I am interested in cryptography and algorithms.  

  1. Viet Tung Hoang, Cong Wu, and Xin Yuan. Faster Yet Safer: Logging System Via Fixed-Key Blockcipher, Usenix Security 2022, pages 2389-2406. Distinguished Paper Award
  2. Mihir Bellare and Viet Tung Hoang. Efficient Schemes for Committing Authenticated Encryption, EUROCRYPT 2022, pages 845-875. 
  3. Mehran Sadeghi Lahijani, Abu Naser, Cong Wu, Mohsen Gavahi, Viet Tung Hoang, Zhi Wang, and Xin Yuan. Efficient Algorithms for Encrypted All-gather Operation, IEEE IPDPS 2021, pages 372-381. 
  4. Viet Tung Hoang and Yaobin Shen. Security of Streaming Encryption in Google's Tink Library, CCS 2020, pages 243-262. 
  5. Viet Tung Hoang and Yaobin Shen. Security Analysis of NIST CTR-DRBG, CRYPTO 2020, pages 218-247. 
  6. Abu Naser, Mohsen Gavahi, Cong Wu, Viet Tung Hoang, Zhi Wang, and Xin Yuan. An Empirical Study of Cryptographic Libraries for MPI Communications, IEEE Cluster 2019, pages 1-11. 
  7. Viet Tung Hoang, David Miller, and Ni Trieu. Attacks Only Get Better: How to Break FF3 on Large Domains, EUROCRYPT 2019, pages  85-116.
  8. Viet Tung Hoang, Stefano Tessaro, and Aishwarya Thiruvengadam. The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization, CCS 2018, pages1429-1440.
  9. Viet Tung Hoang,  Stefano Tessaro, and Ni Trieu. The Curse of Small Domains: New Attacks on Format-Preserving Encryption, CRYPTO 2018, pages 221-251. 
  10. Priyanka Bose, Viet Tung Hoang,  and Stefano Tessaro. Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds, EUROCRYTP 2018, pages 468-499.
  11. Mihir Bellare and Viet Tung Hoang. Identity-based Format-Preserving Encryption, CCS 2017, pages 1515-1532.
  12. Wei Dai, Viet Tung Hoang, and Stefano Tessaro. Information-theoretic Indistinguishability via the Chi-Squared Method, CRYPTO 2017, pages 497-523
  13. Viet Tung Hoang and Stefano Tessaro. The multi-user security of Double Encryption, EUROCRYPT 2017, pages 381-411.
  14. Viet Tung Hoang, Jonathan Katz, Adam O'Neill, and Mohammad Zaheri. Selective-opening security in the presence of randomness failures,  ASIACRYPT 2016, pages 278-306. 
  15. Mihir Bellare, Viet Tung Hoang, and Stefano Tessaro. Message-recovery attacks on Feistel-based Format Preserving Encryption, ACM CCS 2016, pages 444-455. 
  16. Viet Tung Hoang and Stefano Tessaro. Key-alternating ciphers and key-length extension: Exact bounds and multi-user security, CRYPTO 2016, pages 3-32.  Invited to Journal of Cryptology
  17. Viet Tung Hoang, Jonathan Katz, and Alex MalozemoffAutomated analysis and synthesis of authenticated encryption schemes, ACM CCS 2015, pages 84-95. Best Paper Award.
  18. Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, and Damian Viz├írOnline authenticated-encryption and its nonce-reuse misuse-resistance, CRYPTO 2015, pages 493-517. 
  19. Mihir Bellare and Viet Tung Hoang. Resisting randomness subversion: Fast deterministic and hedged public-key encryption in the standard model, EUROCRYPT 2015, pages 627-656.  
  20. Viet Tung Hoang, Ted Krovetz,  and Phillip Rogaway. Robust authenticated-encryption: AEZ and the problem that it solves,  EUROCRYPT 2015, pages 15-44. Best Paper Honorable MentionAEZ homepage.
  21. Mihir Bellare and Viet Tung Hoang. Adaptive witness encryption and asymmetric password-based cryptography, PKC 2015, pages 308-331. 
  22. Mihir Bellare, Viet Tung Hoang, and Sriram Keelveedhi. Cryptography from compression functions: The UCE bridge to the ROM, CRYPTO 2014, pages 169-187.
  23. Mihir Bellare, Viet Tung Hoang, and Sriram Keelveedhi. Instantiating random oracles via UCEs, CRYPTO 2013, pages 398-415. Invited to Journal of Cryptology
  24. Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, and Phillip Rogaway. Efficient garbling from a fixed-key blockcipher, IEEE Security & Privacy 2013, pages 478-492.
  25. Mihir Bellare, Viet Tung Hoang, and Phillip Rogaway. Adaptively secure garbling with applications to one-time programs and secure outsourcing, ASIACRYPT 2012, pages 134-153.
  26. Mihir Bellare, Viet Tung Hoang, and Phillip Rogaway. Foundations of garbled circuits, ACM CCS 2012, pages 784-796.
  27. Viet Tung Hoang, Ben Morris, and Phillip Rogaway.  An enciphering scheme based on  a card shuffle,  CRYPTO 2012, pages 1-13.
  28. Viet Tung Hoang and Phillip Rogaway. On generalized Feistel networks,  CRYPTO 2010, pages 613-630.
  29. Viet Tung Hoang and Wing-Kin Sung.  Improved algorithms for maximum agreement and compatible supertrees, Algorithmica, volume 52, number 2, pages 195-214, 2011. A conference version, under the title "Fixed parameter polynomial time algorithms for maximum agreement and compatible supertrees", appeared in STACS 2008, pages 361-372.
  1. Viet Tung Hoang. Foundations of  garbled circuits. UC Davis Ph.D. Thesis, June 2013. 
  1.  Viet Tung Hoang,  Ted Krovetz, and Phillip Rogaway. AEZ v5: Authenticated encryption by enciphering.  Manuscript, submitted to round 3 of the CAESAR competition, 2017. AEZ homepage.


Hoang's homepage