What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yu Yu
Google Scholar
71
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Labeled Private Set Intersection From Distributed Point Function.
Qi Liu
Xiaojie Guo
Kang Yang
Yu Yu
2025
journals/joc
An Efficient ZK Compiler from SIMD Circuits to General Circuits.
Dung Bui
Haotian Chu
Geoffroy Couteau
Xiao Wang
Chenkai Weng
Kang Yang
Yu Yu
2025
journals/joc
Actively Secure Half-Gates with Minimum Overhead under Duplex Networks.
Hongrui Cui
Xiao Wang
Kang Yang
Yu Yu
2025
conf/pkc
Stateless Deterministic Multi-party EdDSA Signatures with Low Communication.
Qi Feng
Kang Yang
Kaiyi Zhang
Xiao Wang
Yu Yu
Xiang Xie
2025
conf/eurocrypt
Tighter Security Notions for a Modular Approach to Private Circuits.
Bohan Wang
Juelin Zhang
Yu Yu
Weijia Wang
2025
conf/eurocrypt
BitGC: Garbled Circuits with 1 Bit per Gate.
Hanlin Liu
Xiao Wang
Kang Yang
Yu Yu
2025
conf/crypto
Authenticated BitGC for Actively Secure Rate-One 2PC.
Hanlin Liu
Xiao Wang
Kang Yang
Yu Yu
2025
conf/uss
DFS: Delegation-friendly zkSNARK and Private Delegation of Provers.
Yuncong Hu
Pratyush Mishra
Xiao Wang
Jie Xie
Kang Yang
Yu Yu
Yuwen Zhang
2024
journals/tches
Efficient Table-Based Masking with Pre-processing.
Juelin Zhang
Taoyun Wang
Yiteng Sun
Fanjie Ji
Bohan Wang
Lu Li
Yu Yu
Weijia Wang
2024
journals/cic
Efficient Maliciously Secure Oblivious Exponentiations.
Carsten Baum
Jens Berlips
Walther Chen
Ivan Bjerre Damgård
Kevin M. Esvelt
Leonard Foner
Dana Gretton
Martin Kysel
Ronald L. Rivest
Lawrence Roy
Francesca Sage-Ling
Adi Shamir
Vinod Vaikuntanathan
Lynn Van Hauwe
Theia Vogel
Benjamin Weinstein-Raun
Daniel Wichs
Stephen Wooster
Andrew C. Yao
Yu Yu
2024
conf/uss
Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting.
Fengrun Liu
Xiang Xie
Yu Yu
2024
conf/uss
Lightweight Authentication of Web Data via Garble-Then-Prove.
Xiang Xie
Kang Yang
Xiao Wang
Yu Yu
2024
conf/sp
Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage.
Wenhao Zhang
Xiaojie Guo
Kang Yang
Ruiyu Zhu
Yu Yu
Xiao Wang
2024
conf/pkc
sfReSolveD: Shorter Signatures from Regular Syndrome Decoding and VOLE-in-the-Head.
Hongrui Cui
Hanlin Liu
Di Yan
Kang Yang
Yu Yu
Kaiyi Zhang
2024
conf/eurocrypt
The Hardness of LPN over Any Integer Ring and Field for PCG Applications.
Hanlin Liu
Xiao Wang
Kang Yang
Yu Yu
2023
journals/tches
Efficient Private Circuits with Precomputation.
Weijia Wang
Fanjie Ji
Juelin Zhang
Yu Yu
2023
conf/uss
Medusa Attack: Exploring Security Hazards of In-App QR Code Scanning.
Xing Han
Yuheng Zhang
Xue Zhang
Zeyuan Chen
Mingzhe Wang
Yiwei Zhang
Siqi Ma
Yu Yu
Elisa Bertino
Juanru Li
2023
conf/crypto
Revisiting the Constant-Sum Winternitz One-Time Signature with Applications to SPHINCS<sup>+</sup> and XMSS.
Kaiyi Zhang
Hongrui Cui
Yu Yu
2023
conf/sp
Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning.
Lijing Zhou
Ziyu Wang
Hongrui Cui
Qingrui Song
Yu Yu
2023
conf/eurocrypt
Actively Secure Half-Gates with Minimum Overhead Under Duplex Networks.
Hongrui Cui
Xiao Wang
Kang Yang
Yu Yu
2023
conf/asiacrypt
Algebraic Attacks on Round-Reduced Rain and Full AIM-III.
Kaiyi Zhang
Qingju Wang
Yu Yu
Chun Guo
Hongrui Cui
2023
conf/tcc
Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations.
Liqing Yu
Yusai Wu
Yu Yu
Zhenfu Cao
Xiaolei Dong
2022
journals/tches
Side-Channel Masking with Common Shares.
Weijia Wang
Chun Guo
Yu Yu
Fanjie Ji
Yang Su
2022
conf/icics
Maliciously Secure Multi-party PSI with Lower Bandwidth and Faster Computation.
Zhi Qiu
Kang Yang
Yu Yu
Lijing Zhou
2022
conf/eurocrypt
Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs.
Li Yao
Yilei Chen
Yu Yu
2022
conf/asiacrypt
A Non-heuristic Approach to Time-Space Tradeoffs and Optimizations for BKW.
Hanlin Liu
Yu Yu
2022
conf/asiacrypt
A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding.
Yuanyuan Zhou
Joop van de Pol
Yu Yu
François-Xavier Standaert
2021
journals/tches
Learning Parity with Physical Noise: Imperfections, Reductions and FPGA Prototype.
Davide Bellizia
Clément Hoffmann
Dina Kamel
Hanlin Liu
Pierrick Méaux
François-Xavier Standaert
Yu Yu
2021
journals/tosc
Provable Security of SP Networks with Partial Non-Linear Layers.
Chun Guo
François-Xavier Standaert
Weijia Wang
Xiao Wang
Yu Yu
2021
conf/crypto
Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact.
Hanlin Liu
Yu Yu
Shuoyao Zhao
Jiang Zhang
Wenling Liu
Zhenkai Hu
2021
conf/crypto
Smoothing Out Binary Linear Codes and Worst-Case Sub-exponential Hardness for LPN.
Yu Yu
Jiang Zhang
2021
conf/esorics
MPC-in-Multi-Heads: A Multi-Prover Zero-Knowledge Proof System - (or: How to Jointly Prove Any NP Statements in ZK).
Hongrui Cui
Kaiyi Zhang
Yu Chen
Zhen Liu
Yu Yu
2020
conf/ccs
LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction.
Rui Wen
Yu Yu
Xiang Xie
Yang Zhang
2020
conf/crypto
Better Concrete Security for Half-Gates Garbling (in the Multi-instance Setting).
Chun Guo
Jonathan Katz
Xiao Wang
Chenkai Weng
Yu Yu
2020
conf/sp
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers.
Chun Guo
Jonathan Katz
Xiao Wang
Yu Yu
2020
conf/esorics
A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
Wenling Liu
Zhen Liu
Khoa Nguyen
Guomin Yang
Yu Yu
2020
conf/pkc
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes.
Jiang Zhang
Yu Yu
Shuqin Fan
Zhenfeng Zhang
Kang Yang
2020
conf/asiacrypt
Packed Multiplication: How to Amortize the Cost of Side-Channel Masking?
Weijia Wang
Chun Guo
François-Xavier Standaert
Yu Yu
Gaëtan Cassiers
2019
journals/tosc
Efficient Side-Channel Secure Message Authentication with Better Bounds.
Chun Guo
François-Xavier Standaert
Weijia Wang
Yu Yu
2019
journals/tifs
Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations.
Weijia Wang
Yu Yu
François-Xavier Standaert
2019
conf/acns
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System.
Shifeng Sun
Dawu Gu
Man Ho Au
Shuai Han
Yu Yu
Joseph K. Liu
2019
conf/asiacrypt
Valiant's Universal Circuits Revisited: An Overall Improvement and a Lower Bound.
Shuoyao Zhao
Yu Yu
Jiang Zhang
Hanlin Liu
2019
conf/asiacrypt
Collision Resistant Hashing from Sub-exponential Learning Parity with Noise.
Yu Yu
Jiang Zhang
Jian Weng
Chun Guo
Xiangxue Li
2018
journals/tifs
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips.
Weijia Wang
Yu Yu
François-Xavier Standaert
Junrong Liu
Zheng Guo
Dawu Gu
2018
conf/provsec
On the Hardness of Learning Parity with Noise over Rings.
Shuoyao Zhao
Yu Yu
Jiang Zhang
2018
conf/wisec
Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning.
Changyu Li
Quanpu Cai
Juanru Li
Hui Liu
Yuanyuan Zhang
Dawu Gu
Yu Yu
2017
conf/provsec
On the Hardness of Sparsely Learning Parity with Noise.
Hanlin Liu
Di Yan
Yu Yu
Shuoyao Zhao
2017
conf/ctrsa
Ridge-Based Profiled Differential Power Analysis.
Weijia Wang
Yu Yu
François-Xavier Standaert
Dawu Gu
Sen Xu
Chi Zhang
2017
conf/asiacrypt
Two-Round PAKE from Approximate SPH and Instantiations from Lattices.
Jiang Zhang
Yu Yu
2016
conf/acisp
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations.
Yujuan Sun
Yu Yu
Xiangxue Li
Kai Zhang
Haifeng Qian
Yuan Zhou
2016
conf/acisp
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions.
Shifeng Sun
Udaya Parampalli
Tsz Hon Yuen
Yu Yu
Dawu Gu
2016
conf/crypto
Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN.
Yu Yu
Jiang Zhang
2016
conf/icics
On the Robustness of Learning Parity with Noise.
Nan Yao
Yu Yu
Xiangxue Li
Dawu Gu
2016
conf/eurocrypt
Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN.
Yu Yu
John P. Steinberger
2015
conf/crypto
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond.
Yu Yu
Dawu Gu
Xiangxue Li
Jian Weng
2015
conf/esorics
Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards.
Junrong Liu
Yu Yu
François-Xavier Standaert
Zheng Guo
Dawu Gu
Wei Sun
Yijie Ge
Xinjun Xie
2015
conf/ches
Evaluation and Improvement of Generic-Emulating DPA Attacks.
Weijia Wang
Yu Yu
Junrong Liu
Zheng Guo
François-Xavier Standaert
Dawu Gu
Sen Xu
Rong Fu
2015
conf/tcc
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions.
Yu Yu
Dawu Gu
Xiangxue Li
Jian Weng
2014
conf/ccs
POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results.
Xiangxue Li
Yu Yu
Qiang Li
Haifeng Qian
Yuan Zhou
Jian Weng
2014
conf/ccs
POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords.
Xiangxue Li
Yu Yu
Qiang Li
Haifeng Qian
Yuan Zhou
Jian Weng
2013
conf/crypto
Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions.
François-Xavier Standaert
Olivier Pereira
Yu Yu
2013
conf/fc
On the Need of Physical Security for Small Embedded Devices: A Case Study with COMP128-1 Implementations in SIM Cards.
Yuanyuan Zhou
Yu Yu
François-Xavier Standaert
Jean-Jacques Quisquater
2013
conf/acns
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.
Xiangxue Li
Haifeng Qian
Yu Yu
Yuan Zhou
Jian Weng
2013
conf/icics
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model.
Xiangxue Li
Haifeng Qian
Yu Yu
Jian Weng
Yuan Zhou
2013
conf/ctrsa
Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness.
Yu Yu
François-Xavier Standaert
2013
conf/asiacrypt
Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters.
Yu Yu
Xiangxue Li
Jian Weng
2013
conf/tcc
Overcoming Weak Expectations.
Yevgeniy Dodis
Yu Yu
2011
conf/crypto
Leftover Hash Lemma, Revisited.
Boaz Barak
Yevgeniy Dodis
Hugo Krawczyk
Olivier Pereira
Krzysztof Pietrzak
François-Xavier Standaert
Yu Yu
2010
conf/ccs
Practical leakage-resilient pseudorandom generators.
Yu Yu
François-Xavier Standaert
Olivier Pereira
Moti Yung
2007
conf/ccs
Private stateful circuits secure against probing attacks.
Yu Yu
Jussipekka Leiwo
A. Benjamin Premkumar
2006
conf/acisp
Hiding Circuit Topology from Unbounded Reverse Engineers.
Yu Yu
Jussipekka Leiwo
A. Benjamin Premkumar
Coauthors
A. Benjamin Premkumar
(2)
Adi Shamir
(1)
Andrew C. Yao
(1)
Benjamin Weinstein-Raun
(1)
Boaz Barak
(1)
Bohan Wang
(2)
Carsten Baum
(1)
Changyu Li
(1)
Chenkai Weng
(2)
Chi Zhang
(1)
Chun Guo
(8)
Clément Hoffmann
(1)
Dana Gretton
(1)
Daniel Wichs
(1)
Davide Bellizia
(1)
Dawu Gu
(10)
Di Yan
(2)
Dina Kamel
(1)
Dung Bui
(1)
Elisa Bertino
(1)
Fanjie Ji
(3)
Fengrun Liu
(1)
Francesca Sage-Ling
(1)
François-Xavier Standaert
(15)
Gaëtan Cassiers
(1)
Geoffroy Couteau
(1)
Guomin Yang
(1)
Haifeng Qian
(5)
Hanlin Liu
(9)
Haotian Chu
(1)
Hongrui Cui
(7)
Hugo Krawczyk
(1)
Hui Liu
(1)
Ivan Bjerre Damgård
(1)
Jean-Jacques Quisquater
(1)
Jens Berlips
(1)
Jian Weng
(8)
Jiang Zhang
(8)
Jie Xie
(1)
John P. Steinberger
(1)
Jonathan Katz
(2)
Joop van de Pol
(1)
Joseph K. Liu
(1)
Juanru Li
(2)
Juelin Zhang
(3)
Junrong Liu
(3)
Jussipekka Leiwo
(2)
Kai Zhang
(1)
Kaiyi Zhang
(5)
Kang Yang
(14)
Kevin M. Esvelt
(1)
Khoa Nguyen
(1)
Krzysztof Pietrzak
(1)
Lawrence Roy
(1)
Leonard Foner
(1)
Li Yao
(1)
Lijing Zhou
(2)
Liqing Yu
(1)
Lu Li
(1)
Lynn Van Hauwe
(1)
Man Ho Au
(1)
Martin Kysel
(1)
Mingzhe Wang
(1)
Moti Yung
(1)
Nan Yao
(1)
Olivier Pereira
(3)
Pierrick Méaux
(1)
Pratyush Mishra
(1)
Qi Feng
(1)
Qi Liu
(1)
Qiang Li
(2)
Qingju Wang
(1)
Qingrui Song
(1)
Quanpu Cai
(1)
Ronald L. Rivest
(1)
Rong Fu
(1)
Rui Wen
(1)
Ruiyu Zhu
(1)
Sen Xu
(2)
Shifeng Sun
(2)
Shuai Han
(1)
Shuoyao Zhao
(4)
Shuqin Fan
(1)
Siqi Ma
(1)
Stephen Wooster
(1)
Taoyun Wang
(1)
Theia Vogel
(1)
Tsz Hon Yuen
(1)
Udaya Parampalli
(1)
Vinod Vaikuntanathan
(1)
Walther Chen
(1)
Wei Sun
(1)
Weijia Wang
(11)
Wenhao Zhang
(1)
Wenling Liu
(2)
Xiang Xie
(4)
Xiangxue Li
(10)
Xiao Wang
(13)
Xiaojie Guo
(2)
Xiaolei Dong
(1)
Xing Han
(1)
Xinjun Xie
(1)
Xue Zhang
(1)
Yang Su
(1)
Yang Zhang
(1)
Yevgeniy Dodis
(2)
Yijie Ge
(1)
Yilei Chen
(1)
Yiteng Sun
(1)
Yiwei Zhang
(1)
Yu Chen
(1)
Yu Yu
(71)
Yuan Zhou
(5)
Yuanyuan Zhang
(1)
Yuanyuan Zhou
(2)
Yuheng Zhang
(1)
Yujuan Sun
(1)
Yuncong Hu
(1)
Yusai Wu
(1)
Yuwen Zhang
(1)
Zeyuan Chen
(1)
Zhen Liu
(2)
Zhenfeng Zhang
(1)
Zhenfu Cao
(1)
Zheng Guo
(3)
Zhenkai Hu
(1)
Zhi Qiu
(1)
Ziyu Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to