I am interested in cryptography, information security, privacy, and algorithms.  

  1. Viet Tung Hoang,  Stefano Tessaro, and Ni Trieu. The Curse of Small Domains: New Attacks on Format-Preserving Encryption, to appear in CRYPTO 2018.
  2. Priyanka Bose, Viet Tung Hoang,  and Stefano Tessaro. Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds, EUROCRYTP 2018, pages 468-499.
  3. Mihir Bellare and Viet Tung Hoang. Identity-based Format-Preserving Encryption, CCS 2017, pages 1515-1532.
  4. Wei Dai, Viet Tung Hoang, and Stefano Tessaro. Information-theoretic Indistinguishability via the Chi-Squared Method, CRYPTO 2017, pages 497-523
  5. Viet Tung Hoang and Stefano Tessaro. The multi-user security of Double Encryption, EUROCRYPT 2017, pages 381-411.
  6. Viet Tung Hoang, Jonathan Katz, Adam O'Neill, and Mohammad Zaheri. Selective-opening security in the presence of randomness failures,  ASIACRYPT 2016, pages 278-306. 
  7. Mihir Bellare, Viet Tung Hoang, and Stefano Tessaro. Message-recovery attacks on Feistel-based Format Preserving Encryption, ACM CCS 2016, pages 444-455. 
  8. Viet Tung Hoang and Stefano Tessaro. Key-alternating ciphers and key-length extension: Exact bounds and multi-user security, CRYPTO 2016, pages 3-32.  Invited to Journal of Cryptology
  9. Viet Tung Hoang, Jonathan Katz, and Alex MalozemoffAutomated analysis and synthesis of authenticated encryption schemes, ACM CCS 2015, pages 84-95. Best Paper Award.
  10. Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, and Damian Viz├írOnline authenticated-encryption and its nonce-reuse misuse-resistance, CRYPTO 2015, pages 493-517. 
  11. Mihir Bellare and Viet Tung Hoang. Resisting randomness subversion: Fast deterministic and hedged public-key encryption in the standard model, EUROCRYPT 2015, pages 627-656.  
  12. Viet Tung Hoang, Ted Krovetz,  and Phillip Rogaway. Robust authenticated-encryption: AEZ and the problem that it solves,  EUROCRYPT 2015, pages 15-44. Best Paper Honorable MentionAEZ homepage.
  13. Mihir Bellare and Viet Tung Hoang. Adaptive witness encryption and asymmetric password-based cryptography, PKC 2015, pages 308-331. 
  14. Mihir Bellare, Viet Tung Hoang, and Sriram Keelveedhi. Cryptography from compression functions: The UCE bridge to the ROM, CRYPTO 2014, pages 169-187.
  15. Mihir Bellare, Viet Tung Hoang, and Sriram Keelveedhi. Instantiating random oracles via UCEs, CRYPTO 2013, pages 398-415. Invited to Journal of Cryptology
  16. Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, and Phillip Rogaway. Efficient garbling from a fixed-key blockcipher, IEEE Security & Privacy 2013, pages 478-492.
  17. Mihir Bellare, Viet Tung Hoang, and Phillip Rogaway. Adaptively secure garbling with applications to one-time programs and secure outsourcing, ASIACRYPT 2012, pages 134-153.
  18. Mihir Bellare, Viet Tung Hoang, and Phillip Rogaway. Foundations of garbled circuits, ACM CCS 2012, pages 784-796.
  19. Viet Tung Hoang, Ben Morris, and Phillip Rogaway.  An enciphering scheme based on  a card shuffle,  CRYPTO 2012, pages 1-13.
  20. Viet Tung Hoang and Phillip Rogaway. On generalized Feistel networks,  CRYPTO 2010, pages 613-630.
  21. Viet Tung Hoang and Wing-Kin Sung.  Improved algorithms for maximum agreement and compatible supertrees, Algorithmica, volume 52, number 2, pages 195-214, 2011. A conference version, under the title "Fixed parameter polynomial time algorithms for maximum agreement and compatible supertrees", appeared in STACS 2008, pages 361-372.
  1. Viet Tung Hoang. Foundations of  garbled circuits. UC Davis Ph.D. Thesis, June 2013. 
  1.  Viet Tung Hoang,  Ted Krovetz, and Phillip Rogaway. AEZ v5: Authenticated encryption by enciphering.  Manuscript, submitted to round 3 of the CAESAR competition, 2017. AEZ homepage.


Hoang's homepage