Da-Wu Gu

From MaRDI portal
Person:615244

Available identifiers

zbMath Open gu.dawuMaRDI QIDQ615244

List of research outcomes

PublicationDate of PublicationType
Almost tight multi-user security under adaptive corruptions from LWE in the standard model2024-02-06Paper
Almost tight multi-user security under adaptive corruptions \& leakages in the standard model2023-12-12Paper
EKE meets tight security in the universally composable framework2023-11-24Paper
Functional encryption against probabilistic queries: definition, construction and applications2023-11-16Paper
Fine-grained verifier NIZK and its applications2023-11-16Paper
A universally composable non-interactive aggregate cash system2023-08-25Paper
Privacy-preserving authenticated key exchange in the standard model2023-08-25Paper
Practical multi-party private set intersection cardinality and intersection-sum under arbitrary collusion2023-08-21Paper
Further cryptanalysis of a type of RSA variants2023-08-04Paper
Fuzzy authenticated key exchange with tight security2023-07-28Paper
More efficient verifiable functional encryption2023-07-21Paper
Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness2023-05-12Paper
Simulatable verifiable random function from the LWE assumption2023-04-27Paper
Two-pass authenticated key exchange with explicit authentication and tight security2023-03-21Paper
Precise bounded-concurrent zero-knowledge proofs for NP2022-10-28Paper
SymSem: Symbolic Execution with Time Stamps for Deobfuscation2022-10-14Paper
Public-Key Puncturable Encryption: Modular and Compact Constructions2022-10-13Paper
Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting2022-04-22Paper
Tightly CCA-secure inner product functional encryption scheme2021-12-01Paper
New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries2021-11-25Paper
Pseudorandom functions in NC class from the standard LWE assumption2021-11-11Paper
Tightly secure chameleon hash functions in the multi-user setting and their applications2021-06-08Paper
Robustly reusable fuzzy extractor with imperfect randomness2021-05-10Paper
RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security2021-02-08Paper
Pseudorandom functions from LWE: RKA security and application2020-05-27Paper
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system2020-03-09Paper
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman2020-02-07Paper
Strong leakage and tamper-resilient PKE from refined hash proof system2020-01-30Paper
Generic constructions of robustly reusable fuzzy extractor2020-01-28Paper
Structure-preserving public-key encryption with leakage-resilient CCA security2019-10-18Paper
Tightly secure signature schemes from the LWE and subset sum assumptions2019-10-18Paper
A generic construction of tightly secure signatures in the multi-user setting2019-05-29Paper
Beyond-birthday secure domain-preserving PRFs from a single permutation2019-05-24Paper
https://portal.mardi4nfdi.de/entity/Q46456752019-01-10Paper
On the robustness of learning parity with noise2018-10-26Paper
Tightly SIM-SO-CCA secure public key encryption from standard assumptions2018-05-16Paper
A modified fuzzy fingerprint vault based on pair-polar minutiae structures2018-04-20Paper
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness2018-04-06Paper
Evaluation and improvement of generic-emulating DPA attacks2018-02-14Paper
Efficient fuzzy extraction of PUF-induced secrets: theory and applications2018-02-14Paper
Functional graph revisited: updates on (second) preimage attacks on hash combiners2017-11-15Paper
Public key encryption resilient to leakage and tampering attacks2017-09-07Paper
Tightly-secure signatures from the decisional composite residuosity assumption2017-08-25Paper
Learning $$AC^0$$ Under k-Dependent Distributions2017-05-19Paper
Ridge-Based Profiled Differential Power Analysis2017-04-12Paper
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers2017-02-01Paper
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions2016-09-02Paper
Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for Circuits2016-09-02Paper
Differential power analysis of stream ciphers with LFSRs2016-07-06Paper
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond2015-12-10Paper
Automatic Detection and Analysis of Encrypted Messages in Malware2015-12-02Paper
https://portal.mardi4nfdi.de/entity/Q34480092015-10-28Paper
https://portal.mardi4nfdi.de/entity/Q34480102015-10-28Paper
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?2015-07-21Paper
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions2015-07-06Paper
Efficient Leakage-Resilient Identity-Based Encryption with CCA Security2014-02-18Paper
Improved Impossible Differential Attacks on Large-Block Rijndael2013-06-04Paper
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia2013-01-08Paper
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming2013-01-07Paper
On weaknesses of the HDCP authentication and key exchange protocol and its repair2012-08-24Paper
Impossible Differential Attacks on Reduced-Round LBlock2012-06-29Paper
Provably secure three-party password-based authenticated key exchange protocol2012-06-08Paper
Efficient Pairing Computation on Elliptic Curves in Hessian Form2011-10-27Paper
Precise Time and Space Simulatable Zero-Knowledge2011-09-16Paper
On Obfuscating Programs with Tamper-proof Hardware2011-07-29Paper
A Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-Encryption2011-07-01Paper
A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware2011-05-19Paper
HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES2011-01-19Paper
Precise zero-knowledge arguments with poly-logarithmic efficiency2011-01-05Paper
On sequential composition of precise zero-knowledge2011-01-05Paper
https://portal.mardi4nfdi.de/entity/Q30645792010-12-22Paper
Differential-Multiple Linear Cryptanalysis2010-11-23Paper
Fully CCA2 secure identity based broadcast encryption without random oracles2010-08-16Paper
A program understanding approach for stripped binary code2010-03-06Paper
Efficient scalar multiplication for elliptic curves over binary fields2010-02-12Paper
Speeding Up the Double-Base Recoding Algorithm of Scalar Multiplication∗2009-11-16Paper
https://portal.mardi4nfdi.de/entity/Q36414322009-11-11Paper
A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor2009-02-10Paper
Secure Hierarchical Identity Based Encryption Scheme in the Standard Model2009-01-22Paper
https://portal.mardi4nfdi.de/entity/Q35246852008-09-12Paper
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security2008-06-10Paper
Ono invariants of imaginary quadratic fields with class number three2008-02-04Paper
Further analysis of block ciphers against timing attacks2007-06-01Paper
Formalization of fault analysis and a new approach of fault detection2007-05-09Paper
https://portal.mardi4nfdi.de/entity/Q34126302007-01-02Paper
https://portal.mardi4nfdi.de/entity/Q54697122006-05-26Paper
https://portal.mardi4nfdi.de/entity/Q57009962005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q56966582005-10-18Paper
https://portal.mardi4nfdi.de/entity/Q48239852004-10-28Paper
https://portal.mardi4nfdi.de/entity/Q44084332003-06-29Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Da-Wu Gu