Follow
Shan Chen
Shan Chen
Southern University of Science and Technology (SUSTech)
Verified email at sustech.edu.cn - Homepage
Title
Cited by
Cited by
Year
Tight security bounds for key-alternating ciphers
S Chen, J Steinberger
Annual International Conference on the Theory and Applications of …, 2014
2932014
Minimizing the two-round Even–Mansour cipher
S Chen, R Lampe, J Lee, Y Seurin, J Steinberger
Journal of Cryptology 31, 1064-1119, 2018
1272018
Provable security analysis of FIDO2
M Barbosa, A Boldyreva, S Chen, B Warinschi
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
402021
Secure communication channel establishment: TLS 1.3 (over TCP fast open) vs. QUIC
S Chen, S Jero, M Jagielski, A Boldyreva, C Nita-Rotaru
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
212019
Secure communication channel establishment: TLS 1.3 (over TCP fast open) versus QUIC
S Chen, S Jero, M Jagielski, A Boldyreva, C Nita-Rotaru
Journal of Cryptology 34 (3), 26, 2021
122021
Human computing for handling strong corruptions in authenticated key exchange
A Boldyreva, S Chen, PA Dupont, D Pointcheval
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 159-175, 2017
102017
Integrating Causality in Messaging Channels
S Chen, M Fischlin
Cryptology ePrint Archive, 2024
2024
Towards secure communication and authentication: provable security analysis and new constructions.
S Chen
Georgia Institute of Technology, Atlanta, GA, USA, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–8