Yu Yu
Orcid: 0000-0002-9278-4521Affiliations:
- Shanghai Jiaotong University, Department of Computer Science and Engineering, China
- Westone Cryptologic Research Center, Beijing, China (former)
- Tsinghua University, Institute for Interdisciplinary Information Sciences, Beijing, China (2012 - 2013)
- East China Normal University, Department of Computer Science and Technology, Shanghai, China (2010 - 2011)
- Nanyang Technological University, School of Computer Engineering, Singapore (PhD 2006)
According to our database1,
Yu Yu
authored at least 106 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
The Multi-user Constrained PRF Security of Generalized GGM Trees for MPC and Hierarchical Wallets.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
2023
The Multi-User Constrained Pseudorandom Function Security of Generalized GGM Trees for MPC and Hierarchical Wallets.
ACM Trans. Priv. Secur., August, 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Cryptol. ePrint Arch., 2023
Revisiting the Constant-sum Winternitz One-time Signature with Applications to SPHINCS+ and XMSS.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Revisiting the Constant-Sum Winternitz One-Time Signature with Applications to SPHINCS<sup>+</sup> and XMSS.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
HEAD: an FHE-based Outsourced Computation Protocol with Compact Storage and Efficient Computation.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Information Security - 25th International Conference, 2022
2021
IACR Trans. Symmetric Cryptol., 2021
Theor. Comput. Sci., 2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
MPC-in-Multi-Heads: A Multi-Prover Zero-Knowledge Proof System - (or: How to Jointly Prove Any NP Statements in ZK).
Proceedings of the Computer Security - ESORICS 2021, 2021
Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact.
IACR Cryptol. ePrint Arch., 2020
Sci. China Inf. Sci., 2020
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
Proceedings of the Computer Security - ESORICS 2020, 2020
LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
IACR Trans. Symmetric Cryptol., 2019
Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations.
IEEE Trans. Inf. Forensics Secur., 2019
IET Inf. Secur., 2019
IACR Cryptol. ePrint Arch., 2019
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Basing Diversified Services of Complex IIoT Applications on Scalable Block Graph Platform.
IEEE Access, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Netw., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018
Proceedings of the Provable Security, 2018
2017
1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity.
Secur. Commun. Networks, 2017
J. Comput. Syst. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Comput. Stand. Interfaces, 2017
VulDigger: A Just-in-Time and Cost-Aware Tool for Digging Vulnerability-Contributing Changes.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
Proceedings of the Smart Card Research and Advanced Applications, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Comput. J., 2016
Proceedings of the Information and Communications Security - 18th International Conference, 2016
Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages.
Proceedings of the Smart Card Research and Advanced Applications, 2016
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Pseudorandom generators from regular one-way functions: New constructions with improved parameters.
Theor. Comput. Sci., 2015
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards.
Proceedings of the Computer Security - ESORICS 2015, 2015
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
Robust password changing and DoS resilience for human-centric password authentication.
Secur. Commun. Networks, 2014
(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions.
IACR Cryptol. ePrint Arch., 2014
The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions.
Electron. Colloquium Comput. Complex., 2014
POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model.
Math. Comput. Model., 2013
On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards.
IACR Cryptol. ePrint Arch., 2013
Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Proceedings of the 2012 IEEE Information Theory Workshop, 2012
Proceedings of the 2012 IEEE Information Theory Workshop, 2012
2011
2010
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009