Yu Pu Hu

From MaRDI portal
Person:332060

Available identifiers

zbMath Open hu.yupuMaRDI QIDQ332060

List of research outcomes

PublicationDate of PublicationType
On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local Revocation2024-03-14Paper
Simplified server-aided revocable identity-based encryption from lattices2023-07-21Paper
Improved key-recovery attacks on reduced-round WEM-82022-09-22Paper
Lattice-based linearly homomorphic signature scheme over binary field2021-12-15Paper
Accountable identity-based encryption with distributed private key generators2021-03-16Paper
D-NTRU: more efficient and average-case IND-CPA secure NTRU variant2020-09-08Paper
Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease2020-07-20Paper
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts2020-01-29Paper
Algebraic Attacks Against Several Weak Variants of GVW’13 ABE2019-12-10Paper
Signature scheme using the root extraction problem on quaternions2019-11-19Paper
A new Gaussian sampling for trapdoor lattices with arbitrary modulus2019-10-17Paper
Lattice-based certificateless encryption scheme2018-12-19Paper
Sieve method for polynomial linear equivalence2018-10-10Paper
Identity-based blind signature from lattices2018-05-25Paper
Cryptanalysis of multilinear maps from ideal lattices: revisited2017-09-28Paper
Guess and Determine Attacks on Filter Generators—Revisited2017-07-12Paper
A New Correlation Attack on Nonlinear Combining Generators2017-07-12Paper
Identity-Based Blind Signature from Lattices in Standard Model2017-05-05Paper
The termination of the F5 algorithm revisited2017-02-10Paper
Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions2017-02-07Paper
New secondary constructions of bent functions2017-01-13Paper
Efficient quantum dialogue using entangled states and entanglement swapping without information leakage2016-10-27Paper
Cryptanalysis of GGH Map2016-09-09Paper
Gaussian sampling of lattices for cryptographic applications2015-11-20Paper
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model2015-11-20Paper
https://portal.mardi4nfdi.de/entity/Q34479222015-10-28Paper
https://portal.mardi4nfdi.de/entity/Q34480112015-10-28Paper
https://portal.mardi4nfdi.de/entity/Q29433202015-09-11Paper
https://portal.mardi4nfdi.de/entity/Q29433312015-09-11Paper
Hard fault analysis of Trivium2014-08-01Paper
Chosen ciphertext secure identity-based broadcast encryption in the standard model2014-03-27Paper
https://portal.mardi4nfdi.de/entity/Q53999372014-02-28Paper
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions2013-07-04Paper
https://portal.mardi4nfdi.de/entity/Q49007482013-01-24Paper
New constructions of balanced Boolean functions with high nonlinearity and optimal algebraic degree2013-01-22Paper
Secondary constructions of bent functions and their enforcement2012-11-12Paper
On the value distributions of Walsh spectrums of quadratic plateaued functions2012-10-25Paper
Linear spans of optimal sets of frequency hopping sequences2012-08-27Paper
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups2012-08-24Paper
Fault analysis of Trivium2012-03-01Paper
The Termination of Algorithms for Computing Gr\"{o}bner Bases2012-02-16Paper
https://portal.mardi4nfdi.de/entity/Q31107302012-01-27Paper
https://portal.mardi4nfdi.de/entity/Q31107322012-01-27Paper
https://portal.mardi4nfdi.de/entity/Q31108132012-01-27Paper
https://portal.mardi4nfdi.de/entity/Q31108222012-01-27Paper
Identity-based broadcast encryption with shorter transmissions2012-01-01Paper
https://portal.mardi4nfdi.de/entity/Q30985342011-11-17Paper
LOWER BOUNDS ON THE SECOND ORDER NONLINEARITY OF BOOLEAN FUNCTIONS2011-10-10Paper
https://portal.mardi4nfdi.de/entity/Q30920902011-09-15Paper
Weak generalized self-shrinking generators2011-08-25Paper
https://portal.mardi4nfdi.de/entity/Q30166812011-07-19Paper
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits2011-05-19Paper
Quadratic compact knapsack public-key cryptosystem2010-06-28Paper
New related-key rectangle attacks on reduced AES-192 and AES-2562010-02-26Paper
https://portal.mardi4nfdi.de/entity/Q34032402010-02-12Paper
https://portal.mardi4nfdi.de/entity/Q34032482010-02-12Paper
Certificateless signcryption scheme in the standard model2010-01-28Paper
https://portal.mardi4nfdi.de/entity/Q53196242009-07-22Paper
https://portal.mardi4nfdi.de/entity/Q53202672009-07-22Paper
New Construction of Short Hierarchical ID-Based Signature in the Standard Model2009-05-22Paper
On the Computational Efficiency of XTR+2009-04-29Paper
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks2009-03-10Paper
NTRUSign With a New Perturbation2009-02-24Paper
ID-based threshold proxy signcryption scheme from bilinear pairings2009-02-24Paper
Secure Proxy Multi-signature Scheme in the Standard Model2009-01-27Paper
Resilient functions over finite fields2008-12-21Paper
Generalized Self-Shrinking Generator2008-12-21Paper
Computing the k-Error N-Adic Complexity of a Sequence of Period p n2008-11-27Paper
Fast S-box security mechanism research based on the polymorphic cipher2008-03-12Paper
https://portal.mardi4nfdi.de/entity/Q54319322008-01-02Paper
Impossible differential cryptanalysis of advanced encryption standard2007-10-12Paper
A knapsack-based probabilistic encryption scheme2007-10-10Paper
New weak keys in RSA2007-06-01Paper
A new method for impossible differential cryptanalysis of 8-round advanced encryption standard2007-06-01Paper
An efficient method against side-channel attacks on ECC2007-06-01Paper
Improvement of identity-based threshold proxy signature scheme with known signers2007-06-01Paper
Fault attack on the balanced shrinking generator2007-06-01Paper
Pseudo-randomness of the fourth class of GSS sequences2007-02-20Paper
Stream cipher based on GSS sequences2007-02-20Paper
Key management using certificate-based cryptosystem in ad hoc networks2006-11-15Paper
Information Security and Cryptology2006-11-14Paper
https://portal.mardi4nfdi.de/entity/Q54908322006-10-04Paper
https://portal.mardi4nfdi.de/entity/Q33735222006-03-13Paper
https://portal.mardi4nfdi.de/entity/Q42717151994-04-26Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Yu Pu Hu