Theo dõi
Yu Yu
Yu Yu
Professor, Shanghai Jiao Tong University
Email được xác minh tại tsinghua.edu.cn - Trang chủ
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Leftover hash lemma, revisited
B Barak, Y Dodis, H Krawczyk, O Pereira, K Pietrzak, FX Standaert, Y Yu
Annual Cryptology Conference, 1-20, 2011
1792011
Leakage resilient cryptography in practice
FX Standaert, O Pereira, Y Yu, JJ Quisquater, M Yung, E Oswald
Towards Hardware-Intrinsic Security: Foundations and Practice, 99-134, 2010
1532010
Practical leakage-resilient pseudorandom generators
Y Yu, FX Standaert, O Pereira, M Yung
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1322010
Overcoming weak expectations
Y Dodis, Y Yu
Theory of Cryptography Conference, 1-22, 2013
1022013
Experimental authentication of quantum key distribution with post-quantum cryptography
LJ Wang, KY Zhang, JY Wang, J Cheng, YH Yang, SB Tang, D Yan, ...
npj quantum information 7 (1), 67, 2021
952021
Leakage-resilient symmetric cryptography under empirically verifiable assumptions
FX Standaert, O Pereira, Y Yu
Annual Cryptology Conference, 335-352, 2013
882013
Two-round PAKE from approximate SPH and instantiations from lattices
J Zhang, Y Yu
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
732017
Efficient and secure multiparty computation from fixed-key block ciphers
C Guo, J Katz, X Wang, Y Yu
2020 IEEE Symposium on Security and Privacy (SP), 825-841, 2020
722020
Connected vehicles' security from the perspective of the in-vehicle network
X Li, Y Yu, G Sun, K Chen
IEEE Network 32 (3), 58-63, 2018
612018
Small tweaks do not help: Differential power analysis of milenage implementations in 3G/4G USIM cards
J Liu, Y Yu, FX Standaert, Z Guo, D Gu, W Sun, Y Ge, X Xie
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
592015
Practical leakage-resilient pseudorandom objects with minimum public randomness
Y Yu, FX Standaert
Cryptographers’ Track at the RSA Conference, 223-238, 2013
552013
Cryptography with auxiliary input and trapdoor from constant-noise LPN
Y Yu, J Zhang
Annual International Cryptology Conference, 214-243, 2016
532016
Anonymity for bitcoin from secure escrow address
Q Wang, X Li, Y Yu
IEEE Access 6, 12336-12341, 2017
512017
Ridge-based DPA: Improvement of differential power analysis for nanoscale chips
W Wang, Y Yu, FX Standaert, J Liu, Z Guo, D Gu
IEEE Transactions on Information Forensics and Security 13 (5), 1301-1316, 2017
492017
Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes
J Zhang, Y Yu, S Fan, Z Zhang, K Yang
Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020
412020
On the need of physical security for small embedded devices: A case study with COMP128-1 implementations in SIM cards
Y Zhou, Y Yu, FX Standaert, JJ Quisquater
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
402013
Better concrete security for half-gates garbling (in the multi-instance setting)
C Guo, J Katz, X Wang, C Weng, Y Yu
Annual International Cryptology Conference, 793-822, 2020
392020
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model
X Li, H Qian, J Weng, Y Yu
Mathematical and Computer Modelling 57 (3-4), 503-511, 2013
372013
The hardness of LPN over any integer ring and field for PCG applications
H Liu, X Wang, K Yang, Y Yu
Annual International Conference on the Theory and Applications of …, 2024
332024
Valiant’s universal circuits revisited: an overall improvement and a lower bound
S Zhao, Y Yu, J Zhang, H Liu
International Conference on the Theory and Application of Cryptology and …, 2019
312019
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20