default search action
Yu Yu 0001
Person information
- affiliation: Shanghai Jiaotong University, Department of Computer Science and Engineering, China
- affiliation (former): Westone Cryptologic Research Center, Beijing, China
- affiliation (2012 - 2013): Tsinghua University, Institute for Interdisciplinary Information Sciences, Beijing, China
- affiliation (2010 - 2011): East China Normal University, Department of Computer Science and Technology, Shanghai, China
- affiliation (PhD 2006): Nanyang Technological University, School of Computer Engineering, Singapore
Other persons with the same name
- Yu Yu — disambiguation page
- Yu Yu 0002 — Nanjing University of Posts and Telecommunications, Jiangsu Key Laboratory of Wireless Communications, China
- Yu Yu 0003 — Idiap Research Institute, Martigny, Switzerland (and 1 more)
- Yu Yu 0004 — Steven Institute of Technology, NJ, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Carsten Baum, Jens Berlips, Walther Chen, Ivan Bjerre Damgård, Kevin M. Esvelt, Leonard Foner, Dana Gretton, Martin Kysel, Ronald L. Rivest, Lawrence Roy, Francesca Sage-Ling, Adi Shamir, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu:
Efficient Maliciously Secure Oblivious Exponentiations. IACR Commun. Cryptol. 1(3): 10 (2024) - [j26]Juelin Zhang, Taoyun Wang, Yiteng Sun, Fanjie Ji, Bohan Wang, Lu Li, Yu Yu, Weijia Wang:
Efficient Table-Based Masking with Pre-processing. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 273-301 (2024) - [c60]Zhenkai Hu, Kang Yang, Yu Yu:
Unconditionally Secure MPC for Boolean Circuits With Constant Online Communication. CSF 2024: 557-572 - [c59]Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu:
The Hardness of LPN over Any Integer Ring and Field for PCG Applications. EUROCRYPT (6) 2024: 149-179 - [c58]Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang, Yu Yu, Kaiyi Zhang:
sfReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head. Public Key Cryptography (1) 2024: 229-258 - [c57]Wenhao Zhang, Xiaojie Guo, Kang Yang, Ruiyu Zhu, Yu Yu, Xiao Wang:
Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage. SP 2024: 561-577 - [c56]Fengrun Liu, Xiang Xie, Yu Yu:
Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting. USENIX Security Symposium 2024 - [c55]Xiang Xie, Kang Yang, Xiao Wang, Yu Yu:
Lightweight Authentication of Web Data via Garble-Then-Prove. USENIX Security Symposium 2024 - [i51]Carsten Baum, Jens Berlips, Walther Chen, Hongrui Cui, Ivan Damgård, Jiangbin Dong, Kevin M. Esvelt, Mingyu Gao, Dana Gretton, Leonard Foner, Martin Kysel, Kaiyi Zhang, Juanru Li, Xiang Li, Omer Paneth, Ronald L. Rivest, Francesca Sage-Ling, Adi Shamir, Yue Shen, Meicen Sun, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Yun Wang, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu, Haoling Zhang:
A system capable of verifiably and privately screening global DNA synthesis. CoRR abs/2403.14023 (2024) - [i50]Zhenkai Hu, Kang Yang, Yu Yu:
Unconditionally secure MPC for Boolean circuits with constant online communication. IACR Cryptol. ePrint Arch. 2024: 15 (2024) - [i49]Hongrui Cui, Hanlin Liu, Di Yan, Kang Yang, Yu Yu, Kaiyi Zhang:
ReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head. IACR Cryptol. ePrint Arch. 2024: 40 (2024) - [i48]Chun Guo, Xiao Wang, Kang Yang, Yu Yu:
On Tweakable Correlation Robust Hashing against Key Leakages. IACR Cryptol. ePrint Arch. 2024: 163 (2024) - [i47]Chun Guo, Xiao Wang, Xiang Xie, Yu Yu:
The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets. IACR Cryptol. ePrint Arch. 2024: 275 (2024) - [i46]Qi Feng, Kang Yang, Kaiyi Zhang, Xiao Wang, Yu Yu, Xiang Xie, Debiao He:
Stateless Deterministic Multi-Party EdDSA Signatures with Low Communication. IACR Cryptol. ePrint Arch. 2024: 358 (2024) - [i45]Wenhao Zhang, Xiaojie Guo, Kang Yang, Ruiyu Zhu, Yu Yu, Xiao Wang:
Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage. IACR Cryptol. ePrint Arch. 2024: 426 (2024) - [i44]Hongrui Cui, Chun Guo, Xiao Wang, Chenkai Weng, Kang Yang, Yu Yu:
AES-based CCR Hash with High Security and Its Application to Zero-Knowledge Proofs. IACR Cryptol. ePrint Arch. 2024: 1271 (2024) - [i43]Carsten Baum, Jens Berlips, Walther Chen, Ivan Damgård, Kevin M. Esvelt, Leonard Foner, Dana Gretton, Martin Kysel, Ronald L. Rivest, Lawrence Roy, Francesca Sage-Ling, Adi Shamir, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu:
Efficient Maliciously Secure Oblivious Exponentiations. IACR Cryptol. ePrint Arch. 2024: 1613 (2024) - 2023
- [j25]Weijia Wang, Fanjie Ji, Juelin Zhang, Yu Yu:
Efficient Private Circuits with Precomputation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 286-309 (2023) - [j24]Chun Guo, Xiao Wang, Xiang Xie, Yu Yu:
The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets. ACM Trans. Priv. Secur. 26(3): 37:1-37:38 (2023) - [c54]Kaiyi Zhang, Qingju Wang, Yu Yu, Chun Guo, Hongrui Cui:
Algebraic Attacks on Round-Reduced Rain and Full AIM-III. ASIACRYPT (3) 2023: 285-310 - [c53]Kaiyi Zhang, Hongrui Cui, Yu Yu:
Revisiting the Constant-Sum Winternitz One-Time Signature with Applications to SPHINCS+ and XMSS. CRYPTO (5) 2023: 455-483 - [c52]Hongrui Cui, Xiao Wang, Kang Yang, Yu Yu:
Actively Secure Half-Gates with Minimum Overhead Under Duplex Networks. EUROCRYPT (2) 2023: 35-67 - [c51]Lijing Zhou, Ziyu Wang, Hongrui Cui, Qingrui Song, Yu Yu:
Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning. SP 2023: 534-551 - [c50]Liqing Yu, Yusai Wu, Yu Yu, Zhenfu Cao, Xiaolei Dong:
Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations. TCC (1) 2023: 238-267 - [c49]Xing Han, Yuheng Zhang, Xue Zhang, Zeyuan Chen, Mingzhe Wang, Yiwei Zhang, Siqi Ma, Yu Yu, Elisa Bertino, Juanru Li:
Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning. USENIX Security Symposium 2023: 4607-4624 - [i42]Hongrui Cui, Xiao Wang, Kang Yang, Yu Yu:
Actively Secure Half-Gates with Minimum Overhead under Duplex Networks. IACR Cryptol. ePrint Arch. 2023: 278 (2023) - [i41]Kaiyi Zhang, Hongrui Cui, Yu Yu:
Revisiting the Constant-sum Winternitz One-time Signature with Applications to SPHINCS+ and XMSS. IACR Cryptol. ePrint Arch. 2023: 850 (2023) - [i40]Xiang Xie, Kang Yang, Xiao Wang, Yu Yu:
Lightweight Authentication of Web Data via Garble-Then-Prove. IACR Cryptol. ePrint Arch. 2023: 964 (2023) - [i39]Liqing Yu, Yusai Wu, Yu Yu, Zhenfu Cao, Xiaolei Dong:
Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations. IACR Cryptol. ePrint Arch. 2023: 1355 (2023) - [i38]Kaiyi Zhang, Qingju Wang, Yu Yu, Chun Guo, Hongrui Cui:
Algebraic Attacks on Round-Reduced RAIN and Full AIM-III. IACR Cryptol. ePrint Arch. 2023: 1397 (2023) - [i37]Xiaojie Guo, Kang Yang, Xiao Wang, Yu Yu, Zheli Liu:
Unmodified Half-Gates is Adaptively Secure - So is Unmodified Three-Halves. IACR Cryptol. ePrint Arch. 2023: 1528 (2023) - [i36]Dung Bui, Haotian Chu, Geoffroy Couteau, Xiao Wang, Chenkai Weng, Kang Yang, Yu Yu:
An Efficient ZK Compiler from SIMD Circuits to General Circuits. IACR Cryptol. ePrint Arch. 2023: 1610 (2023) - 2022
- [j23]Di Yan, Hanlin Liu, Shuoyao Zhao, Yu Yu:
On the Hardness of Sparsely Learning Parity with Noise. Comput. J. 65(8): 1939-1947 (2022) - [j22]Weijia Wang, Chun Guo, Yu Yu, Fanjie Ji, Yang Su:
Side-Channel Masking with Common Shares. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 290-329 (2022) - [c48]Yuanyuan Zhou, Joop van de Pol, Yu Yu, François-Xavier Standaert:
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding. ASIACRYPT (4) 2022: 508-536 - [c47]Hanlin Liu, Yu Yu:
A Non-heuristic Approach to Time-Space Tradeoffs and Optimizations for BKW. ASIACRYPT (3) 2022: 741-770 - [c46]Li Yao, Yilei Chen, Yu Yu:
Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs. EUROCRYPT (1) 2022: 645-669 - [c45]Zhi Qiu, Kang Yang, Yu Yu, Lijing Zhou:
Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation. ICICS 2022: 69-88 - [c44]Yongqing Xu, Kaiyi Zhang, Yu Yu:
GRUZ: Practical Resource Fair Exchange Without Blockchain. ISC 2022: 214-228 - [i35]Lijing Zhou, Ziyu Wang, Hongrui Cui, Qingrui Song, Yu Yu:
Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning. CoRR abs/2210.01988 (2022) - [i34]Kaiyi Zhang, Hongrui Cui, Yu Yu:
SPHINCS-α: A Compact Stateless Hash-Based Signature Scheme. IACR Cryptol. ePrint Arch. 2022: 59 (2022) - [i33]Lijing Zhou, Ziyu Wang, Xiao Zhang, Yu Yu:
HEAD: an FHE-based Outsourced Computation Protocol with Compact Storage and Efficient Computation. IACR Cryptol. ePrint Arch. 2022: 238 (2022) - [i32]Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu:
The Hardness of LPN over Any Integer Ring and Field for PCG Applications. IACR Cryptol. ePrint Arch. 2022: 712 (2022) - [i31]Zhi Qiu, Kang Yang, Yu Yu, Lijing Zhou:
Maliciously Secure Multi-Party PSI with Lower Bandwidth and Faster Computation. IACR Cryptol. ePrint Arch. 2022: 772 (2022) - [i30]Yuanyuan Zhou, Joop van de Pol, Yu Yu, François-Xavier Standaert:
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding. IACR Cryptol. ePrint Arch. 2022: 1163 (2022) - 2021
- [j21]Davide Bellizia, Clément Hoffmann, Dina Kamel, Hanlin Liu, Pierrick Méaux, François-Xavier Standaert, Yu Yu:
Learning Parity with Physical Noise: Imperfections, Reductions and FPGA Prototype. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 390-417 (2021) - [j20]Di Yan, Yu Yu, Hanlin Liu, Shuoyao Zhao, Jiang Zhang:
An improved algorithm for learning sparse parities in the presence of noise. Theor. Comput. Sci. 873: 76-86 (2021) - [j19]Chun Guo, François-Xavier Standaert, Weijia Wang, Xiao Wang, Yu Yu:
Provable Security of SP Networks with Partial Non-Linear Layers. IACR Trans. Symmetric Cryptol. 2021(2): 353-388 (2021) - [c43]Hanlin Liu, Yu Yu, Shuoyao Zhao, Jiang Zhang, Wenling Liu, Zhenkai Hu:
Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact. CRYPTO (2) 2021: 365-394 - [c42]Yu Yu, Jiang Zhang:
Smoothing Out Binary Linear Codes and Worst-Case Sub-exponential Hardness for LPN. CRYPTO (3) 2021: 473-501 - [c41]Hongrui Cui, Kaiyi Zhang, Yu Chen, Zhen Liu, Yu Yu:
MPC-in-Multi-Heads: A Multi-Prover Zero-Knowledge Proof System - (or: How to Jointly Prove Any NP Statements in ZK). ESORICS (2) 2021: 332-351 - [e1]Yu Yu, Moti Yung:
Information Security and Cryptology - 17th International Conference, Inscrypt 2021, Virtual Event, August 12-14, 2021, Revised Selected Papers. Lecture Notes in Computer Science 13007, Springer 2021, ISBN 978-3-030-88322-5 [contents] - [i29]Hanlin Liu, Yu Yu:
A Non-heuristic Approach to Time-space Tradeoffs and Optimizations for BKW. IACR Cryptol. ePrint Arch. 2021: 1343 (2021) - [i28]Kaiyi Zhang, Hongrui Cui, Yu Yu:
Facial Template Protection via Lattice-based Fuzzy Extractors. IACR Cryptol. ePrint Arch. 2021: 1559 (2021) - [i27]Li Yao, Yilei Chen, Yu Yu:
Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs. IACR Cryptol. ePrint Arch. 2021: 1684 (2021) - 2020
- [j18]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [j17]Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang:
Improved lattice-based CCA2-secure PKE in the standard model. Sci. China Inf. Sci. 63(8): 1-22 (2020) - [c40]Weijia Wang, Chun Guo, François-Xavier Standaert, Yu Yu, Gaëtan Cassiers:
Packed Multiplication: How to Amortize the Cost of Side-Channel Masking? ASIACRYPT (1) 2020: 851-880 - [c39]Rui Wen, Yu Yu, Xiang Xie, Yang Zhang:
LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction. CCS 2020: 1219-1232 - [c38]Chun Guo, Jonathan Katz, Xiao Wang, Chenkai Weng, Yu Yu:
Better Concrete Security for Half-Gates Garbling (in the Multi-instance Setting). CRYPTO (2) 2020: 793-822 - [c37]Wenling Liu, Zhen Liu, Khoa Nguyen, Guomin Yang, Yu Yu:
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key. ESORICS (2) 2020: 357-377 - [c36]Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang:
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes. Public Key Cryptography (2) 2020: 37-65 - [c35]Chun Guo, Jonathan Katz, Xiao Wang, Yu Yu:
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers. SP 2020: 825-841 - [i26]Hanlin Liu, Yu Yu, Shuoyao Zhao, Jiang Zhang, Wenling Liu:
Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact. IACR Cryptol. ePrint Arch. 2020: 161 (2020) - [i25]Yu Yu, Jiang Zhang:
Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN. IACR Cryptol. ePrint Arch. 2020: 870 (2020) - [i24]Hongrui Cui, Yu Yu:
A Not-So-Trival Replay Attack Against DH-PSI. IACR Cryptol. ePrint Arch. 2020: 901 (2020) - [i23]Weijia Wang, Chun Guo, François-Xavier Standaert, Yu Yu, Gaëtan Cassiers:
Packed Multiplication: How to Amortize the Cost of Side-channel Masking ? IACR Cryptol. ePrint Arch. 2020: 1103 (2020) - [i22]Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang, Kang Yang:
Interactive Proofs for Quantum Black-Box Computations. IACR Cryptol. ePrint Arch. 2020: 1391 (2020)
2010 – 2019
- 2019
- [j16]Chenlong Yang, Xiangxue Li, Yu Yu, Ziping Wang:
Basing Diversified Services of Complex IIoT Applications on Scalable Block Graph Platform. IEEE Access 7: 22966-22975 (2019) - [j15]Hailun Yan, Xuejia Lai, Lei Wang, Yu Yu, Yiran Xing:
New zero-sum distinguishers on full 24-round Keccak-f using the division property. IET Inf. Secur. 13(5): 469-478 (2019) - [j14]Weijia Wang, Yu Yu, François-Xavier Standaert:
Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations. IEEE Trans. Inf. Forensics Secur. 14(11): 3069-3082 (2019) - [j13]Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu:
Efficient Side-Channel Secure Message Authentication with Better Bounds. IACR Trans. Symmetric Cryptol. 2019(4): 23-53 (2019) - [c34]Shifeng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, Joseph K. Liu:
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System. ACNS 2019: 486-506 - [c33]Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li:
Collision Resistant Hashing from Sub-exponential Learning Parity with Noise. ASIACRYPT (2) 2019: 3-24 - [c32]Shuoyao Zhao, Yu Yu, Jiang Zhang, Hanlin Liu:
Valiant's Universal Circuits Revisited: An Overall Improvement and a Lower Bound. ASIACRYPT (1) 2019: 401-425 - [i21]Chun Guo, Jonathan Katz, Xiao Wang, Yu Yu:
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers. IACR Cryptol. ePrint Arch. 2019: 74 (2019) - [i20]Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang:
Improved Lattice-based CCA2-Secure PKE in the Standard Model. IACR Cryptol. ePrint Arch. 2019: 149 (2019) - [i19]Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang:
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes. IACR Cryptol. ePrint Arch. 2019: 510 (2019) - [i18]Jiang Zhang, Yu Yu, Dengguo Feng, Shuqin Fan, Zhenfeng Zhang:
On the (Quantum) Random Oracle Methodology: New Separations and More. IACR Cryptol. ePrint Arch. 2019: 1101 (2019) - [i17]Chun Guo, Jonathan Katz, Xiao Wang, Chenkai Weng, Yu Yu:
Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting). IACR Cryptol. ePrint Arch. 2019: 1168 (2019) - [i16]Chun Guo, François-Xavier Standaert, Weijia Wang, Yu Yu:
Efficient Side-Channel Secure Message Authentication with Better Bounds. IACR Cryptol. ePrint Arch. 2019: 1424 (2019) - 2018
- [j12]Qi Wang, Xiangxue Li, Yu Yu:
Anonymity for Bitcoin From Secure Escrow Address. IEEE Access 6: 12336-12341 (2018) - [j11]Xiangxue Li, Yu Yu, Guannan Sun, Kefei Chen:
Connected Vehicles' Security from the Perspective of the In-Vehicle Network. IEEE Netw. 32(3): 58-63 (2018) - [j10]Weijia Wang, Yu Yu, François-Xavier Standaert, Junrong Liu, Zheng Guo, Dawu Gu:
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips. IEEE Trans. Inf. Forensics Secur. 13(5): 1301-1316 (2018) - [c31]Cencen Wan, Shuyang Tang, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu:
Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol. Inscrypt 2018: 49-69 - [c30]Shuoyao Zhao, Yu Yu, Jiang Zhang:
On the Hardness of Learning Parity with Noise over Rings. ProvSec 2018: 94-108 - [c29]Changyu Li, Quanpu Cai, Juanru Li, Hui Liu, Yuanyuan Zhang, Dawu Gu, Yu Yu:
Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning. WISEC 2018: 1-11 - [i15]Cencen Wan, Yuncong Zhang, Chen Pan, Zhiqiang Liu, Yu Long, Zhen Liu, Yu Yu, Shuyang Tang:
Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol. IACR Cryptol. ePrint Arch. 2018: 407 (2018) - [i14]Shuoyao Zhao, Yu Yu, Jiang Zhang, Hanlin Liu:
Valiant's Universal Circuits Revisited: an Overall Improvement and a Lower Bound. IACR Cryptol. ePrint Arch. 2018: 943 (2018) - 2017
- [j9]Gang Han, Yu Yu, Xiangxue Li, Kefei Chen, Hui Li:
Characterizing the semantics of passwords: The role of Pinyin for Chinese Netizens. Comput. Stand. Interfaces 54: 20-28 (2017) - [j8]Shifeng Sun, Dawu Gu, Udaya Parampalli, Yu Yu, Baodong Qin:
Public key encryption resilient to leakage and tampering attacks. J. Comput. Syst. Sci. 89: 142-156 (2017) - [j7]Gang Han, Yu Yu, Xiangxue Li, Qifeng Zhou, Dong Zheng, Hui Li:
1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity. Secur. Commun. Networks 2017: 6268230:1-6268230:9 (2017) - [j6]Kim-Kwang Raymond Choo, Yunsi Fei, Yang Xiang, Yu Yu:
Embedded Device Forensics and Security. ACM Trans. Embed. Comput. Syst. 16(2): 50:1-50:5 (2017) - [c28]Jiang Zhang, Yu Yu:
Two-Round PAKE from Approximate SPH and Instantiations from Lattices. ASIACRYPT (3) 2017: 37-67 - [c27]Sihang Pu, Yu Yu, Weijia Wang, Zheng Guo, Junrong Liu, Dawu Gu, Lingyun Wang, Jie Gan:
Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA? CARDIS 2017: 232-247 - [c26]Weijia Wang, Yu Yu, François-Xavier Standaert, Dawu Gu, Sen Xu, Chi Zhang:
Ridge-Based Profiled Differential Power Analysis. CT-RSA 2017: 347-362 - [c25]Limin Yang, Xiangxue Li, Yu Yu:
VulDigger: A Just-in-Time and Cost-Aware Tool for Digging Vulnerability-Contributing Changes. GLOBECOM 2017: 1-7 - [c24]Hanlin Liu, Di Yan, Yu Yu, Shuoyao Zhao:
On the Hardness of Sparsely Learning Parity with Noise. ProvSec 2017: 261-267 - [i13]Jiang Zhang, Yu Yu:
Two-Round PAKE from Approximate SPH and Instantiations from Lattices. IACR Cryptol. ePrint Arch. 2017: 838 (2017) - [i12]Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li:
Collision Resistant Hashing from Learning Parity with Noise. IACR Cryptol. ePrint Arch. 2017: 1260 (2017) - 2016
- [j5]Shifeng Sun, Joseph K. Liu, Yu Yu, Baodong Qin, Dawu Gu:
RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions. Comput. J. 59(11): 1637-1658 (2016) - [c23]Shifeng Sun, Udaya Parampalli, Tsz Hon Yuen, Yu Yu, Dawu Gu:
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions. ACISP (2) 2016: 134-150 - [c22]Yujuan Sun, Yu Yu, Xiangxue Li, Kai Zhang, Haifeng Qian, Yuan Zhou:
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations. ACISP (1) 2016: 293-309 - [c21]Weijia Wang, François-Xavier Standaert, Yu Yu, Sihang Pu, Junrong Liu, Zheng Guo, Dawu Gu:
Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages. CARDIS 2016: 174-191 - [c20]Yu Yu, Jiang Zhang:
Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN. CRYPTO (1) 2016: 214-243 - [c19]Yu Yu, John P. Steinberger:
Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN. EUROCRYPT (2) 2016: 154-183 - [c18]Nan Yao, Yu Yu, Xiangxue Li, Dawu Gu:
On the Robustness of Learning Parity with Noise. ICICS 2016: 99-106 - [i11]Yu Yu, John P. Steinberger:
Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN. IACR Cryptol. ePrint Arch. 2016: 151 (2016) - [i10]Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu:
Evaluation and Improvement of Generic-Emulating DPA Attacks. IACR Cryptol. ePrint Arch. 2016: 294 (2016) - [i9]Yu Yu, Jiang Zhang:
Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN. IACR Cryptol. ePrint Arch. 2016: 514 (2016) - 2015
- [j4]Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou:
Signcryption KEM/tag-KEM, revisited. Secur. Commun. Networks 8(17): 3067-3082 (2015) - [j3]Yu Yu, Xiangxue Li, Jian Weng:
Pseudorandom generators from regular one-way functions: New constructions with improved parameters. Theor. Comput. Sci. 569: 58-69 (2015) - [c17]Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu:
Evaluation and Improvement of Generic-Emulating DPA Attacks. CHES 2015: 416-432 - [c16]Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng:
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond. CRYPTO (2) 2015: 209-229 - [c15]Junrong Liu, Yu Yu, François-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Xinjun Xie:
Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards. ESORICS (1) 2015: 468-480 - [c14]Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng:
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions. TCC (1) 2015: 7-35 - 2014
- [j2]Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Ziping Wang:
Robust password changing and DoS resilience for human-centric password authentication. Secur. Commun. Networks 7(10): 1552-1559 (2014) - [c13]Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng:
POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords. CCS 2014: 1457-1459 - [c12]Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng:
POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results. CCS 2014: 1460-1462 - [i8]Yu Yu, Dawu Gu, Xiangxue Li:
The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions. Electron. Colloquium Comput. Complex. TR14 (2014) - [i7]Yu Yu, Dawu Gu, Xiangxue Li:
The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions. IACR Cryptol. ePrint Arch. 2014: 392 (2014) - [i6]Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng:
(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions. IACR Cryptol. ePrint Arch. 2014: 393 (2014) - 2013
- [j1]Xiangxue Li, Haifeng Qian, Jian Weng, Yu Yu:
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Math. Comput. Model. 57(3-4): 503-511 (2013) - [c11]Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng:
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles. ACNS 2013: 186-201 - [c10]Yu Yu, Xiangxue Li, Jian Weng:
Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters. ASIACRYPT (2) 2013: 261-279 - [c9]François-Xavier Standaert, Olivier Pereira, Yu Yu:
Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions. CRYPTO (1) 2013: 335-352 - [c8]Yu Yu, François-Xavier Standaert:
Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness. CT-RSA 2013: 223-238 - [c7]Yuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater:
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards. Financial Cryptography 2013: 230-238 - [c6]Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou:
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model. ICICS 2013: 167-184 - [c5]Yevgeniy Dodis, Yu Yu:
Overcoming Weak Expectations. TCC 2013: 1-22 - [i5]Yuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater:
On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards. IACR Cryptol. ePrint Arch. 2013: 224 (2013) - [i4]Yu Yu:
Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters. IACR Cryptol. ePrint Arch. 2013: 270 (2013) - [i3]François-Xavier Standaert, Olivier Pereira, Yu Yu:
Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions. IACR Cryptol. ePrint Arch. 2013: 370 (2013) - 2012
- [c4]Yevgeniy Dodis, Yu Yu:
Overcoming weak expectations. ITW 2012: 109-113 - [c3]Yu Yu, Xiangxue Li, Haifeng Qian:
Two-source extractors for leaky sources. ITW 2012: 452-456 - 2011
- [c2]Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu:
Leftover Hash Lemma, Revisited. CRYPTO 2011: 1-20 - [i2]Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu:
Leftover Hash Lemma, Revisited. IACR Cryptol. ePrint Arch. 2011: 88 (2011) - 2010
- [c1]Yu Yu, François-Xavier Standaert, Olivier Pereira, Moti Yung:
Practical leakage-resilient pseudorandom generators. CCS 2010: 141-151 - [p1]François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald:
Leakage Resilient Cryptography in Practice. Towards Hardware-Intrinsic Security 2010: 99-134
2000 – 2009
- 2009
- [i1]François-Xavier Standaert, Olivier Pereira, Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald:
Leakage Resilient Cryptography in Practice. IACR Cryptol. ePrint Arch. 2009: 341 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint