Research

I am interested in cryptography, information security, privacy, and algorithms.  


Publications
  1. Wei Dai, Viet Tung Hoang, and Stefano Tessaro. Information-theoretic Indistinguishability via the Chi-Squared Method, to appear in CRYPTO 2017.
  2. Viet Tung Hoang and Stefano Tessaro. The multi-user security of Double Encryption, EUROCRYPT 2017, pages 381-411.
  3. Viet Tung Hoang, Jonathan Katz, Adam O'Neill, and Mohammad Zaheri. Selective-opening security in the presence of randomness failures,  ASIACRYPT 2016, pages 278-306. 
  4. Mihir Bellare, Viet Tung Hoang, and Stefano Tessaro. Message-recovery attacks on Feistel-based Format Preserving Encryption, ACM CCS 2016, pages 444-455. 
  5. Viet Tung Hoang and Stefano Tessaro. Key-alternating ciphers and key-length extension: Exact bounds and multi-user security, CRYPTO 2016, pages 3-32.  Invited to Journal of Cryptology
  6. Viet Tung Hoang, Jonathan Katz, and Alex MalozemoffAutomated analysis and synthesis of authenticated encryption schemes, ACM CCS 2015, pages 84-95. Best Paper Award.
  7. Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, and Damian Viz├írOnline authenticated-encryption and its nonce-reuse misuse-resistance, CRYPTO 2015, pages 493-517. 
  8. Mihir Bellare and Viet Tung Hoang. Resisting randomness subversion: Fast deterministic and hedged public-key encryption in the standard model, EUROCRYPT 2015, pages 627-656.  
  9. Viet Tung Hoang, Ted Krovetz,  and Phillip Rogaway. Robust authenticated-encryption: AEZ and the problem that it solves,  EUROCRYPT 2015, pages 15-44. Best Paper Honorable MentionAEZ homepage.
  10. Mihir Bellare and Viet Tung Hoang. Adaptive witness encryption and asymmetric password-based cryptography, PKC 2015, pages 308-331. 
  11. Mihir Bellare, Viet Tung Hoang, and Sriram Keelveedhi. Cryptography from compression functions: The UCE bridge to the ROM, CRYPTO 2014, pages 169-187.
  12. Mihir Bellare, Viet Tung Hoang, and Sriram Keelveedhi. Instantiating random oracles via UCEs, CRYPTO 2013, pages 398-415. Invited to Journal of Cryptology
  13. Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, and Phillip Rogaway. Efficient garbling from a fixed-key blockcipher, IEEE Security & Privacy 2013, pages 478-492.
  14. Mihir Bellare, Viet Tung Hoang, and Phillip Rogaway. Adaptively secure garbling with applications to one-time programs and secure outsourcing, ASIACRYPT 2012, pages 134-153.
  15. Mihir Bellare, Viet Tung Hoang, and Phillip Rogaway. Foundations of garbled circuits, ACM CCS 2012, pages 784-796.
  16. Viet Tung Hoang, Ben Morris, and Phillip Rogaway.  An enciphering scheme based on  a card shuffle,  CRYPTO 2012, pages 1-13.
  17. Viet Tung Hoang and Phillip Rogaway. On generalized Feistel networks,  CRYPTO 2010, pages 613-630.
  18. Viet Tung Hoang and Wing-Kin Sung.  Improved algorithms for maximum agreement and compatible supertrees, Algorithmica, volume 52, number 2, pages 195-214, 2011. A conference version, under the title "Fixed parameter polynomial time algorithms for maximum agreement and compatible supertrees", appeared in STACS 2008, pages 361-372.
Thesis
  1. Viet Tung Hoang. Foundations of  garbled circuits. UC Davis Ph.D. Thesis, June 2013. 
Specs
  1.  Viet Tung Hoang,  Ted Krovetz, and Phillip Rogaway. AEZ v5: Authenticated encryption by enciphering.  Manuscript, submitted to round 3 of the CAESAR competition, 2017. AEZ homepage.

         

Hoang's homepage