Folgen
Yu Yu
Yu Yu
Professor, Shanghai Jiaotong University
Bestätigte E-Mail-Adresse bei tsinghua.edu.cn - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Leftover hash lemma, revisited
B Barak, Y Dodis, H Krawczyk, O Pereira, K Pietrzak, FX Standaert, Y Yu
Annual Cryptology Conference, 1-20, 2011
1712011
Leakage resilient cryptography in practice
FX Standaert, O Pereira, Y Yu, JJ Quisquater, M Yung, E Oswald
Towards Hardware-Intrinsic Security: Foundations and Practice, 99-134, 2010
1482010
Practical leakage-resilient pseudorandom generators
Y Yu, FX Standaert, O Pereira, M Yung
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1192010
Experimental authentication of quantum key distribution with post-quantum cryptography
LJ Wang, KY Zhang, JY Wang, J Cheng, YH Yang, SB Tang, D Yan, ...
npj quantum information 7 (1), 67, 2021
992021
Overcoming weak expectations
Y Dodis, Y Yu
Theory of Cryptography Conference, 1-22, 2013
992013
Leakage-resilient symmetric cryptography under empirically verifiable assumptions
FX Standaert, O Pereira, Y Yu
Annual Cryptology Conference, 335-352, 2013
832013
Two-round PAKE from approximate SPH and instantiations from lattices
J Zhang, Y Yu
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
682017
Efficient and secure multiparty computation from fixed-key block ciphers
C Guo, J Katz, X Wang, Y Yu
2020 IEEE Symposium on Security and Privacy (SP), 825-841, 2020
652020
Small tweaks do not help: Differential power analysis of milenage implementations in 3G/4G USIM cards
J Liu, Y Yu, FX Standaert, Z Guo, D Gu, W Sun, Y Ge, X Xie
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
602015
Connected vehicles' security from the perspective of the in-vehicle network
X Li, Y Yu, G Sun, K Chen
IEEE Network 32 (3), 58-63, 2018
592018
Practical leakage-resilient pseudorandom objects with minimum public randomness
Y Yu, FX Standaert
Cryptographers’ Track at the RSA Conference, 223-238, 2013
552013
Cryptography with auxiliary input and trapdoor from constant-noise LPN
Y Yu, J Zhang
Annual International Cryptology Conference, 214-243, 2016
532016
Anonymity for bitcoin from secure escrow address
Q Wang, X Li, Y Yu
IEEE Access 6, 12336-12341, 2017
522017
Ridge-based DPA: Improvement of differential power analysis for nanoscale chips
W Wang, Y Yu, FX Standaert, J Liu, Z Guo, D Gu
IEEE Transactions on Information Forensics and Security 13 (5), 1301-1316, 2017
492017
On the need of physical security for small embedded devices: a case study with COMP128-1 implementations in SIM cards
Y Zhou, Y Yu, FX Standaert, JJ Quisquater
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
402013
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model
X Li, H Qian, J Weng, Y Yu
Mathematical and Computer Modelling 57 (3-4), 503-511, 2013
372013
Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes
J Zhang, Y Yu, S Fan, Z Zhang, K Yang
Public-Key Cryptography–PKC 2020: 23rd IACR International Conference on …, 2020
342020
Better concrete security for half-gates garbling (in the multi-instance setting)
C Guo, J Katz, X Wang, C Weng, Y Yu
Annual International Cryptology Conference, 793-822, 2020
322020
All optical metropolitan quantum key distribution network with post-quantum cryptography authentication
YH Yang, PY Li, SZ Ma, XC Qian, KY Zhang, LJ Wang, WL Zhang, F Zhou, ...
Optics express 29 (16), 25859-25867, 2021
282021
Valiant’s universal circuits revisited: an overall improvement and a lower bound
S Zhao, Y Yu, J Zhang, H Liu
International Conference on the Theory and Application of Cryptology and …, 2019
282019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20