC
2015, pages 308-331.
- Mihir
Bellare, Viet Tung Hoang, and Sriram Keelveedhi. Cryptography from
compression functions: The UCE bridge to the ROM, CRYPTO
2014, pages 169-187.
- Mihir
Bellare, Viet Tung Hoang, and Sriram Keelveedhi. Instantiating
random oracles via UCEs, CRYPTO 2013, pages 398-415. Invited to Journal of Cryptology.
- Mihir
Bellare, Viet Tung Hoang, Sriram Keelveedhi, and Phillip Rogaway. Efficient
garbling from a fixed-key blockcipher, IEEE
Security & Privacy 2013, pages 478-492.
- Mihir
Bellare, Viet Tung Hoang, and Phillip Rogaway. Adaptively secure
garbling with applications to one-time programs and secure outsourcing,
ASIACRYPT 2012, pages 134-153.
- Mihir
Bellare, Viet Tung Hoang, and Phillip Rogaway. Foundations of
garbled circuits, ACM CCS 2012, pages 784-796.
- Viet
Tung Hoang, Ben Morris, and Phillip Rogaway. An enciphering
scheme based on a card shuffle, CRYPTO
2012, pages 1-13.
- Viet
Tung Hoang and Phillip Rogaway. On generalized
Feistel networks, CRYPTO 2010, pages 613-630.
- Viet
Tung Hoang and Wing-Kin Sung. Improved algorithms for
maximum agreement and compatible
supertrees,
Algorithmica, volume 52, number 2, pages 195-214, 2011. A conference
version, under the title "Fixed parameter
polynomial time algorithms
for maximum agreement and compatible supertrees", appeared in
STACS
2008, pages 361-372.
Thesis
- Viet
Tung Hoang. Foundations
of garbled circuits. UC Davis Ph.D. Thesis, June
2013.
Specs
- Viet
Tung Hoang, Ted Krovetz, and Phillip Rogaway. AEZ
v5: Authenticated encryption by enciphering. Manuscript,
submitted to round 3 of the CAESAR
competition, 2017. AEZ homepage.
Hoang's homepage