What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Siu-Ming Yiu
Google Scholar
66
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Efficient and Secure Post-Quantum Certificateless Signcryption With Linkability for IoMT.
Shiyuan Xu
Xue Chen
Yu Guo
Siu-Ming Yiu
Shang Gao
Bin Xiao
2025
journals/tifs
From Σ-Protocol-Based Signatures to Ring Signatures: General Construction and Applications.
Xue Chen
Shang Gao
Shiyuan Xu
Liquan Chen
Siu-Ming Yiu
Bin Xiao
2025
conf/sp
Highly Efficient Actively Secure Two-Party Computation with One-Bit Advantage Bound.
Yi Liu
Junzuo Lai
Peng Yang
Qi Wang
Anjia Yang
Siu-Ming Yiu
Jian Weng
2025
conf/sp
Reliable KMDF Instruction Set Generation for User Queries Based on Endogenous Generative LLMs.
Yuer Yang
Yifeng Lin
Siu-Ming Yiu
2025
conf/sp
Opera: Achieving Secure and High-Performance OLAP with Parallelized Homomorphic Comparisons.
Qi Hu
Wei Chen
Tianxiang Shen
Xin Yao
Nicholas Zhang
Heming Cui
Siu-Ming Yiu
2025
conf/asiaccs
Efficient Private Set Intersection by Utilizing Oblivious Transfer Extension.
Mingli Wu
Tsz Hon Yuen
Siu-Ming Yiu
2024
journals/cic
Exponent-Inversion P-Signatures and Accountable Identity-Based Encryption from SXDH.
Tsz Hon Yuen
Sherman S. M. Chow
Huangting Wu
Cong Zhang
Siu-Ming Yiu
2024
journals/tifs
FS-LLRS: Lattice-Based Linkable Ring Signature With Forward Security for Cloud-Assisted Electronic Medical Records.
Xue Chen
Shiyuan Xu
Shang Gao
Yu Guo
Siu-Ming Yiu
Bin Xiao
2024
conf/ccs
Direct Range Proofs for Paillier Cryptosystem and Their Applications.
Zhikang Xie
Mengling Liu
Haiyang Xue
Man Ho Au
Robert H. Deng
Siu-Ming Yiu
2024
conf/provsec
Communication-Efficient Secure Neural Network via Key-Reduced Distributed Comparison Function.
Peng Yang
Zoe Lin Jiang
Shiqi Gao
Hongxiao Wang
Jun Zhou
Yangyiye Jin
Siu-Ming Yiu
Junbin Fang
2024
conf/esorics
FSSiBNN: FSS-Based Secure Binarized Neural Network Inference with Free Bitwidth Conversion.
Peng Yang
Zoe Lin Jiang
Jiehang Zhuang
Junbin Fang
Siu-Ming Yiu
Xuan Wang
2024
conf/asiaccs
zkMatrix: Batched Short Proof for Committed Matrix Multiplication.
Mingshu Cong
Tsz Hon Yuen
Siu-Ming Yiu
2024
conf/pkc
Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice.
Hongxiao Wang
Siu-Ming Yiu
Yanmin Zhao
Zoe Lin Jiang
2023
journals/tifs
Online/Offline and History Indexing Identity-Based Fuzzy Message Detection.
Zhiwei Wang
Feng Liu
Siu-Ming Yiu
Longwen Lan
2022
conf/esorics
Towards Practical Homomorphic Time-Lock Puzzles: Applicability and Verifiability.
Yi Liu
Qi Wang
Siu-Ming Yiu
2022
conf/asiaccs
Tight Leakage-Resilient Identity-based Encryption under Multi-challenge Setting.
Cailing Cai
Xianrui Qin
Tsz Hon Yuen
Siu-Ming Yiu
2022
conf/pkc
Making Private Function Evaluation Safer, Faster, and Simpler.
Yi Liu
Qi Wang
Siu-Ming Yiu
2021
conf/acisp
Forced Independent Optimized Implementation of 4-Bit S-Box.
Yanhong Fan
Weijia Wang
Zhihu Li
Zhenyu Lu
Siu-Ming Yiu
Meiqin Wang
2021
conf/acns
Blind Polynomial Evaluation and Data Trading.
Yi Liu
Qi Wang
Siu-Ming Yiu
2021
conf/csr2
Defending Against Model Inversion Attack by Adversarial Examples.
Jing Wen
Siu-Ming Yiu
Lucas C. K. Hui
2021
conf/sacrypt
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES.
Chao Niu
Muzhou Li
Meiqin Wang
Qingju Wang
Siu-Ming Yiu
2020
journals/compsec
Coarse-to-fine two-stage semantic video carving approach in digital forensics.
Junbin Fang
Guikai Xi
Rong Li
Qian Chen
Puxi Lin
Sijin Li
Zoe Lin Jiang
Siu-Ming Yiu
2020
conf/wisa
Detection on GPS Spoofing in Location Based Mobile Games.
Shing Ki Wong
Siu-Ming Yiu
2020
conf/icics
Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model.
Linru Zhang
Xiangning Wang
Yuechen Chen
Siu-Ming Yiu
2019
conf/wisa
A Secure and Self-tallying E-voting System Based on Blockchain.
Gongxian Zeng
Meiqi He
Siu-Ming Yiu
2018
conf/sp
File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics.
Qian Chen
Qing Liao
Zoe Lin Jiang
Junbin Fang
Siu-Ming Yiu
Guikai Xi
Rong Li
Zhengzhong Yi
Xuan Wang
Lucas C. K. Hui
Dong Liu
En Zhang
2018
conf/icisc
A New Privacy-Preserving Searching Model on Blockchain.
Meiqi He
Gongxian Zeng
Jun Zhang
Linru Zhang
Yuechen Chen
Siu-Ming Yiu
2018
conf/dsn
DCN: Detector-Corrector Network Against Evasion Attacks on Deep Neural Networks.
Jing Wen
Lucas C. K. Hui
Siu-Ming Yiu
Ruoqing Zhang
2017
conf/ccs
Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM.
Jun Zhang
Xin Wang
Siu-Ming Yiu
Zoe Lin Jiang
Jin Li
2017
conf/acisp
Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency.
Puwen Wei
Wei Wang
Bingxin Zhu
Siu-Ming Yiu
2017
conf/cns
Detecting anomalous behavior of PLC using semi-supervised machine learning.
Ken Yau
Kam-Pui Chow
Siu-Ming Yiu
Chun-Fai Chan
2017
conf/icics
Privacy-Preserving Disease Risk Test Based on Bloom Filters.
Jun Zhang
Linru Zhang
Meiqi He
Siu-Ming Yiu
2016
conf/ccs
Generic Construction of Publicly Verifiable Predicate Encryption.
Chuting Tan
Zoe Lin Jiang
Xuan Wang
Siu-Ming Yiu
Jun-bin Fang
Jin Li
Yabin Jin
Jiajun Huang
2016
conf/acisp
A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids.
Jingxuan Wang
Lucas Chi Kwong Hui
Siu-Ming Yiu
Xingmin Cui
Eric Ke Wang
Jun-bin Fang
2016
conf/cns
Dynamic Proofs of Retrievability with improved worst case overhead.
Xiaoqi Yu
Nairen Cao
Jun Zhang
Siu-Ming Yiu
2016
conf/wisa
LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation).
Xiaoqi Yu
Nairen Cao
Gongxian Zeng
Ruoqing Zhang
Siu-Ming Yiu
2015
conf/ccs
Related Randomness Attacks for Public Key Cryptosystems.
Tsz Hon Yuen
Cong Zhang
Sherman S. M. Chow
Siu-Ming Yiu
2015
conf/provsec
Attribute-Based Encryption Resilient to Auxiliary Input.
Zhiwei Wang
Siu-Ming Yiu
2015
conf/icics
An ORAM Scheme with Improved Worst-Case Computational Overhead.
Nairen Cao
Xiaoqi Yu
Yufang Yang
Linru Zhang
Siu-Ming Yiu
2015
conf/wisec
WeChecker: efficient and precise detection of privilege escalation vulnerabilities in Android apps.
Xingmin Cui
Jingxuan Wang
Lucas Chi Kwong Hui
Zhongwei Xie
Tian Zeng
Siu-Ming Yiu
2014
conf/acisp
CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android.
Xingmin Cui
Da Yu
Patrick P. F. Chan
Lucas Chi Kwong Hui
Siu-Ming Yiu
Sihan Qing
2014
conf/esorics
Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks.
Tsz Hon Yuen
Ye Zhang
Siu-Ming Yiu
Joseph K. Liu
2014
conf/icics
Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator.
Yuechen Chen
Zoe Lin Jiang
Siu-Ming Yiu
Joseph K. Liu
Man Ho Au
Xuan Wang
2013
journals/tifs
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
Zoe Lin Jiang
Jun-bin Fang
Frank Y. W. Law
Pierre K. Y. Lai
Ricci S. C. Ieong
Michael Y. K. Kwan
Kam-Pui Chow
Lucas Chi Kwong Hui
Siu-Ming Yiu
Kevin K. H. Pun
2013
journals/tifs
Heap Graph Based Software Theft Detection.
Patrick P. F. Chan
Lucas Chi Kwong Hui
Siu-Ming Yiu
2013
conf/ccs
Multi-key leakage-resilient threshold cryptography.
Cong Zhang
Tsz Hon Yuen
Hao Xiong
Sherman S. M. Chow
Siu-Ming Yiu
Yi Jun He
2013
conf/ccs
Leakage-resilient certificateless public key encryption.
Hao Xiong
Tsz Hon Yuen
Cong Zhang
Siu-Ming Yiu
Yi Jun He
2012
conf/acisp
Fully Leakage-Resilient Signatures with Auxiliary Inputs.
Tsz Hon Yuen
Siu-Ming Yiu
Lucas Chi Kwong Hui
2012
conf/acns
SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment.
Sherman S. M. Chow
Yi Jun He
Lucas Chi Kwong Hui
Siu-Ming Yiu
2012
conf/esorics
PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation.
Kin Ying Yu
Tsz Hon Yuen
Sherman S. M. Chow
Siu-Ming Yiu
Lucas Chi Kwong Hui
2012
conf/icics
Acceleration of Composite Order Bilinear Pairing on Graphics Hardware.
Ye Zhang
Chun Jason Xue
Duncan S. Wong
Nikos Mamoulis
Siu-Ming Yiu
2012
conf/icics
Selling Power Back to the Grid in a Secure and Privacy-Preserving Manner.
Tat Wing Chim
Siu-Ming Yiu
Lucas Chi Kwong Hui
Victor O. K. Li
Tin Wing Mui
Yu Hin Tsang
Chun Kin Kwok
Kwun Yin Yu
2012
conf/icics
Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model.
Hao Xiong
Cong Zhang
Tsz Hon Yuen
Echo P. Zhang
Siu-Ming Yiu
Sihan Qing
2012
conf/eurocrypt
Identity-Based Encryption Resilient to Continual Auxiliary Leakage.
Tsz Hon Yuen
Sherman S. M. Chow
Ye Zhang
Siu-Ming Yiu
2012
conf/wisec
DroidChecker: analyzing android applications for capability leak.
Patrick P. F. Chan
Lucas Chi Kwong Hui
Siu-Ming Yiu
2011
conf/ccs
: multiple level authentication scheme for VANETs.
Tat Wing Chim
Lucas Chi Kwong Hui
Siu-Ming Yiu
Victor O. K. Li
2008
conf/provsec
Timed-Release Encryption Revisited.
Sherman S. M. Chow
Siu-Ming Yiu
2008
conf/cans
Authenticated Directed Diffusion.
Eric Ke Wang
Lucas Chi Kwong Hui
Siu-Ming Yiu
2006
conf/acisp
-Times Revocable-iff-Linked Group Signatures.
Man Ho Au
Willy Susilo
Siu-Ming Yiu
2005
conf/sec
Signcryption in Hierarchical Identity Based Cryptosystem.
Sherman S. M. Chow
Tsz Hon Yuen
Lucas Chi Kwong Hui
Siu-Ming Yiu
2005
conf/acisp
Two Improved Partially Blind Signature Schemes from Bilinear Pairings.
Sherman S. M. Chow
Lucas Chi Kwong Hui
Siu-Ming Yiu
Kam-Pui Chow
2005
conf/acisp
Role Activation Management in Role Based Access Control.
Richard W. C. Lui
Sherman S. M. Chow
Lucas Chi Kwong Hui
Siu-Ming Yiu
2005
conf/acns
Efficient Identity Based Ring Signature.
Sherman S. M. Chow
Siu-Ming Yiu
Lucas Chi Kwong Hui
2004
conf/icisc
Identity Based Threshold Ring Signature.
Sherman S. M. Chow
Lucas Chi Kwong Hui
Siu-Ming Yiu
2004
conf/icics
Secure Hierarchical Identity Based Signature and Its Application.
Sherman S. M. Chow
Lucas Chi Kwong Hui
Siu-Ming Yiu
Kam-Pui Chow
2003
conf/icisc
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity.
Sherman S. M. Chow
Siu-Ming Yiu
Lucas Chi Kwong Hui
Kam-Pui Chow
Coauthors
Anjia Yang
(1)
Bin Xiao
(3)
Bingxin Zhu
(1)
Cailing Cai
(1)
Chao Niu
(1)
Chun Jason Xue
(1)
Chun Kin Kwok
(1)
Chun-Fai Chan
(1)
Chuting Tan
(1)
Cong Zhang
(5)
Da Yu
(1)
Dong Liu
(1)
Duncan S. Wong
(1)
Echo P. Zhang
(1)
En Zhang
(1)
Eric Ke Wang
(2)
Feng Liu
(1)
Frank Y. W. Law
(1)
Gongxian Zeng
(3)
Guikai Xi
(2)
Haiyang Xue
(1)
Hao Xiong
(3)
Heming Cui
(1)
Hongxiao Wang
(2)
Huangting Wu
(1)
Jiajun Huang
(1)
Jian Weng
(1)
Jiehang Zhuang
(1)
Jin Li
(2)
Jing Wen
(2)
Jingxuan Wang
(2)
Joseph K. Liu
(2)
Jun Zhang
(4)
Jun Zhou
(1)
Jun-bin Fang
(3)
Junbin Fang
(4)
Junzuo Lai
(1)
Kam-Pui Chow
(5)
Ken Yau
(1)
Kevin K. H. Pun
(1)
Kin Ying Yu
(1)
Kwun Yin Yu
(1)
Linru Zhang
(4)
Liquan Chen
(1)
Longwen Lan
(1)
Lucas C. K. Hui
(3)
Lucas Chi Kwong Hui
(19)
Man Ho Au
(3)
Meiqi He
(3)
Meiqin Wang
(2)
Mengling Liu
(1)
Michael Y. K. Kwan
(1)
Mingli Wu
(1)
Mingshu Cong
(1)
Muzhou Li
(1)
Nairen Cao
(3)
Nicholas Zhang
(1)
Nikos Mamoulis
(1)
Patrick P. F. Chan
(3)
Peng Yang
(3)
Pierre K. Y. Lai
(1)
Puwen Wei
(1)
Puxi Lin
(1)
Qi Hu
(1)
Qi Wang
(4)
Qian Chen
(2)
Qing Liao
(1)
Qingju Wang
(1)
Ricci S. C. Ieong
(1)
Richard W. C. Lui
(1)
Robert H. Deng
(1)
Rong Li
(2)
Ruoqing Zhang
(2)
Shang Gao
(3)
Sherman S. M. Chow
(14)
Shing Ki Wong
(1)
Shiqi Gao
(1)
Shiyuan Xu
(3)
Sihan Qing
(2)
Sijin Li
(1)
Siu-Ming Yiu
(66)
Tat Wing Chim
(2)
Tian Zeng
(1)
Tianxiang Shen
(1)
Tin Wing Mui
(1)
Tsz Hon Yuen
(13)
Victor O. K. Li
(2)
Wei Chen
(1)
Wei Wang
(1)
Weijia Wang
(1)
Willy Susilo
(1)
Xiangning Wang
(1)
Xianrui Qin
(1)
Xiaoqi Yu
(3)
Xin Wang
(1)
Xin Yao
(1)
Xingmin Cui
(3)
Xuan Wang
(4)
Xue Chen
(3)
Yabin Jin
(1)
Yangyiye Jin
(1)
Yanhong Fan
(1)
Yanmin Zhao
(1)
Ye Zhang
(3)
Yi Jun He
(3)
Yi Liu
(4)
Yifeng Lin
(1)
Yu Guo
(2)
Yu Hin Tsang
(1)
Yuechen Chen
(3)
Yuer Yang
(1)
Yufang Yang
(1)
Zhengzhong Yi
(1)
Zhenyu Lu
(1)
Zhihu Li
(1)
Zhikang Xie
(1)
Zhiwei Wang
(2)
Zhongwei Xie
(1)
Zoe Lin Jiang
(9)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to