Dawu Gu

From MaRDI portal
Person:615244

Available identifiers

zbMath Open gu.dawuMaRDI QIDQ615244

List of research outcomes





PublicationDate of PublicationType
Efficient KZG-based univariate sum-check and lookup argument2024-11-12Paper
A refined hardness estimation of LWE in two-step mode2024-11-12Paper
More efficient public-key cryptography with leakage and tamper resilience2024-11-12Paper
FaBFT: flexible asynchronous BFT protocol using DAG2024-07-19Paper
Polynomial IOPs for memory consistency checks in zero-knowledge virtual machines2024-06-26Paper
Biometric-based two-factor authentication scheme under database leakage2024-05-02Paper
Ciphertext policy attribute-based encryption for circuits from LWE assumption2024-04-19Paper
Almost tight multi-user security under adaptive corruptions from LWE in the standard model2024-02-06Paper
Almost tight multi-user security under adaptive corruptions \& leakages in the standard model2023-12-12Paper
EKE meets tight security in the universally composable framework2023-11-24Paper
Fine-grained verifier NIZK and its applications2023-11-16Paper
Functional encryption against probabilistic queries: definition, construction and applications2023-11-16Paper
Privacy-preserving authenticated key exchange in the standard model2023-08-25Paper
A universally composable non-interactive aggregate cash system2023-08-25Paper
Practical multi-party private set intersection cardinality and intersection-sum under arbitrary collusion2023-08-21Paper
Further cryptanalysis of a type of RSA variants2023-08-04Paper
Fuzzy authenticated key exchange with tight security2023-07-28Paper
More efficient verifiable functional encryption2023-07-21Paper
Key encapsulation mechanism with tight enhanced security in the multi-user setting: impossibility result and optimal tightness2023-05-12Paper
Simulatable verifiable random function from the LWE assumption2023-04-27Paper
Two-pass authenticated key exchange with explicit authentication and tight security2023-03-21Paper
A New General Method of Searching for Cubes in Cube Attacks2022-12-21Paper
Precise bounded-concurrent zero-knowledge proofs for NP2022-10-28Paper
SymSem: Symbolic Execution with Time Stamps for Deobfuscation2022-10-14Paper
Public-Key Puncturable Encryption: Modular and Compact Constructions2022-10-13Paper
Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting2022-04-22Paper
Tightly CCA-secure inner product functional encryption scheme2021-12-01Paper
New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries2021-11-25Paper
Pseudorandom functions in NC class from the standard LWE assumption2021-11-11Paper
Tightly secure chameleon hash functions in the multi-user setting and their applications2021-06-08Paper
Robustly reusable fuzzy extractor with imperfect randomness2021-05-10Paper
RingCT 3.0 for blockchain confidential transaction: shorter size and stronger security2021-02-08Paper
Pseudorandom functions from LWE: RKA security and application2020-05-27Paper
Tight leakage-resilient CCA-security from quasi-adaptive hash proof system2020-03-09Paper
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman2020-02-07Paper
Strong leakage and tamper-resilient PKE from refined hash proof system2020-01-30Paper
Generic constructions of robustly reusable fuzzy extractor2020-01-28Paper
Structure-preserving public-key encryption with leakage-resilient CCA security2019-10-18Paper
Tightly secure signature schemes from the LWE and subset sum assumptions2019-10-18Paper
A generic construction of tightly secure signatures in the multi-user setting2019-05-29Paper
Beyond-birthday secure domain-preserving PRFs from a single permutation2019-05-24Paper
https://portal.mardi4nfdi.de/entity/Q46456752019-01-10Paper
On the robustness of learning parity with noise2018-10-26Paper
Tightly SIM-SO-CCA secure public key encryption from standard assumptions2018-05-16Paper
A modified fuzzy fingerprint vault based on pair-polar minutiae structures2018-04-20Paper
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness2018-04-06Paper
Evaluation and improvement of generic-emulating DPA attacks2018-02-14Paper
Efficient fuzzy extraction of PUF-induced secrets: theory and applications2018-02-14Paper
Functional graph revisited: updates on (second) preimage attacks on hash combiners2017-11-15Paper
Public key encryption resilient to leakage and tampering attacks2017-09-07Paper
Tightly-secure signatures from the decisional composite residuosity assumption2017-08-25Paper
Learning $$AC^0$$ Under k-Dependent Distributions2017-05-19Paper
Ridge-Based Profiled Differential Power Analysis2017-04-12Paper
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers2017-02-01Paper
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions2016-09-02Paper
Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for Circuits2016-09-02Paper
Differential power analysis of stream ciphers with LFSRs2016-07-06Paper
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond2015-12-10Paper
Automatic Detection and Analysis of Encrypted Messages in Malware2015-12-02Paper
https://portal.mardi4nfdi.de/entity/Q34480092015-10-28Paper
https://portal.mardi4nfdi.de/entity/Q34480102015-10-28Paper
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?2015-07-21Paper
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions2015-07-06Paper
Efficient Leakage-Resilient Identity-Based Encryption with CCA Security2014-02-18Paper
Improved Impossible Differential Attacks on Large-Block Rijndael2013-06-04Paper
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia2013-01-08Paper
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming2013-01-07Paper
On weaknesses of the HDCP authentication and key exchange protocol and its repair2012-08-24Paper
Impossible Differential Attacks on Reduced-Round LBlock2012-06-29Paper
Provably secure three-party password-based authenticated key exchange protocol2012-06-08Paper
Efficient Pairing Computation on Elliptic Curves in Hessian Form2011-10-27Paper
Precise Time and Space Simulatable Zero-Knowledge2011-09-16Paper
On Obfuscating Programs with Tamper-proof Hardware2011-07-29Paper
A Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-Encryption2011-07-01Paper
A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware2011-05-19Paper
HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES2011-01-19Paper
Precise zero-knowledge arguments with poly-logarithmic efficiency2011-01-05Paper
On sequential composition of precise zero-knowledge2011-01-05Paper
https://portal.mardi4nfdi.de/entity/Q30645792010-12-22Paper
Differential-Multiple Linear Cryptanalysis2010-11-23Paper
Fully CCA2 secure identity based broadcast encryption without random oracles2010-08-16Paper
A program understanding approach for stripped binary code2010-03-06Paper
Efficient scalar multiplication for elliptic curves over binary fields2010-02-12Paper
Speeding Up the Double-Base Recoding Algorithm of Scalar Multiplication∗2009-11-16Paper
https://portal.mardi4nfdi.de/entity/Q36414322009-11-11Paper
A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor2009-02-10Paper
Secure Hierarchical Identity Based Encryption Scheme in the Standard Model2009-01-22Paper
https://portal.mardi4nfdi.de/entity/Q35246852008-09-12Paper
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security2008-06-10Paper
Ono invariants of imaginary quadratic fields with class number three2008-02-04Paper
Further analysis of block ciphers against timing attacks2007-06-01Paper
Formalization of fault analysis and a new approach of fault detection2007-05-09Paper
https://portal.mardi4nfdi.de/entity/Q34126302007-01-02Paper
https://portal.mardi4nfdi.de/entity/Q54697122006-05-26Paper
https://portal.mardi4nfdi.de/entity/Q57009962005-11-02Paper
https://portal.mardi4nfdi.de/entity/Q56966582005-10-18Paper
https://portal.mardi4nfdi.de/entity/Q48239852004-10-28Paper
https://portal.mardi4nfdi.de/entity/Q44084332003-06-29Paper

Research outcomes over time

This page was built for person: Dawu Gu