What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Bingyu Li
Google Scholar
ORCID:
0000-0001-5925-1638
15
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
RandFlash: Breaking the Quadratic Barrier in Large-Scale Distributed Randomness Beacons.
Yang Yang
Bingyu Li
Qianhong Wu
Bo Qin
Qin Wang
Shihong Xiong
Willy Susilo
2025
conf/acisp
FlexiADKG: A Flexible Asynchronous Distributed Key Generation Protocol with Constant Round Complexity.
Yang Yang
Bingyu Li
Zhenyang Ding
Qianhong Wu
Bo Qin
Qin Wang
2025
conf/ndss
Automatic Insecurity: Exploring Email Auto-configuration in the Wild.
Shushang Wen
Yiming Zhang
Yuxiang Shen
Bingyu Li
Haixin Duan
Jingqiang Lin
2024
conf/ccs
Gopher: High-Precision and Deep-Dive Detection of Cryptographic API Misuse in the Go Ecosystem.
Yuexi Zhang
Bingyu Li
Jingqiang Lin
Linghui Li
Jia-Ju Bai
Shijie Jia
Qianhong Wu
2024
conf/ndss
Certificate Transparency Revisited: The Public Inspections on Third-party Monitors.
Aozhuo Sun
Jingqiang Lin
Wei Wang
Zeyan Liu
Bingyu Li
Shushang Wen
Qiongxiao Wang
Fengjun Li
2024
conf/acsac
FreeAuth: Privacy-Preserving Email Ownership Authentication with Verification-Email-Free.
Yijia Fang
Bingyu Li
Jiale Xiao
Bo Qin
Zhijintong Zhang
Qianhong Wu
2022
conf/acns
PEPEC: Precomputed ECC Points Embedded in Certificates and Verified by CT Log Servers.
Guangshen Cheng
Jiankuo Dong
Xinyi Ji
Bingyu Li
Haoling Fan
Pinchang Zhang
2021
journals/tifs
Locally-Centralized Certificate Validation and its Application in Desktop Virtualization Systems.
Bingyu Li
Jingqiang Lin
Qiongxiao Wang
Ze Wang
Jiwu Jing
2021
conf/acns
PoliCT: Flexible Policy in Certificate Transparency Enabling Lightweight Self-monitor.
Aozhuo Sun
Bingyu Li
Huiqing Wan
Qiongxiao Wang
2020
conf/acns
Exploring the Security of Certificate Transparency in the Wild.
Bingyu Li
Fengjun Li
Ziqiang Ma
Qianhong Wu
2020
conf/acns
Applications and Developments of the Lattice Attack in Side Channel Attacks.
Ziqiang Ma
Bingyu Li
Quanwei Cai
Jun Yang
2019
conf/ccs
Certificate Transparency in the Wild: Exploring the Reliability of Monitors.
Bingyu Li
Jingqiang Lin
Fengjun Li
Qiongxiao Wang
Qi Li
Jiwu Jing
Congli Wang
2018
conf/icics
PoS: Constructing Practical and Efficient Public Key Cryptosystems Based on Symmetric Cryptography with SGX.
Huorong Li
Jingqiang Lin
Bingyu Li
Wangzhao Cheng
2017
conf/icics
High-Performance Symmetric Cryptography Server with GPU Acceleration.
Wangzhao Cheng
Fangyu Zheng
Wuqiong Pan
Jingqiang Lin
Huorong Li
Bingyu Li
2017
conf/icics
SSUKey: A CPU-Based Solution Protecting Private Keys on Untrusted OS.
Huorong Li
Wuqiong Pan
Jingqiang Lin
Wangzhao Cheng
Bingyu Li
Coauthors
Aozhuo Sun
(2)
Bingyu Li
(15)
Bo Qin
(3)
Congli Wang
(1)
Fangyu Zheng
(1)
Fengjun Li
(3)
Guangshen Cheng
(1)
Haixin Duan
(1)
Haoling Fan
(1)
Huiqing Wan
(1)
Huorong Li
(3)
Jia-Ju Bai
(1)
Jiale Xiao
(1)
Jiankuo Dong
(1)
Jingqiang Lin
(8)
Jiwu Jing
(2)
Jun Yang
(1)
Linghui Li
(1)
Pinchang Zhang
(1)
Qi Li
(1)
Qianhong Wu
(5)
Qin Wang
(2)
Qiongxiao Wang
(4)
Quanwei Cai
(1)
Shihong Xiong
(1)
Shijie Jia
(1)
Shushang Wen
(2)
Wangzhao Cheng
(3)
Wei Wang
(1)
Willy Susilo
(1)
Wuqiong Pan
(2)
Xinyi Ji
(1)
Yang Yang
(2)
Yijia Fang
(1)
Yiming Zhang
(1)
Yuexi Zhang
(1)
Yuxiang Shen
(1)
Ze Wang
(1)
Zeyan Liu
(1)
Zhenyang Ding
(1)
Zhijintong Zhang
(1)
Ziqiang Ma
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to