Yu Yu

From MaRDI portal
Person:394924

Available identifiers

zbMath Open yu.yuMaRDI QIDQ394924

List of research outcomes





PublicationDate of PublicationType
An efficient ZK compiler from SIMD circuits to general circuits2024-12-27Paper
The hardness of LPN over any integer ring and field for PCG applications2024-11-13Paper
\textsf{ReSolveD}: shorter signatures from regular syndrome decoding and VOLE-in-the-head2024-11-12Paper
Algebraic attacks on round-reduced \textsc{Rain} and full \textsf{AIM-III}2024-08-30Paper
Security proofs for key-alternating ciphers with non-independent round permutations2024-08-01Paper
Embedding best-worst method into data envelopment analysis2024-06-25Paper
Revisiting the constant-sum Winternitz one-time signature with applications to SPHINCS\textsuperscript{+} and XMSS2024-02-06Paper
Actively secure half-gates with minimum overhead under duplex networks2023-12-08Paper
A non-heuristic approach to time-space tradeoffs and optimizations for BKW2023-08-25Paper
A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding2023-08-21Paper
Packed multiplication: how to amortize the cost of side-channel masking?2023-03-21Paper
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key2022-12-22Paper
Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation2022-12-09Paper
Cryptanalysis of candidate obfuscators for affine determinant programs2022-08-30Paper
The stability of a dynamic duopoly Cournot-Bertrand game model2022-06-16Paper
Pushing the limits of Valiant's universal circuits: simpler, tighter and more compact2022-04-22Paper
Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN2022-04-22Paper
Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes2021-12-01Paper
An improved algorithm for learning sparse parities in the presence of noise2021-06-22Paper
The stability and duality of dynamic Cournot and Bertrand duopoly model with comprehensive preference2021-04-20Paper
The stability of Bayesian Nash equilibrium of dynamic Cournot duopoly model with asymmetric information2020-10-23Paper
Complex dynamical behaviors of a mixed duopoly game based on intellectual property rights protection2020-10-21Paper
The dynamic rent-seeking games with policymaker cost and competition intensity2020-10-14Paper
Valiant's universal circuits revisited: an overall improvement and a lower bound2020-05-20Paper
Collision resistant hashing from sub-exponential learning parity with noise2020-05-05Paper
Strong leakage and tamper-resilient PKE from refined hash proof system2020-01-30Paper
Robust sampled-data observer design for Lipschitz nonlinear systems2018-11-29Paper
Secure outsourcing of cryptographic circuits2018-11-07Paper
On the hardness of sparsely learning parity with noise2018-11-07Paper
On the robustness of learning parity with noise2018-10-26Paper
Data envelopment analysis cross-like efficiency model for non-homogeneous decision-making units: the case of United States companies' low-carbon investment to attain corporate sustainability2018-04-23Paper
Two-round PAKE from approximate SPH and instantiations from lattices2018-02-23Paper
Evaluation and improvement of generic-emulating DPA attacks2018-02-14Paper
Public key encryption resilient to leakage and tampering attacks2017-09-07Paper
Ridge-Based Profiled Differential Power Analysis2017-04-12Paper
Solving Stochastic Ship Fleet Routing Problems with Inventory Management Using Branch and Price2017-02-03Paper
https://portal.mardi4nfdi.de/entity/Q29515432017-01-06Paper
Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN2016-11-30Paper
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions2016-09-02Paper
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations2016-08-31Paper
Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN2016-07-15Paper
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond2015-12-10Paper
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions2015-07-06Paper
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model2015-02-19Paper
Pseudorandom generators from regular one-way functions: new constructions with improved parameters2015-01-28Paper
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model2014-09-29Paper
Balanced \(2p\)-variable rotation symmetric Boolean functions with optimal algebraic immunity, good nonlinearity, and good algebraic degree2014-01-28Paper
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles2014-01-24Paper
Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters2013-12-10Paper
Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions2013-09-02Paper
Overcoming Weak Expectations2013-03-18Paper
Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness2013-03-18Paper
Leftover Hash Lemma, Revisited2011-08-12Paper
https://portal.mardi4nfdi.de/entity/Q35682892010-06-17Paper
https://portal.mardi4nfdi.de/entity/Q34050062010-02-12Paper
Ringel-Hall algebra of \(A^\infty_\infty\)-type2009-11-11Paper
Hiding Circuit Topology from Unbounded Reverse Engineers2007-09-07Paper
Information Security and Cryptology2006-11-14Paper

Research outcomes over time

This page was built for person: Yu Yu