Yupu Hu
Orcid: 0000-0002-1977-0959
According to our database1,
Yupu Hu
authored at least 162 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IET Inf. Secur., 2024
IACR Cryptol. ePrint Arch., 2024
2023
IET Inf. Secur., January, 2023
Comput. J., January, 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
Wirel. Networks, 2022
Secur. Commun. Networks, 2022
Peer-to-Peer Netw. Appl., 2022
Verifier-local revocation group signatures with backward unlinkability from lattices.
Frontiers Inf. Technol. Electron. Eng., 2022
Privacy-preserving convolutional neural network prediction with low latency and lightweight users.
Int. J. Intell. Syst., 2022
IET Inf. Secur., 2022
WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix.
Sci. China Inf. Sci., 2022
Proceedings of the Provable and Practical Security, 2022
2021
Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials.
Secur. Commun. Networks, 2021
Frontiers Inf. Technol. Electron. Eng., 2021
Lattice-based revocable attribute-based encryption with decryption key exposure resistance.
IET Inf. Secur., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Cryptanalysis of a Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018.
Proceedings of the Network and System Security - 15th International Conference, 2021
Proceedings of the Network and System Security - 15th International Conference, 2021
Cloud-Aided Scalable Revocable Identity-Based Encryption with Ciphertext Update from Lattices.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
Revocable Identity-Based Encryption with Server-Aided Ciphertext Evolution from Lattices.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts.
Theor. Comput. Sci., 2020
Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from Lattices.
Proceedings of the Information Security Applications - 21st International Conference, 2020
2019
KSII Trans. Internet Inf. Syst., 2019
Efficient fuzzy identity-based signature from lattices for identities in a small (or large) universe.
J. Inf. Secur. Appl., 2019
Inf. Sci., 2019
Int. J. Found. Comput. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
Frontiers Comput. Sci., 2019
Des. Codes Cryptogr., 2019
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption.
IEEE Access, 2019
Smooth Hash Proof System Based on the Learning With Errors Problem With Multi-Bit Key Output.
IEEE Access, 2019
On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local Revocation.
Proceedings of the Information Security - 22nd International Conference, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
Secur. Commun. Networks, 2018
Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud.
Int. J. High Perform. Comput. Netw., 2018
Extensional schemes of multipartite non-interactive key exchange from multilinear maps and their applications.
Int. J. High Perform. Comput. Netw., 2018
2017
Frontiers Inf. Technol. Electron. Eng., 2017
J. Netw. Intell., 2017
Int. J. Embed. Syst., 2017
Int. Arab J. Inf. Technol., 2017
Des. Codes Cryptogr., 2017
2016
Secur. Commun. Networks, 2016
Revocable and strongly unforgeable identity-based signature scheme in the standard model.
Secur. Commun. Networks, 2016
Efficient quantum dialogue using entangled states and entanglement swapping without information leakage.
Quantum Inf. Process., 2016
Frontiers Inf. Technol. Electron. Eng., 2016
Simpler Efficient Group Signature Scheme with Verifier-Local Revocation from Lattices.
KSII Trans. Internet Inf. Syst., 2016
KSII Trans. Internet Inf. Syst., 2016
Int. J. Inf. Commun. Technol., 2016
Appl. Algebra Eng. Commun. Comput., 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Int. J. Netw. Secur., 2015
Int. J. Inf. Technol. Web Eng., 2015
Extensional Schemes of Multipartite Non-interactive Key Exchange from Multilinear Maps.
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Indistinguishable against adaptive chosen ciphertext attack secure public key cryptosystem with double trapdoor decryption mechanism.
Secur. Commun. Networks, 2014
J. Appl. Math., 2014
Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions.
Inf. Sci., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model.
Frontiers Comput. Sci., 2014
Sci. China Inf. Sci., 2014
2013
Secur. Commun. Networks, 2013
Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model.
Secur. Commun. Networks, 2013
New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2013
KSII Trans. Internet Inf. Syst., 2013
Int. Arab J. Inf. Technol., 2013
Sci. China Inf. Sci., 2013
Proceedings of the International Symposium on Symbolic and Algebraic Computation, 2013
2012
IEEE Trans. Inf. Theory, 2012
Constructions of 1-resilient Boolean functions on odd number of variables with a high nonlinearity.
Secur. Commun. Networks, 2012
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups.
Math. Comput. Model., 2012
RAIRO Theor. Informatics Appl., 2012
New constructions of balanced Boolean functions with high nonlinearity and optimal algebraic degree.
Int. J. Comput. Math., 2012
CoRR, 2012
Adv. Math. Commun., 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
2011
IEEE Trans. Inf. Theory, 2011
J. Zhejiang Univ. Sci. C, 2011
J. Networks, 2011
KSII Trans. Internet Inf. Syst., 2011
Int. J. Found. Comput. Sci., 2011
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions.
Frontiers Comput. Sci. China, 2011
Comput. Commun., 2011
Comput. Electr. Eng., 2011
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011
2010
KSII Trans. Internet Inf. Syst., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information Computing and Applications - First International Conference, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
IET Inf. Secur., 2009
IACR Cryptol. ePrint Arch., 2009
Fundam. Informaticae, 2009
Sci. China Ser. F Inf. Sci., 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Inf. Sci., 2008
Int. J. Secur. Networks, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Fourth International Conference on Natural Computation, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Int. J. Mob. Commun., 2007
Sci. China Ser. F Inf. Sci., 2007
Proceedings of the IEEE International Symposium on Information Theory, 2007
Proceedings of the Grid and Cooperative Computing, 2007
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
Int. J. Netw. Secur., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
Computing the <i>k</i>-Error <i>N</i>-Adic Complexity of a Sequence of Period <i>p</i><sup><i>n</i></sup>.
Proceedings of the Sequences and Their Applications, 2006
Proceedings of the Information Security Practice and Experience, 2006
ID-Based ( <i>t</i> , <i>n</i> ) Threshold Proxy Signcryption for Multi-agent Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2005
A construction of resilient functions with satisfying synthetical cryptographic criteria.
Proceedings of the IEEE ITSOC Information Theory Workshop 2005 on Coding and Complexity, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
Sci. China Ser. F Inf. Sci., 2004
New construction of resilient functions with satisfying multiple cryptographic criteria.
Proceedings of the 3rd International Conference on Information Security, 2004
Proceedings of the 3rd International Conference on Information Security, 2004
2003