Yu Yu

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
An efficient ZK compiler from SIMD circuits to general circuits
Journal of Cryptology
2024-12-27Paper
The hardness of LPN over any integer ring and field for PCG applications
 
2024-11-13Paper
\textsf{ReSolveD}: shorter signatures from regular syndrome decoding and VOLE-in-the-head
 
2024-11-12Paper
Algebraic attacks on round-reduced \textsc{Rain} and full \textsf{AIM-III}
 
2024-08-30Paper
Security proofs for key-alternating ciphers with non-independent round permutations
 
2024-08-01Paper
Embedding best-worst method into data envelopment analysis
Asia-Pacific Journal of Operational Research
2024-06-25Paper
Revisiting the constant-sum Winternitz one-time signature with applications to SPHINCS\textsuperscript{+} and XMSS
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Actively secure half-gates with minimum overhead under duplex networks
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
A non-heuristic approach to time-space tradeoffs and optimizations for BKW
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
A third is all you need: extended partial key exposure attack on CRT-RSA with additive exponent blinding
Advances in Cryptology – ASIACRYPT 2022
2023-08-21Paper
Packed multiplication: how to amortize the cost of side-channel masking?
 
2023-03-21Paper
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key
1511.9413
2022-12-22Paper
Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation
 
2022-12-09Paper
Cryptanalysis of candidate obfuscators for affine determinant programs
 
2022-08-30Paper
The stability of a dynamic duopoly Cournot-Bertrand game model
Journal of Computational and Applied Mathematics
2022-06-16Paper
Pushing the limits of Valiant's universal circuits: simpler, tighter and more compact
 
2022-04-22Paper
Smoothing out binary linear codes and worst-case sub-exponential hardness for LPN
 
2022-04-22Paper
Tweaking the asymmetry of asymmetric-key cryptography on lattices: KEMs and signatures of smaller sizes
 
2021-12-01Paper
An improved algorithm for learning sparse parities in the presence of noise
Theoretical Computer Science
2021-06-22Paper
The stability and duality of dynamic Cournot and Bertrand duopoly model with comprehensive preference
Applied Mathematics and Computation
2021-04-20Paper
The stability of Bayesian Nash equilibrium of dynamic Cournot duopoly model with asymmetric information
Communications in Nonlinear Science and Numerical Simulation
2020-10-23Paper
Complex dynamical behaviors of a mixed duopoly game based on intellectual property rights protection
Complexity
2020-10-21Paper
The dynamic rent-seeking games with policymaker cost and competition intensity
Discrete Dynamics in Nature and Society
2020-10-14Paper
Valiant's universal circuits revisited: an overall improvement and a lower bound
 
2020-05-20Paper
Collision resistant hashing from sub-exponential learning parity with noise
 
2020-05-05Paper
Strong leakage and tamper-resilient PKE from refined hash proof system
 
2020-01-30Paper
Robust sampled-data observer design for Lipschitz nonlinear systems.
Kybernetika
2018-11-29Paper
Secure outsourcing of cryptographic circuits
 
2018-11-07Paper
On the hardness of sparsely learning parity with noise
 
2018-11-07Paper
On the robustness of learning parity with noise
 
2018-10-26Paper
Data envelopment analysis cross-like efficiency model for non-homogeneous decision-making units: the case of United States companies' low-carbon investment to attain corporate sustainability
European Journal of Operational Research
2018-04-23Paper
Two-round PAKE from approximate SPH and instantiations from lattices
 
2018-02-23Paper
Evaluation and improvement of generic-emulating DPA attacks
 
2018-02-14Paper
Public key encryption resilient to leakage and tampering attacks
Journal of Computer and System Sciences
2017-09-07Paper
Ridge-based profiled differential power analysis
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
Solving stochastic ship fleet routing problems with inventory management using branch and price
Advances in Stochastic and Deterministic Global Optimization
2017-02-03Paper
scientific article; zbMATH DE number 6672572 (Why is no real title available?)
 
2017-01-06Paper
Cryptography with auxiliary input and trapdoor from constant-noise LPN
Advances in Cryptology – CRYPTO 2016
2016-11-30Paper
Efficient completely non-malleable and RKA secure public key encryptions
Information Security and Privacy
2016-09-02Paper
Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations
Information Security and Privacy
2016-08-31Paper
Pseudorandom functions in almost constant depth from low-noise LPN
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
(Almost) optimal constructions of UOWHFs from 1-to-1, regular one-way functions and beyond
Lecture Notes in Computer Science
2015-12-10Paper
The randomized iterate, revisited -- almost linear seed length PRGs from a broader class of one-way functions
Theory of Cryptography
2015-07-06Paper
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model
Mathematical and Computer Modelling
2015-02-19Paper
Pseudorandom generators from regular one-way functions: new constructions with improved parameters
Theoretical Computer Science
2015-01-28Paper
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model
Information and Communications Security
2014-09-29Paper
Balanced \(2p\)-variable rotation symmetric Boolean functions with optimal algebraic immunity, good nonlinearity, and good algebraic degree
Journal of Mathematical Analysis and Applications
2014-01-28Paper
Constructing practical signcryption KEM from standard assumptions without random oracles
Applied Cryptography and Network Security
2014-01-24Paper
Pseudorandom generators from regular one-way functions: new constructions with improved parameters
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Leakage-resilient symmetric cryptography under empirically verifiable assumptions
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Overcoming weak expectations
Theory of Cryptography
2013-03-18Paper
Practical leakage-resilient pseudorandom objects with minimum public randomness
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Leftover Hash Lemma, Revisited
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
scientific article; zbMATH DE number 5722935 (Why is no real title available?)
 
2010-06-17Paper
scientific article; zbMATH DE number 5671085 (Why is no real title available?)
 
2010-02-12Paper
Ringel-Hall algebra of \(A^\infty_\infty\)-type
 
2009-11-11Paper
Hiding Circuit Topology from Unbounded Reverse Engineers
Information Security and Privacy
2007-09-07Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper


Research outcomes over time


This page was built for person: Yu Yu