Viet Tung Hoang I am an associate professor in the Department of Computer Science at Florida State University , USA. My research area is cryptography. In 2013, I graduated from UC Davis, under Phillip Rogaway .
VIET TUNG HOANG Last update: November 14, 2022 Department of Computer Science Florida State University Tallahassee, FL 32306 Email: tvhoang@cs.fsu.eduPhone: 850-644-2051Website: http://www.cs.fsu.edu/~tvhoang/ CURRENT POSITION Publication [1] is selected for the Distinguished Paper Award at Usenix Security 2022. NSF CAREER Award, 2021.
Viet Tung Hoang. Proceedings of the 2012 ACM Conference on Computer and Communications …. Advances in Cryptology-ASIACRYPT 2012: 18th International Conference on the …. Advances in Cryptology-CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …. Adaptive Witness Encryption and Asymmetric Password-based Cryptography.
Viet Tung Hoang Professor in the Computer Science department at Florida State University 67% Would take again 4.5 Level of Difficulty Rate Professor Hoang I'm Professor Hoang Submit a Correction Professor Hoang 's Top Tags Tough grader Lecture heavy Participation matters Lots of homework Skip class? You won't pass.
About Experienced General Director with a demonstrated history of working in the computer software industry. Skilled in Negotiation, Business Planning, Management, Risk Management, and Business...
Viet Tung Hoang. Associate Professor . Office: 261 Love Building: Telephone: E-Mail: tvhoang [ at cs dot fsu dot edu ] Visit Personal Page ...
[c28] Viet Tung Hoang, Cong Wu, Xin Yuan: Faster Yet Safer: Logging System Via Fixed-Key Blockcipher. USENIX Security Symposium 2022: 2389-2406 [i29] Mihir Bellare, Viet Tung Hoang: Efficient Schemes for Committing Authenticated Encryption. IACR Cryptol. ePrint Arch. 2022: 268 ( 2022) [i28] Viet Tung Hoang, Cong Wu, Xin Yuan:
Viet Tung Hoang, Cong Wu, and Xin Yuan, Florida State University Distinguished Paper Award Winner Abstract: System logs are crucial for forensic analysis, but to be useful, they need to be tamper-proof. To protect the logs, a number of secure logging systems have been proposed from both academia and the industry.
Mihir Bellare Viet Tung Hoang This paper provides efficient authenticated-encryption (AE) schemes in which a ciphertext is a commitment to the key. These are extended, at minimal additional cost, to schemes where the ciphertext is a commitment to all encryption inputs, meaning key, nonce, associated data and message.
Mihir Bellare and Viet Tung Hoang Abstract This paper provides efficient authenticated-encryption (AE) schemes in which a ciphertext is a commitment to the key. These are extended, at minimal additional cost, to schemes where the ciphertext is a commitment to all encryption inputs, meaning key, nonce, associated data and message.
Viet Tung Hoang, Department of Computer Science, College of Arts and Sciences Hoang's project will investigate how to build practical and provably secure format-preserving encryption schemes, a tool widely used for encrypting credit-card numbers.
Paper 2012/265 Foundations of Garbled Circuits Mihir Bellare, Viet Tung Hoang, and Phillip Rogaway Abstract Garbled circuits, a classical idea rooted in the work of Andrew Yao, have long been understood as a cryptographic technique, not a cryptographic goal. Here we cull out a primitive corresponding to this technique. We call it a garbling scheme.
Viet Tung Hoang and Yaobin Shen Abstract. We analyze the multi-user security of the streaming encryption in Google's Tink library via an extended version of the framework of nonce-based online authenticated encryption of Hoang et al. (CRYPTO'15) to support random-access decryption. We show that Tink's design choice of using random nonces and a ...
Viet Tung Hoang and Yaobin Shen Abstract. We study the security of CTR-DRBG, one of NIST's recommended Pseudorandom Number Generator (PRNG) designs. Recently, Woodage and Shumow (Eurocrypt' 19), and then Cohney et al. (S&P' 20) point out some potential vulnerabilities in both NIST specification and common implementations of CTR-DRBG. While ...
Viet Tung Hoang & Yaobin Shen Conference paper First Online: 10 August 2020 2120 Accesses 2 Citations Part of the Lecture Notes in Computer Science book series (LNSC,volume 12170) Abstract We study the security of \mathsf {CTR\text {-}DRBG}, one of NIST's recommended Pseudorandom Number Generator (PRNG) designs.
View the profiles of professionals named "Viet Tung Hoang" on LinkedIn. There are 6 professionals named "Viet Tung Hoang", who use LinkedIn to exchange information, ideas, and opportunities.
Viet Tung Hoang, Cong Wu, Xin Yuan (Names in Alphabetical Order) USENIX Security 2022 (USENIX 2022) Best Paper Award Winner Boston, MA, USA. [paper, source code] Encrypted All-reduce on Multi-core Clusters Mohsen Gavahi, Abu Naser, Cong Wu, Mehran Sadeghi Lahijani, Zhi Wang, Xin Yuan
View the profiles of people named Viet Tung Hoang. Join Facebook to connect with Viet Tung Hoang and others you may know. Facebook gives people the power...
You’re currently reading viet tung hoang, an entry on trachnhiemonline.com