Yupu Hu

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Towards compact identity-based encryption on ideal lattices2024-11-12Paper
On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local Revocation2024-03-14Paper
Simplified server-aided revocable identity-based encryption from lattices
Provable and Practical Security
2023-07-21Paper
Improved key-recovery attacks on reduced-round WEM-8
Designs, Codes and Cryptography
2022-09-22Paper
Lattice-based linearly homomorphic signature scheme over binary field
Science China Information Sciences
2021-12-15Paper
Accountable identity-based encryption with distributed private key generators
Information Sciences
2021-03-16Paper
D-NTRU: more efficient and average-case IND-CPA secure NTRU variant
Information Sciences
2020-09-08Paper
Lattice-based group signatures with verifier-local revocation: achieving shorter key-sizes and explicit traceability with ease
Cryptology and Network Security
2020-07-20Paper
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts
Theoretical Computer Science
2020-01-29Paper
Algebraic attacks against several weak variants of GVW'13 ABE
International Journal of Foundations of Computer Science
2019-12-10Paper
Signature scheme using the root extraction problem on quaternions
Journal of Applied Mathematics
2019-11-19Paper
A new Gaussian sampling for trapdoor lattices with arbitrary modulus
Designs, Codes and Cryptography
2019-10-17Paper
Lattice-based certificateless encryption scheme
Frontiers of Computer Science
2018-12-19Paper
Sieve method for polynomial linear equivalence
Journal of Applied Mathematics
2018-10-10Paper
Identity-based blind signature from lattices
Wuhan University Journal of Natural Sciences
2018-05-25Paper
Cryptanalysis of multilinear maps from ideal lattices: revisited
Designs, Codes and Cryptography
2017-09-28Paper
A New Correlation Attack on Nonlinear Combining Generators
IEEE Transactions on Information Theory
2017-07-12Paper
Guess and Determine Attacks on Filter Generators—Revisited
IEEE Transactions on Information Theory
2017-07-12Paper
Identity-based blind signature from lattices in standard model
Information Security and Cryptology
2017-05-05Paper
The termination of the F5 algorithm revisited
Proceedings of the 38th International Symposium on Symbolic and Algebraic Computation
2017-02-10Paper
Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions
Information Sciences
2017-02-07Paper
New secondary constructions of bent functions
Applicable Algebra in Engineering, Communication and Computing
2017-01-13Paper
Efficient quantum dialogue using entangled states and entanglement swapping without information leakage
Quantum Information Processing
2016-10-27Paper
Cryptanalysis of GGH map
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Gaussian sampling of lattices for cryptographic applications
Science China Information Sciences
2015-11-20Paper
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model
Frontiers of Computer Science
2015-11-20Paper
Unbounded hierarchical identity-based encryption in the standard model2015-10-28Paper
scientific article; zbMATH DE number 6499820 (Why is no real title available?)2015-10-28Paper
Constructions of cryptographically significant Boolean permutations2015-09-11Paper
Post-quantum secure hybrid signcryption from lattice assumption2015-09-11Paper
Hard fault analysis of Trivium
Information Sciences
2014-08-01Paper
Chosen ciphertext secure identity-based broadcast encryption in the standard model
Journal of Shanghai Jiaotong University (Science)
2014-03-27Paper
An efficient and strongly unforgeable short signature scheme in standard model2014-02-28Paper
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions
Frontiers of Computer Science in China
2013-07-04Paper
Distinguishing attack on the stream cipher Sosemanuk2013-01-24Paper
New constructions of balanced Boolean functions with high nonlinearity and optimal algebraic degree
International Journal of Computer Mathematics
2013-01-22Paper
Secondary constructions of bent functions and their enforcement
Advances in Mathematics of Communications
2012-11-12Paper
On the value distributions of Walsh spectrums of quadratic plateaued functions
Computers and Electrical Engineering
2012-10-25Paper
Linear spans of optimal sets of frequency hopping sequences
RAIRO. Theoretical Informatics and Applications
2012-08-27Paper
Linear spans of optimal sets of frequency hopping sequences
RAIRO. Theoretical Informatics and Applications
2012-08-27Paper
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups
Mathematical and Computer Modelling
2012-08-24Paper
Fault analysis of Trivium
Designs, Codes and Cryptography
2012-03-01Paper
The Termination of Algorithms for Computing Gr\"{o}bner Bases2012-02-16Paper
scientific article; zbMATH DE number 6001368 (Why is no real title available?)2012-01-27Paper
scientific article; zbMATH DE number 6001304 (Why is no real title available?)2012-01-27Paper
Resilient Boolean functions with high algebraic immunity2012-01-27Paper
Algebraic attack on Boolean functions2012-01-27Paper
Identity-based broadcast encryption with shorter transmissions
Journal of Shanghai Jiaotong University (Science)
2012-01-01Paper
scientific article; zbMATH DE number 5973815 (Why is no real title available?)2011-11-17Paper
Lower bounds on the second order nonlinearity of Boolean functions
International Journal of Foundations of Computer Science
2011-10-10Paper
Autocorrelation coefficients of two classes of semi-bent functions2011-09-15Paper
Weak generalized self-shrinking generators
Journal of Systems Engineering and Electronics
2011-08-25Paper
Lower bounds on the second-order nonlinearity of cubic monomial Boolean functions2011-07-19Paper
Meet-in-the-middle attack on 8 rounds of the AES block cipher under 192 key bits
Information Security Practice and Experience
2011-05-19Paper
Quadratic compact knapsack public-key cryptosystem
Computers & Mathematics with Applications
2010-06-28Paper
New related-key rectangle attacks on reduced AES-192 and AES-256
Science in China. Series F
2010-02-26Paper
On the memory space of shrinking type sequence generators2010-02-12Paper
Node matrix representation of braid group.2010-02-12Paper
Certificateless signcryption scheme in the standard model
Information Sciences
2010-01-28Paper
Analysis and improvement of a research scheme of NTRU decryption failure2009-07-22Paper
A fast and secure elliptic curve scalar multiplication algorithm based on special addition chains2009-07-22Paper
New Construction of Short Hierarchical ID-Based Signature in the Standard Model
Fundamenta Informaticae
2009-05-22Paper
On the Computational Efficiency of XTR+
Information Security and Cryptology
2009-04-29Paper
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks
Applied Cryptography and Network Security
2009-03-10Paper
ID-based threshold proxy signcryption scheme from bilinear pairings
International Journal of Security and Networks
2009-02-24Paper
NTRUSign With a New Perturbation
IEEE Transactions on Information Theory
2009-02-24Paper
Secure Proxy Multi-signature Scheme in the Standard Model
Provable Security
2009-01-27Paper
Resilient functions over finite fields
IEEE Transactions on Information Theory
2008-12-21Paper
Generalized Self-Shrinking Generator
IEEE Transactions on Information Theory
2008-12-21Paper
Computing the k-Error N-Adic Complexity of a Sequence of Period p n
Sequences and Their Applications – SETA 2006
2008-11-27Paper
Fast S-box security mechanism research based on the polymorphic cipher
Information Sciences
2008-03-12Paper
Security analysis of the Pomykala-Barabasz scheme2008-01-02Paper
Impossible differential cryptanalysis of advanced encryption standard
Science in China. Series F
2007-10-12Paper
A knapsack-based probabilistic encryption scheme
Information Sciences
2007-10-10Paper
An efficient method against side-channel attacks on ECC
Wuhan University Journal of Natural Sciences
2007-06-01Paper
Fault attack on the balanced shrinking generator
Wuhan University Journal of Natural Sciences
2007-06-01Paper
New weak keys in RSA
Wuhan University Journal of Natural Sciences
2007-06-01Paper
A new method for impossible differential cryptanalysis of 8-round advanced encryption standard
Wuhan University Journal of Natural Sciences
2007-06-01Paper
Improvement of identity-based threshold proxy signature scheme with known signers
Wuhan University Journal of Natural Sciences
2007-06-01Paper
Pseudo-randomness of the fourth class of GSS sequences
Science in China. Series F
2007-02-20Paper
Stream cipher based on GSS sequences
Science in China. Series F
2007-02-20Paper
Key management using certificate-based cryptosystem in ad hoc networks
Journal of Shanghai Jiaotong University (Science)
2006-11-15Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
A new method for constructing high order resilient functions2006-10-04Paper
Partition of a set and transitive closure2006-03-13Paper
scientific article; zbMATH DE number 465328 (Why is no real title available?)1994-04-26Paper


Research outcomes over time


This page was built for person: Yupu Hu