Yu Pu Hu

From MaRDI portal
Revision as of 12:36, 28 January 2024 by Import240128110107 (talk | contribs) (Created automatically from import240128110107)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:332060

Available identifiers

zbMath Open hu.yupuMaRDI QIDQ332060

List of research outcomes





PublicationDate of PublicationType
Towards compact identity-based encryption on ideal lattices2024-11-12Paper
On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local Revocation2024-03-14Paper
Simplified server-aided revocable identity-based encryption from lattices2023-07-21Paper
Improved key-recovery attacks on reduced-round WEM-82022-09-22Paper
Lattice-based linearly homomorphic signature scheme over binary field2021-12-15Paper
Accountable identity-based encryption with distributed private key generators2021-03-16Paper
D-NTRU: more efficient and average-case IND-CPA secure NTRU variant2020-09-08Paper
Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease2020-07-20Paper
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts2020-01-29Paper
Algebraic Attacks Against Several Weak Variants of GVW’13 ABE2019-12-10Paper
Signature scheme using the root extraction problem on quaternions2019-11-19Paper
A new Gaussian sampling for trapdoor lattices with arbitrary modulus2019-10-17Paper
Lattice-based certificateless encryption scheme2018-12-19Paper
Sieve method for polynomial linear equivalence2018-10-10Paper
Identity-based blind signature from lattices2018-05-25Paper
Cryptanalysis of multilinear maps from ideal lattices: revisited2017-09-28Paper
Guess and Determine Attacks on Filter Generators—Revisited2017-07-12Paper
A New Correlation Attack on Nonlinear Combining Generators2017-07-12Paper
Identity-Based Blind Signature from Lattices in Standard Model2017-05-05Paper
The termination of the F5 algorithm revisited2017-02-10Paper
Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions2017-02-07Paper
New secondary constructions of bent functions2017-01-13Paper
Efficient quantum dialogue using entangled states and entanglement swapping without information leakage2016-10-27Paper
Cryptanalysis of GGH Map2016-09-09Paper
Gaussian sampling of lattices for cryptographic applications2015-11-20Paper
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model2015-11-20Paper
https://portal.mardi4nfdi.de/entity/Q34479222015-10-28Paper
https://portal.mardi4nfdi.de/entity/Q34480112015-10-28Paper
https://portal.mardi4nfdi.de/entity/Q29433202015-09-11Paper
https://portal.mardi4nfdi.de/entity/Q29433312015-09-11Paper
Hard fault analysis of Trivium2014-08-01Paper
Chosen ciphertext secure identity-based broadcast encryption in the standard model2014-03-27Paper
https://portal.mardi4nfdi.de/entity/Q53999372014-02-28Paper
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions2013-07-04Paper
https://portal.mardi4nfdi.de/entity/Q49007482013-01-24Paper
New constructions of balanced Boolean functions with high nonlinearity and optimal algebraic degree2013-01-22Paper
Secondary constructions of bent functions and their enforcement2012-11-12Paper
On the value distributions of Walsh spectrums of quadratic plateaued functions2012-10-25Paper
Linear spans of optimal sets of frequency hopping sequences2012-08-27Paper
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups2012-08-24Paper
Fault analysis of Trivium2012-03-01Paper
The Termination of Algorithms for Computing Gr\"{o}bner Bases2012-02-16Paper
https://portal.mardi4nfdi.de/entity/Q31107302012-01-27Paper
https://portal.mardi4nfdi.de/entity/Q31107322012-01-27Paper
https://portal.mardi4nfdi.de/entity/Q31108132012-01-27Paper
https://portal.mardi4nfdi.de/entity/Q31108222012-01-27Paper
Identity-based broadcast encryption with shorter transmissions2012-01-01Paper
https://portal.mardi4nfdi.de/entity/Q30985342011-11-17Paper
LOWER BOUNDS ON THE SECOND ORDER NONLINEARITY OF BOOLEAN FUNCTIONS2011-10-10Paper
https://portal.mardi4nfdi.de/entity/Q30920902011-09-15Paper
Weak generalized self-shrinking generators2011-08-25Paper
https://portal.mardi4nfdi.de/entity/Q30166812011-07-19Paper
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits2011-05-19Paper
Quadratic compact knapsack public-key cryptosystem2010-06-28Paper
New related-key rectangle attacks on reduced AES-192 and AES-2562010-02-26Paper
https://portal.mardi4nfdi.de/entity/Q34032402010-02-12Paper
https://portal.mardi4nfdi.de/entity/Q34032482010-02-12Paper
Certificateless signcryption scheme in the standard model2010-01-28Paper
https://portal.mardi4nfdi.de/entity/Q53196242009-07-22Paper
https://portal.mardi4nfdi.de/entity/Q53202672009-07-22Paper
New Construction of Short Hierarchical ID-Based Signature in the Standard Model2009-05-22Paper
On the Computational Efficiency of XTR+2009-04-29Paper
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks2009-03-10Paper
NTRUSign With a New Perturbation2009-02-24Paper
ID-based threshold proxy signcryption scheme from bilinear pairings2009-02-24Paper
Secure Proxy Multi-signature Scheme in the Standard Model2009-01-27Paper
Resilient functions over finite fields2008-12-21Paper
Generalized Self-Shrinking Generator2008-12-21Paper
Computing the k-Error N-Adic Complexity of a Sequence of Period p n2008-11-27Paper
Fast S-box security mechanism research based on the polymorphic cipher2008-03-12Paper
https://portal.mardi4nfdi.de/entity/Q54319322008-01-02Paper
Impossible differential cryptanalysis of advanced encryption standard2007-10-12Paper
A knapsack-based probabilistic encryption scheme2007-10-10Paper
New weak keys in RSA2007-06-01Paper
A new method for impossible differential cryptanalysis of 8-round advanced encryption standard2007-06-01Paper
An efficient method against side-channel attacks on ECC2007-06-01Paper
Improvement of identity-based threshold proxy signature scheme with known signers2007-06-01Paper
Fault attack on the balanced shrinking generator2007-06-01Paper
Pseudo-randomness of the fourth class of GSS sequences2007-02-20Paper
Stream cipher based on GSS sequences2007-02-20Paper
Key management using certificate-based cryptosystem in ad hoc networks2006-11-15Paper
Information Security and Cryptology2006-11-14Paper
https://portal.mardi4nfdi.de/entity/Q54908322006-10-04Paper
https://portal.mardi4nfdi.de/entity/Q33735222006-03-13Paper
https://portal.mardi4nfdi.de/entity/Q42717151994-04-26Paper

Research outcomes over time

This page was built for person: Yu Pu Hu