论文著作

近期发表论文节选,按时间顺序倒序排列。

2024

  1. EUROCRYPT 2024
    The Hardness of LPN over Any Integer Ring and Field for PCG Applications
    Hanlin Liu , Xiao Wang , Kang Yang , and Yu Yu
  2. USENIX Security 2024
    Lightweight Authentication of Web Data via Garble-Then-Prove
    Xiang Xie , Kang Yang , Xiao Wang , and Yu Yu
  3. USENIX Security 2024
    Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting
    Fengrun Liu , Xiang Xie , and Yu Yu

2023

  1. ASIACRYPT 2023
    Algebraic Attacks on Round-Reduced RAIN and Full AIM-III
    Kaiyi Zhang , Qingju Wang , Yu Yu , Chun Guo , and Hongrui Cui
  2. TCC 2023
    Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations
    Liqing Yu , Yusai Wu , Yu Yu , Zhenfu Cao , and Xiaolei Dong
  3. CRYPTO 2023
    Revisiting the Constant-sum Winternitz One-time Signature with Applications to SPHINCS+ and XMSS
    Kaiyi Zhang , Hongrui Cui , and Yu Yu
  4. EUROCRYPT 2023
    Actively Secure Half-Gates with Minimum Overhead under Duplex Networks
    Hongrui Cui , Xiao Wang , Kang Yang , and Yu Yu
  5. IEEE S&P 2023
    Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning
    L. Zhou , Z. Wang , H. Cui , Q. Song , and Y. Yu
    In 2023 IEEE Symposium on Security and Privacy (SP) , May

2022

  1. ASIACRYPT 2022
    A Non-heuristic Approach to Time-space Tradeoffs and Optimizations for BKW
    Hanlin Liu , and Yu Yu
    May
  2. ASIACRYPT 2022
    A Third is All You Need: Extended Partial Key Exposure Attack on CRT-RSA with Additive Exponent Blinding
    Yuanyuan Zhou , Joop Pol , Yu Yu , and François-Xavier Standaert
    May
  3. EUROCRYPT 2022
    Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs
    Li Yao , Yilei Chen , and Yu Yu
    May

2021

  1. CRYPTO 2021
    Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN
    Yu Yu , and Jiang Zhang
    May
  2. CRYPTO 2021
    Pushing the Limits of Valiant’s Universal Circuits: Simpler, Tighter and More Compact
    Hanlin Liu , Yu Yu , Shuoyao Zhao , Jiang Zhang , Wenling Liu , and Zhenkai Hu
    May
  3. TCHES 2021
    Learning Parity with Physical Noise: Imperfections, Reductions and FPGA Prototype
    Davide Bellizia , Clément Hoffmann , Dina Kamel , Hanlin Liu , Pierrick Méaux , François-Xavier Standaert , and Yu Yu
    IACR Transactions on Cryptographic Hardware and Embedded Systems, May
  4. NPJ Quantum Information
    Experimental authentication of quantum key distribution with post-quantum cryptography
    Liu-Jun Wang , Kai-Yi Zhang , Jia-Yong Wang , Jie Cheng , Yong-Hua Yang , Shi-Biao Tang , Di Yan , Yan-Lin Tang , Zhen Liu , Yu Yu , and  others
    npj quantum information, May
  5. ESORICS 2021
    MPC-in-Multi-Heads: A Multi-Prover Zero-Knowledge Proof System: (or: How to Jointly Prove Any NP Statements in ZK)
    Hongrui Cui , Kaiyi Zhang , Yu Chen , Zhen Liu , and Yu Yu
    In Computer Security – ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part II , May

2020

  1. ASIACRYPT 2020
    Packed Multiplication: How to Amortize the Cost of Side-channel Masking ?
    Weijia Wang , Chun Guo , François-Xavier Standaert , Yu Yu , and Gaëtan Cassiers
    May
    \urlhttps://eprint.iacr.org/2020/1103
  2. ESORICS 2020
    A lattice-based key-insulated and privacy-preserving signature scheme with publicly derived public key
    Wenling Liu , Zhen Liu , Khoa Nguyen , Guomin Yang , and Yu Yu
    In European Symposium on Research in Computer Security , May
  3. PKC 2020
    Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes
    Jiang Zhang , Yu Yu , Shuqin Fan , Zhenfeng Zhang , and Kang Yang
    May
  4. CRYPTO 2020
    Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting)
    Chun Guo , Jonathan Katz , Xiao Wang , Chenkai Weng , and Yu Yu
    May
  5. CCS 2020
    LEAF: A Faster Secure Search Algorithm via Localization, Extraction, and Reconstruction
    Rui Wen , Yu Yu , Xiang Xie , and Yang Zhang
    In ACM SIGSAC Conference on Computer and Communications Security , May
  6. S&P 2020
    Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers
    Chun Guo , Jonathan Katz , Xiao Wang , and Yu Yu
    May
  7. ToSC/FSE 2020
    Efficient Side-Channel Secure Message Authentication with Better Bounds
    Chun Guo , François-Xavier Standaert , Weijia Wang , and Yu Yu
    May
    \urlhttps://eprint.iacr.org/2019/1424

2019

  1. ESORICS (1) 2019
    A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses
    Zhen Liu , Khoa Nguyen , Guomin Yang , Huaxiong Wang , and Duncan S. Wong
    In Computer Security – ESORICS 2019 , May
  2. ASIACRYPT 2019
    Collision Resistant Hashing from Sub-exponential Learning Parity with Noise
    Yu Yu , Jiang Zhang , Jian Weng , Chun Guo , and Xiangxue Li
    May
  3. ASIACRYPT 2019
    Valiant’s Universal Circuits Revisited: an Overall Improvement and a Lower Bound
    Shuoyao Zhao , Yu Yu , Jiang Zhang , and Hanlin Liu
    May
  4. ACISP 2018
    Z-channel: Scalable and efficient scheme in zerocash
    Yuncong Zhang , Yu Long , Zhen Liu , Zhiqiang Liu , and Dawu Gu
    Computers & Security, May
  5. Inscrypt 2018
    Goshawk: a novel efficient, robust and flexible blockchain protocol
    Cencen Wan , Shuyang Tang , Yuncong Zhang , Chen Pan , Zhiqiang Liu , Yu Long , Zhen Liu , and Yu Yu
    In Information Security and Cryptology: 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers 14 , May
  6. IEEE TIFS2019
    Provable Order Amplification for Code-Based Masking: How to Avoid Non-Linear Leakages Due to Masked Operations
    Weijia Wang ,  Yu , and Francois-Xavier Standaert
    Trans. Info. For. Sec., Nov

2018

  1. Defcon China 2018
    Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning
    Changyu Li , Quanpu Cai , Juanru Li , Hui Liu , Yuanyuan Zhang , Dawu Gu , and Yu Yu
    In Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks , Nov
  2. CNS 2018
    Dynamic Practical Byzantine Fault Tolerance
    Xu Hao , Long Yu , Liu Zhiqiang , Liu Zhen , and Gu Dawu
    In 2018 IEEE Conference on Communications and Network Security (CNS) , Nov
  3. NSS 2018
    Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain
    Fengjun Chen , Zhiqiang Liu , Yu Long , Zhen Liu , and Ning Ding
    In Network and System Security , Nov

2017

  1. ASIACRYPT 2017
    Two-Round PAKE from Approximate SPH and Instantiations from Lattices
    Jiang Zhang , and Yu Yu
    Nov

2016

  1. CRYPTO 2016
    Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN
    Yu Yu , and Jiang Zhang
    Nov
  2. EUROCRYPT 2016
    Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN
    Yu Yu , and John Steinberger
    In Proceedings, Part II, of the 35th Annual International Conference on Advances in Cryptology — EUROCRYPT 2016 - Volume 9666 , Nov

2015

  1. CRYPTO 2015
    (Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond
    Yu Yu , Dawu Gu , Xiangxue Li , and Jian Weng
    In Advances in Cryptology – CRYPTO 2015 , Nov
  2. TCC 2015
    The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions
    Yu Yu , Dawu Gu , Xiangxue Li , and Jian Weng
    In Theory of Cryptography , Nov

2013

  1. ASIACRYPT 2013
    Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters
    Yu Yu , Xiangxue Li , and Jian Weng
    In Advances in Cryptology - ASIACRYPT 2013 , Nov
  2. CRYPTO 2013
    Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions
    François-Xavier Standaert , Olivier Pereira , and Yu Yu
    In Advances in Cryptology – CRYPTO 2013 , Nov
  3. TCC 2013
    Overcoming Weak Expectations
    Yevgeniy Dodis , and Yu Yu
    In Theory of Cryptography , Nov
  4. CT-RSA 2013
    Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness
    Yu Yu , and François-Xavier Standaert
    In Topics in Cryptology – CT-RSA 2013 , Nov

2012

  1. ITW 2012
    Two-source extractors for leaky sources
    Yu Yu , Xiangxue Li , and Haifeng Qian
    In 2012 IEEE Information Theory Workshop , Nov