Tight security bounds for key-alternating ciphers S Chen, J Steinberger Annual International Conference on the Theory and Applications of …, 2014 | 295 | 2014 |
Minimizing the two-round Even–Mansour cipher S Chen, R Lampe, J Lee, Y Seurin, J Steinberger Journal of Cryptology 31, 1064-1119, 2018 | 129 | 2018 |
Provable security analysis of FIDO2 M Barbosa, A Boldyreva, S Chen, B Warinschi Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021 | 44 | 2021 |
Secure communication channel establishment: TLS 1.3 (over TCP fast open) vs. QUIC S Chen, S Jero, M Jagielski, A Boldyreva, C Nita-Rotaru Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 22 | 2019 |
Secure communication channel establishment: TLS 1.3 (over TCP fast open) versus QUIC S Chen, S Jero, M Jagielski, A Boldyreva, C Nita-Rotaru Journal of Cryptology 34 (3), 26, 2021 | 12 | 2021 |
Human computing for handling strong corruptions in authenticated key exchange A Boldyreva, S Chen, PA Dupont, D Pointcheval 2017 IEEE 30th Computer Security Foundations Symposium (CSF), 159-175, 2017 | 10 | 2017 |
Integrating causality in messaging channels S Chen, M Fischlin Annual International Conference on the Theory and Applications of …, 2024 | | 2024 |
Towards secure communication and authentication: provable security analysis and new constructions. S Chen Georgia Institute of Technology, Atlanta, GA, USA, 2020 | | 2020 |