Yu Yu
Yu Yu
Research Professor, Shanghai Jiaotong University
Verified email at tsinghua.edu.cn - Homepage
Title
Cited by
Cited by
Year
Leakage resilient cryptography in practice
FX Standaert, O Pereira, Y Yu, JJ Quisquater, M Yung, E Oswald
Towards Hardware-Intrinsic Security, 99-134, 2010
1172010
Leftover hash lemma, revisited
B Barak, Y Dodis, H Krawczyk, O Pereira, K Pietrzak, FX Standaert, Y Yu
Annual Cryptology Conference, 1-20, 2011
1102011
Practical leakage-resilient pseudorandom generators
Y Yu, FX Standaert, O Pereira, M Yung
Proceedings of the 17th ACM conference on Computer and communications …, 2010
942010
Overcoming weak expectations
Y Dodis, Y Yu
Theory of Cryptography Conference, 1-22, 2013
752013
Leakage-resilient symmetric cryptography under empirically verifiable assumptions
FX Standaert, O Pereira, Y Yu
Annual Cryptology Conference, 335-352, 2013
652013
Practical leakage-resilient pseudorandom objects with minimum public randomness
Y Yu, FX Standaert
Cryptographers’ Track at the RSA Conference, 223-238, 2013
432013
Small tweaks do not help: Differential power analysis of milenage implementations in 3G/4G USIM cards
J Liu, Y Yu, FX Standaert, Z Guo, D Gu, W Sun, Y Ge, X Xie
European Symposium on Research in Computer Security, 468-480, 2015
272015
On the need of physical security for small embedded devices: a case study with COMP128-1 implementations in SIM cards
Y Zhou, Y Yu, FX Standaert, JJ Quisquater
International Conference on Financial Cryptography and Data Security, 230-238, 2013
272013
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model
X Li, H Qian, J Weng, Y Yu
Mathematical and Computer Modelling 57 (3-4), 503-511, 2013
272013
Cryptography with auxiliary input and trapdoor from constant-noise LPN
Y Yu, J Zhang
Annual International Cryptology Conference, 214-243, 2016
232016
Two-round PAKE from approximate SPH and instantiations from lattices
J Zhang, Y Yu
International Conference on the Theory and Application of Cryptology and …, 2017
202017
Connected Vehicles' Security from the Perspective of the In-Vehicle Network
X Li, Y Yu, G Sun, K Chen
IEEE Network 32 (3), 58-63, 2018
132018
Ridge-based dpa: Improvement of differential power analysis for nanoscale chips
W Wang, Y Yu, FX Standaert, J Liu, Z Guo, D Gu
IEEE Transactions on Information Forensics and Security 13 (5), 1301-1316, 2017
112017
Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations
Y Sun, Y Yu, X Li, K Zhang, H Qian, Y Zhou
Australasian Conference on Information Security and Privacy, 293-309, 2016
112016
Hiding circuit topology from unbounded reverse engineers
Y Yu, J Leiwo, B Premkumar
Australasian Conference on Information Security and Privacy, 171-182, 2006
112006
Pseudorandom functions in almost constant depth from low-noise LPN
Y Yu, J Steinberger
Annual International Conference on the Theory and Applications of …, 2016
102016
Inner product masking for bitslice ciphers and security order amplification for linear leakages
W Wang, FX Standaert, Y Yu, S Pu, J Liu, Z Guo, D Gu
International Conference on Smart Card Research and Advanced Applications …, 2016
92016
Anonymity for bitcoin from secure escrow address
Q Wang, X Li, Y Yu
IEEE Access 6, 12336-12341, 2017
82017
Pseudorandom generators from regular one-way functions: New constructions with improved parameters
Y Yu, X Li, J Weng
International Conference on the Theory and Application of Cryptology and …, 2013
82013
Leakage resilient cryptography in practice. in “Towards Hardware Intrinsic Security: Foundation and Practice”
FX Standaert, O Pereira, Y Yu, JJ Quisquater, M Yung, E Oswald
Springer, 2010, Cryptology ePrint Archive, Report 2009/341, 2009. http …, 0
7
The system can't perform the operation now. Try again later.
Articles 1–20