Yu Yu

From MaRDI portal
Person:394924

Available identifiers

zbMath Open yu.yuMaRDI QIDQ394924

List of research outcomes

PublicationDate of PublicationType
Revisiting the constant-sum Winternitz one-time signature with applications to SPHINCS\textsuperscript{+} and XMSS2024-02-06Paper
Actively secure half-gates with minimum overhead under duplex networks2023-12-08Paper
A non-heuristic approach to time-space tradeoffs and optimizations for BKW2023-08-25Paper
A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding2023-08-21Paper
Packed multiplication: how to amortize the cost of side-channel masking?2023-03-21Paper
Cryptanalysis of candidate obfuscators for affine determinant programs2022-08-30Paper
The stability of a dynamic duopoly Cournot-Bertrand game model2022-06-16Paper
Pushing the limits of Valiant's universal circuits: simpler, tighter and more compact2022-04-22Paper
Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN2022-04-22Paper
Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes2021-12-01Paper
An improved algorithm for learning sparse parities in the presence of noise2021-06-22Paper
The stability and duality of dynamic Cournot and Bertrand duopoly model with comprehensive preference2021-04-20Paper
The stability of Bayesian Nash equilibrium of dynamic Cournot duopoly model with asymmetric information2020-10-23Paper
Complex dynamical behaviors of a mixed duopoly game based on intellectual property rights protection2020-10-21Paper
The dynamic rent-seeking games with policymaker cost and competition intensity2020-10-14Paper
Valiant's universal circuits revisited: an overall improvement and a lower bound2020-05-20Paper
Collision resistant hashing from sub-exponential learning parity with noise2020-05-05Paper
Strong leakage and tamper-resilient PKE from refined hash proof system2020-01-30Paper
Robust sampled-data observer design for Lipschitz nonlinear systems2018-11-29Paper
Secure outsourcing of cryptographic circuits2018-11-07Paper
On the hardness of sparsely learning parity with noise2018-11-07Paper
On the robustness of learning parity with noise2018-10-26Paper
Data envelopment analysis cross-like efficiency model for non-homogeneous decision-making units: the case of United States companies' low-carbon investment to attain corporate sustainability2018-04-23Paper
Two-round PAKE from approximate SPH and instantiations from lattices2018-02-23Paper
Evaluation and improvement of generic-emulating DPA attacks2018-02-14Paper
Public key encryption resilient to leakage and tampering attacks2017-09-07Paper
Ridge-Based Profiled Differential Power Analysis2017-04-12Paper
Solving Stochastic Ship Fleet Routing Problems with Inventory Management Using Branch and Price2017-02-03Paper
https://portal.mardi4nfdi.de/entity/Q29515432017-01-06Paper
Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN2016-11-30Paper
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions2016-09-02Paper
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations2016-08-31Paper
Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN2016-07-15Paper
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond2015-12-10Paper
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions2015-07-06Paper
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model2015-02-19Paper
Pseudorandom generators from regular one-way functions: new constructions with improved parameters2015-01-28Paper
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model2014-09-29Paper
Balanced \(2p\)-variable rotation symmetric Boolean functions with optimal algebraic immunity, good nonlinearity, and good algebraic degree2014-01-28Paper
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles2014-01-24Paper
Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters2013-12-10Paper
Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions2013-09-02Paper
Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness2013-03-18Paper
Overcoming Weak Expectations2013-03-18Paper
Leftover Hash Lemma, Revisited2011-08-12Paper
https://portal.mardi4nfdi.de/entity/Q35682892010-06-17Paper
https://portal.mardi4nfdi.de/entity/Q34050062010-02-12Paper
https://portal.mardi4nfdi.de/entity/Q36424222009-11-11Paper
Hiding Circuit Topology from Unbounded Reverse Engineers2007-09-07Paper
Information Security and Cryptology2006-11-14Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Yu Yu