Dawu Gu

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Efficient KZG-based univariate sum-check and lookup argument2024-11-12Paper
A refined hardness estimation of LWE in two-step mode2024-11-12Paper
More efficient public-key cryptography with leakage and tamper resilience2024-11-12Paper
FaBFT: flexible asynchronous BFT protocol using DAG2024-07-19Paper
Polynomial IOPs for memory consistency checks in zero-knowledge virtual machines2024-06-26Paper
Biometric-based two-factor authentication scheme under database leakage
Theoretical Computer Science
2024-05-02Paper
Ciphertext policy attribute-based encryption for circuits from LWE assumption2024-04-19Paper
Almost tight multi-user security under adaptive corruptions from LWE in the standard model
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Almost tight multi-user security under adaptive corruptions \& leakages in the standard model
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
EKE meets tight security in the universally composable framework
Lecture Notes in Computer Science
2023-11-24Paper
Fine-grained verifier NIZK and its applications
Lecture Notes in Computer Science
2023-11-16Paper
Functional encryption against probabilistic queries: definition, construction and applications
Lecture Notes in Computer Science
2023-11-16Paper
Privacy-preserving authenticated key exchange in the standard model
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
A universally composable non-interactive aggregate cash system
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Practical multi-party private set intersection cardinality and intersection-sum under arbitrary collusion
Information Security and Cryptology
2023-08-21Paper
Further cryptanalysis of a type of RSA variants
Lecture Notes in Computer Science
2023-08-04Paper
Fuzzy authenticated key exchange with tight security
Computer Security – ESORICS 2022
2023-07-28Paper
More efficient verifiable functional encryption
Provable and Practical Security
2023-07-21Paper
Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness
Lecture Notes in Computer Science
2023-05-12Paper
Simulatable verifiable random function from the LWE assumption
Theoretical Computer Science
2023-04-27Paper
Two-pass authenticated key exchange with explicit authentication and tight security2023-03-21Paper
A New General Method of Searching for Cubes in Cube Attacks
1515.94063
2022-12-21Paper
Precise bounded-concurrent zero-knowledge proofs for NP
Science China Information Sciences
2022-10-28Paper
SymSem: Symbolic Execution with Time Stamps for Deobfuscation
Information Security and Cryptology
2022-10-14Paper
Public-key puncturable encryption: modular and compact constructions
Lecture Notes in Computer Science
2022-10-13Paper
Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting2022-04-22Paper
Tightly CCA-secure inner product functional encryption scheme
Theoretical Computer Science
2021-12-01Paper
New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries
Information and Computation
2021-11-25Paper
Pseudorandom functions in NC class from the standard LWE assumption
Designs, Codes and Cryptography
2021-11-11Paper
Tightly secure chameleon hash functions in the multi-user setting and their applications2021-06-08Paper
Robustly reusable fuzzy extractor with imperfect randomness
Designs, Codes and Cryptography
2021-05-10Paper
RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security2021-02-08Paper
Pseudorandom functions from LWE: RKA security and application2020-05-27Paper
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system2020-03-09Paper
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
Information Sciences
2020-02-07Paper
Strong leakage and tamper-resilient PKE from refined hash proof system2020-01-30Paper
Generic constructions of robustly reusable fuzzy extractor2020-01-28Paper
Structure-preserving public-key encryption with leakage-resilient CCA security
Theoretical Computer Science
2019-10-18Paper
Tightly secure signature schemes from the LWE and subset sum assumptions
Theoretical Computer Science
2019-10-18Paper
A generic construction of tightly secure signatures in the multi-user setting
Theoretical Computer Science
2019-05-29Paper
Beyond-birthday secure domain-preserving PRFs from a single permutation
Designs, Codes and Cryptography
2019-05-24Paper
PAC learning depth-3 \(\mathrm{AC}^0\) circuits of bounded top fanin2019-01-10Paper
On the robustness of learning parity with noise2018-10-26Paper
Tightly SIM-SO-CCA secure public key encryption from standard assumptions2018-05-16Paper
A modified fuzzy fingerprint vault based on pair-polar minutiae structures2018-04-20Paper
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
Designs, Codes and Cryptography
2018-04-06Paper
Evaluation and improvement of generic-emulating DPA attacks2018-02-14Paper
Efficient fuzzy extraction of PUF-induced secrets: theory and applications2018-02-14Paper
Functional graph revisited: updates on (second) preimage attacks on hash combiners2017-11-15Paper
Public key encryption resilient to leakage and tampering attacks
Journal of Computer and System Sciences
2017-09-07Paper
Tightly-secure signatures from the decisional composite residuosity assumption2017-08-25Paper
Learning \(\mathrm{AC}^0\) under \(k\)-dependent distributions
Lecture Notes in Computer Science
2017-05-19Paper
Ridge-based profiled differential power analysis
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
How to build fully secure tweakable blockciphers from classical blockciphers
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Efficient completely non-malleable and RKA secure public key encryptions
Information Security and Privacy
2016-09-02Paper
Four-round zero-knowledge arguments of knowledge with strict polynomial-time simulation from differing-input obfuscation for circuits
Lecture Notes in Computer Science
2016-09-02Paper
Differential power analysis of stream ciphers with LFSRs
Computers & Mathematics with Applications
2016-07-06Paper
(Almost) optimal constructions of UOWHFs from 1-to-1, regular one-way functions and beyond
Lecture Notes in Computer Science
2015-12-10Paper
Automatic detection and analysis of encrypted messages in malware
Information Security and Cryptology
2015-12-02Paper
scientific article; zbMATH DE number 6499818 (Why is no real title available?)2015-10-28Paper
scientific article; zbMATH DE number 6499819 (Why is no real title available?)2015-10-28Paper
Secure lightweight entity authentication with strong PUFs: Mission impossible?
Advanced Information Systems Engineering
2015-07-21Paper
The randomized iterate, revisited -- almost linear seed length PRGs from a broader class of one-way functions
Theory of Cryptography
2015-07-06Paper
Efficient leakage-resilient identity-based encryption with CCA security
Pairing-Based Cryptography – Pairing 2013
2014-02-18Paper
Improved impossible differential attacks on large-block Rijndael
Lecture Notes in Computer Science
2013-06-04Paper
New observations on impossible differential cryptanalysis of reduced-round Camellia
Fast Software Encryption
2013-01-08Paper
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
Information Security and Cryptology
2013-01-07Paper
On weaknesses of the HDCP authentication and key exchange protocol and its repair
Mathematical and Computer Modelling
2012-08-24Paper
Impossible differential attacks on reduced-round LBlock
Information Security Practice and Experience
2012-06-29Paper
Provably secure three-party password-based authenticated key exchange protocol
Information Sciences
2012-06-08Paper
Efficient pairing computation on elliptic curves in Hessian form
Information Security and Cryptology - ICISC 2010
2011-10-27Paper
Precise time and space simulatable zero-knowledge
Provable Security
2011-09-16Paper
On obfuscating programs with tamper-proof hardware
Information Security and Cryptology
2011-07-29Paper
A note on obfuscation for cryptographic functionalities of secret-operation then public-encryption
Lecture Notes in Computer Science
2011-07-01Paper
A general and efficient obfuscation for programs with tamper-proof hardware
Information Security Practice and Experience
2011-05-19Paper
HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES
International Journal of Foundations of Computer Science
2011-01-19Paper
Precise zero-knowledge arguments with poly-logarithmic efficiency
Journal of Shanghai Jiaotong University (Science)
2011-01-05Paper
On sequential composition of precise zero-knowledge
Journal of Shanghai Jiaotong University (Science)
2011-01-05Paper
New fuzzy identity-based encryption in the standard model2010-12-22Paper
Differential-multiple linear cryptanalysis
Information Security and Cryptology
2010-11-23Paper
Fully CCA2 secure identity based broadcast encryption without random oracles
Information Processing Letters
2010-08-16Paper
A program understanding approach for stripped binary code
Journal of Computer Applications
2010-03-06Paper
Efficient scalar multiplication for elliptic curves over binary fields
Wuhan University Journal of Natural Sciences
2010-02-12Paper
Speeding Up the Double-Base Recoding Algorithm of Scalar Multiplication∗
Cryptologia
2009-11-16Paper
Further sharpening of Euclid's argument on the infinitude of primes2009-11-11Paper
A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor
Information Security and Cryptology
2009-02-10Paper
Secure Hierarchical Identity Based Encryption Scheme in the Standard Model
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Efficient hierarchical identity based encryption scheme in the standard model2008-09-12Paper
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security
Provable Security
2008-06-10Paper
Ono invariants of imaginary quadratic fields with class number three
Journal of Number Theory
2008-02-04Paper
Further analysis of block ciphers against timing attacks
Wuhan University Journal of Natural Sciences
2007-06-01Paper
Formalization of fault analysis and a new approach of fault detection
Journal of Shanghai Jiaotong University (Science)
2007-05-09Paper
Authenticated key agreement in group settings2007-01-02Paper
The performance research of group rekey algorithm2006-05-26Paper
scientific article; zbMATH DE number 2222199 (Why is no real title available?)2005-11-02Paper
scientific article; zbMATH DE number 2215870 (Why is no real title available?)2005-10-18Paper
scientific article; zbMATH DE number 2112463 (Why is no real title available?)2004-10-28Paper
scientific article; zbMATH DE number 1941237 (Why is no real title available?)2003-06-29Paper


Research outcomes over time


This page was built for person: Dawu Gu