Dawu Gu

Orcid: 0000-0002-0504-9538

According to our database1, Dawu Gu authored at least 319 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle Connections.
IEEE Trans. Mob. Comput., April, 2024

A Refined Hardness Estimation of LWE in Two-step Mode.
IACR Cryptol. ePrint Arch., 2024

Teamwork Makes TEE Work: Open and Resilient Remote Attestation on Decentralized Trust.
CoRR, 2024

Efficient KZG-Based Univariate Sum-Check and Lookup Argument.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

2023
Old School, New Primitive: Toward Scalable PUF-Based Authenticated Encryption Scheme in IoT.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., December, 2023

Side-Channel Analysis for the Re-Keying Protocol of Bluetooth Low Energy.
J. Comput. Sci. Technol., September, 2023

Simulatable verifiable random function from the LWE assumption.
Theor. Comput. Sci., May, 2023

A nonprofiled side-channel analysis based on variational lower bound related to mutual information.
Sci. China Inf. Sci., January, 2023

BIB-MKS: Post-Quantum Secure Biometric Identity-Based Multi-Keyword Search Over Encrypted Data in Cloud Storage Systems.
IEEE Trans. Serv. Comput., 2023

Statistical Differential Fault Analysis of the Saturnin Lightweight Cryptosystem in the Mobile Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2023

Magma: Robust and Flexible Multi-Party Payment Channel.
IEEE Trans. Dependable Secur. Comput., 2023

Polynomial IOPs for Memory Consistency Checks in Zero-Knowledge Virtual Machines.
IACR Cryptol. ePrint Arch., 2023

FaBFT: Flexible Asynchronous BFT Protocol Using DAG.
IACR Cryptol. ePrint Arch., 2023

EKE Meets Tight Security in the Universally Composable Framework.
IACR Cryptol. ePrint Arch., 2023

Almost Tight Multi-User Security under Adaptive Corruptions from LWE in the Standard Model.
IACR Cryptol. ePrint Arch., 2023

More Efficient Public-Key Cryptography with Leakage and Tamper Resilience.
IACR Cryptol. ePrint Arch., 2023

Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model.
IACR Cryptol. ePrint Arch., 2023

Accio: Variable-Amount, Optimized-Unlinkable and NIZK-Free Off-Chain Payments via Hubs.
IACR Cryptol. ePrint Arch., 2023

Abusing Processor Exception for General Binary Instrumentation on Bare-metal Embedded Devices.
CoRR, 2023

HODOR: Shrinking Attack Surface on Node.js via System Call Limitation.
CoRR, 2023

xVMP: An LLVM-based Code Virtualization Obfuscator.
Proceedings of the IEEE International Conference on Software Analysis, 2023

RGDroid: Detecting Android Malware with Graph Convolutional Networks against Structural Attacks.
Proceedings of the IEEE International Conference on Software Analysis, 2023

Functional Encryption Against Probabilistic Queries: Definition, Construction and Applications.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Fine-Grained Verifier NIZK and Its Applications.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings.
Proceedings of the Information Security - 26th International Conference, 2023

On the (In)Security of Manufacturer-Provided Remote Attestation Frameworks in Android.
Proceedings of the Computer Security - ESORICS 2023, 2023

HODOR: Shrinking Attack Surface on Node.js via System Call Limitation.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Conditional Anonymous Certificateless Public Auditing Scheme Supporting Data Dynamics for Cloud Storage Systems.
IEEE Trans. Netw. Serv. Manag., December, 2022

Efficient Implementation of Dilithium Signature Scheme on FPGA SoC Platform.
IEEE Trans. Very Large Scale Integr. Syst., 2022

Improving Deep Learning Based Second-Order Side-Channel Analysis With Bilinear CNN.
IEEE Trans. Inf. Forensics Secur., 2022

Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation.
IEEE Trans. Dependable Secur. Comput., 2022

${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions.
IEEE Trans. Dependable Secur. Comput., 2022

Tightly CCA-secure inner product functional encryption scheme.
Theor. Comput. Sci., 2022

Lightweight Multidimensional Encrypted Data Aggregation Scheme With Fault Tolerance for Fog-Assisted Smart Grids.
IEEE Syst. J., 2022

Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems.
J. Syst. Archit., 2022

Improved Progressive BKZ with Lattice Sieving.
IACR Cryptol. ePrint Arch., 2022

Improved Pump and Jump BKZ by Sharp Simulator.
IACR Cryptol. ePrint Arch., 2022

Revisiting the Concrete Hardness of SelfTargetMSIS in CRYSTALS-Dilithium.
IACR Cryptol. ePrint Arch., 2022

Further Cryptanalysis of a Type of RSA Variants.
IACR Cryptol. ePrint Arch., 2022

Privacy-Preserving Authenticated Key Exchange in the Standard Model.
IACR Cryptol. ePrint Arch., 2022

Tightly Secure Chameleon Hash Functions in the Multi-User Setting and Their Applications.
IACR Cryptol. ePrint Arch., 2022

The Ideal Functionalities for Private Set Union, Revisited.
IACR Cryptol. ePrint Arch., 2022

Shuffle-based Private Set Union: Faster and More Secure.
IACR Cryptol. ePrint Arch., 2022

Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing.
IACR Cryptol. ePrint Arch., 2022

MixCT: Mixing Confidential Transactions from Homomorphic Commitment.
IACR Cryptol. ePrint Arch., 2022

PEDroid: Automatically Extracting Patches from Android App Updates (Artifact).
Dagstuhl Artifacts Ser., 2022

An empirical study of security issues in SSO server-side implementations.
Sci. China Inf. Sci., 2022

Ciphertext-only fault analysis of GIFT lightweight cryptosystem.
Sci. China Inf. Sci., 2022

Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Rethinking the security of IoT from the perspective of developer customized device-cloud interaction.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

More Efficient Verifiable Functional Encryption.
Proceedings of the Provable and Practical Security, 2022

Shaduf: Non-Cycle Payment Channel Rebalancing.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

UCC: Universal and Committee-based Cross-chain Framework.
Proceedings of the Information Security Practice and Experience, 2022

Grape: Efficient Hybrid Consensus Protocol Using DAG.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

Fuzzy Authenticated Key Exchange with Tight Security.
Proceedings of the Computer Security - ESORICS 2022, 2022

PEDroid: Automatically Extracting Patches from Android App Updates.
Proceedings of the 36th European Conference on Object-Oriented Programming, 2022

SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

AL-PA: cross-device profiled side-channel attack using adversarial learning.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

VOProof: Efficient zkSNARKs from Vector Oracle Compilers.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

A Universally Composable Non-interactive Aggregate Cash System.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

iService: Detecting and Evaluating the Impact of Confused Deputy Problem in AppleOS.
Proceedings of the Annual Computer Security Applications Conference, 2022

DeChain: A Blockchain Framework Enhancing Decentralization via Sharding.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison.
IEEE Trans. Software Eng., 2021

Statistical Fault Analysis of the Simeck Lightweight Cipher in the Ubiquitous Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Pay Attention to Raw Traces: A Deep Learning Architecture for End-to-End Profiling Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

A real-time related key attack on the WG-16 stream cipher for securing 4G-LTE networks.
J. Inf. Secur. Appl., 2021

New cryptographic hardness for learning intersections of halfspaces over boolean cubes with membership queries.
Inf. Comput., 2021

VCProof: Constructing Shorter and Faster-to-Verify zkSNARKs with Vector Oracles.
IACR Cryptol. ePrint Arch., 2021

LedMAC: More Efficient Variants of LightMAC.
IACR Cryptol. ePrint Arch., 2021

Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness.
IACR Cryptol. ePrint Arch., 2021

Pseudorandom functions in NC class from the standard LWE assumption.
Des. Codes Cryptogr., 2021

Robustly reusable fuzzy extractor with imperfect randomness.
Des. Codes Cryptogr., 2021

Efficient outsourced extraction of histogram features over encrypted images in cloud.
Sci. China Inf. Sci., 2021

Improved Guess and Determine attack on the MASHA stream cipher.
Sci. China Inf. Sci., 2021

Authentication System Based on Fuzzy Extractors.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Re-Check Your Certificates! Experiences and Lessons Learnt from Real-World HTTPS Certificate Deployments.
Proceedings of the Network and System Security - 15th International Conference, 2021

Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Fully Secure Lattice-Based ABE from Noisy Linear Functional Encryption.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

Binary Classification-Based Side-Channel Analysis.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2021

Attention - Based Non-Profiled Side-Channel Attack.
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2021

Redactable Blockchain Supporting Supervision and Self-Management.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Persistent Fault Attack in Practice.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Evaluating and Improving Linear Regression Based Profiling: On the Selection of Its Regularization.
J. Comput. Sci. Technol., 2020

Public-Key Puncturable Encryption: Modular and Compact Constructions.
IACR Cryptol. ePrint Arch., 2020

Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security.
IACR Cryptol. ePrint Arch., 2020

Understanding the security of app-in-the-middle IoT.
Comput. Secur., 2020

Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256.
Comput. J., 2020

Reusable Fuzzy Extractor Based on the LPN Assumption.
Comput. J., 2020

New insights on linear cryptanalysis.
Sci. China Inf. Sci., 2020

Ciphertext-only fault analysis on the Midori lightweight cryptosystem.
Sci. China Inf. Sci., 2020

Improved Cryptanalysis of Reduced-Version QARMA-64/128.
IEEE Access, 2020

SMARTSHIELD: Automatic Smart Contract Protection Made Easy.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

A New General Method of Searching for Cubes in Cube Attacks.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

2019
Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2019

Tightly secure signature schemes from the LWE and subset sum assumptions.
Theor. Comput. Sci., 2019

A generic construction of tightly secure signatures in the multi-user setting.
Theor. Comput. Sci., 2019

Structure-preserving public-key encryption with leakage-resilient CCA security.
Theor. Comput. Sci., 2019

Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping.
Secur. Commun. Networks, 2019

Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks.
J. Comput. Sci. Technol., 2019

New Analysis of Reduced-Version of Piccolo in the Single-Key Scenario.
KSII Trans. Internet Inf. Syst., 2019

Security analysis of third-party in-app payment in mobile applications.
J. Inf. Secur. Appl., 2019

RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.
IACR Cryptol. ePrint Arch., 2019

Generic Constructions of Robustly Reusable Fuzzy Extractor.
IACR Cryptol. ePrint Arch., 2019

Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System.
IACR Cryptol. ePrint Arch., 2019

Beyond-birthday secure domain-preserving PRFs from a single permutation.
Des. Codes Cryptogr., 2019

Towards a Multi-Chain Future of Proof-of-Space.
CoRR, 2019

Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC.
Comput. J., 2019

Side channel attack of multiplication in GF(<i>q</i>)-application to secure RSA-CRT.
Sci. China Inf. Sci., 2019

Improved impossible differential cryptanalysis of large-block Rijndael.
Sci. China Inf. Sci., 2019

Pseudo random oracle of Merkle-Damgård hash functions revisited.
Sci. China Inf. Sci., 2019

Automatically Patching Vulnerabilities of Binary Programs via Code Transfer From Correct Versions.
IEEE Access, 2019

APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

A Secure and Practical Blockchain Scheme for IoT.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Making Monero Hard-to-Trace and More Efficient.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Towards a Multi-chain Future of Proof-of-Space.
Proceedings of the Security and Privacy in Communication Networks, 2019

NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility.
Proceedings of the Provable Security, 2019

A Practical Dynamic Enhanced BFT Protocol.
Proceedings of the Network and System Security - 13th International Conference, 2019

Gnocchi: Multiplexed Payment Channels for Cryptocurrencies.
Proceedings of the Network and System Security - 13th International Conference, 2019

Mixing Property Tester: A General Framework for Evaluating the Mixing Properties of Initialization of Stream Ciphers.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

New Key Recovery Attack on the MICKEY Family of Stream Ciphers.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

SymSem: Symbolic Execution with Time Stamps for Deobfuscation.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System.
Proceedings of the Applied Cryptography and Network Security, 2019

Pseudorandom Functions from LWE: RKA Security and Application.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips.
IEEE Trans. Inf. Forensics Secur., 2018

AppSpear: Automating the hidden-code extraction and reassembling of packed android malware.
J. Syst. Softw., 2018

Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks.
KSII Trans. Internet Inf. Syst., 2018

Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network.
KSII Trans. Internet Inf. Syst., 2018

ISO/IEC 9797-1 Revisited: Beyond Birthday Bound.
IACR Cryptol. ePrint Arch., 2018

Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2018

Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness.
Des. Codes Cryptogr., 2018

Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128.
Comput. J., 2018

Tightly Secure Encryption Schemes against Related-Key Attacks.
Comput. J., 2018

Similar operation template attack on RSA-CRT as a case study.
Sci. China Inf. Sci., 2018

Improved meet-in-the-middle attacks on reduced-round Piccolo.
Sci. China Inf. Sci., 2018

Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Burn After Reading: Expunging Execution Footprints of Android Apps.
Proceedings of the Network and System Security - 12th International Conference, 2018

BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

Dynamic Practical Byzantine Fault Tolerance.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

An Empirical Study of SDK Credential Misuse in iOS Apps.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

2017
Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems.
ACM Trans. Embed. Comput. Syst., 2017

Public key encryption resilient to leakage and tampering attacks.
J. Comput. Syst. Sci., 2017

Security Analysis of the Whirlpool Hash Function in the Cloud of Things.
KSII Trans. Internet Inf. Syst., 2017

Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman.
Inf. Sci., 2017

Z-Channel: Scalable and Efficient Scheme in Zerocash.
IACR Cryptol. ePrint Arch., 2017

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
IACR Cryptol. ePrint Arch., 2017

Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners.
IACR Cryptol. ePrint Arch., 2017

Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed.
Proceedings of the 26th USENIX Security Symposium, 2017

Learning AC<sup>0</sup> Under k-Dependent Distributions.
Proceedings of the Theory and Applications of Models of Computation, 2017

Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Binary code clone detection across architectures and compiling configurations.
Proceedings of the 25th International Conference on Program Comprehension, 2017

Nightingale: Translating Embedded VM Code in x86 Binary Executables.
Proceedings of the Information Security - 20th International Conference, 2017

Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

MIRAGE: Randomizing large chunk allocation via dynamic binary instrumentation.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Ridge-Based Profiled Differential Power Analysis.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

Practical Partial-Nonce-Exposure Attack on ECC Algorithm.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Efficient and Constant Time Modular Inversions Over Prime Fields.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Boolean Matrix Masking for SM4 Block Cipher Algorithm.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

An Implementation of Trojan Side-Channel with a Masking Scheme.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Smart Solution, Poor Protection: An Empirical Study of Security and Privacy Issues in Developing and Deploying Smart Home Devices.
Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 2017

Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA?
Proceedings of the Smart Card Research and Advanced Applications, 2017

Oh-Pwn-VPN! Security Analysis of OpenVPN-Based Android Apps.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

PAC Learning Depth-3 $\textrm{AC}^0$ Circuits of Bounded Top Fanin.
Proceedings of the International Conference on Algorithmic Learning Theory, 2017

Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers.
IEEE Trans. Inf. Forensics Secur., 2016

PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications.
IEEE Trans. Dependable Secur. Comput., 2016

Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks.
IEEE Trans. Dependable Secur. Comput., 2016

Efficient chosen ciphertext secure identity-based encryption against key leakage attacks.
Secur. Commun. Networks, 2016

Privacy-preserving data sharing scheme over cloud for social applications.
J. Netw. Comput. Appl., 2016

Public key cryptosystems secure against memory leakage attacks.
IET Inf. Secur., 2016

Improved impossible differential attack on reduced version of Camellia with <i>FL</i>/<i>FL</i> <sup>-1</sup> functions.
IET Inf. Secur., 2016

Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys.
IET Inf. Secur., 2016

Evaluation and Improvement of Generic-Emulating DPA Attacks.
IACR Cryptol. ePrint Arch., 2016

How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers.
IACR Cryptol. ePrint Arch., 2016

RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions.
Comput. J., 2016

Identity-Based Encryption with Verifiable Outsourced Revocation.
Comput. J., 2016

New algorithms for verifiable outsourcing of bilinear pairings.
Sci. China Inf. Sci., 2016

Cross-Architecture Binary Semantics Understanding via Similar Code Comparison.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

New Exploit Methods against Ptmalloc of GLIBC.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Security Analysis of Vendor Customized Code in Firmware of Embedded Device.
Proceedings of the Security and Privacy in Communication Networks, 2016

On the Robustness of Learning Parity with Noise.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Upper bounds on the min-entropy of RO Sum, Arbiter, Feed-Forward Arbiter, and S-ArbRO PUFs.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016

Security Testing of Software on Embedded Devices Using x86 Platform.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for Circuits.
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016

Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages.
Proceedings of the Smart Card Research and Advanced Applications, 2016

Open Sesame! Web Authentication Cracking via Mobile App Analysis.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2015

Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers.
Secur. Commun. Networks, 2015

Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things.
KSII Trans. Internet Inf. Syst., 2015

Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations.
Int. J. Distributed Sens. Networks, 2015

Related-key rectangle cryptanalysis of Rijndael-160 and Rijndael-192.
IET Inf. Secur., 2015

Secure Sketch Metamorphosis: Tight Unified Bounds.
IACR Cryptol. ePrint Arch., 2015

A Survey on Lightweight Entity Authentication with Strong PUFs.
ACM Comput. Surv., 2015

Efficient Pairing Computation on Huff Curves.
Cryptologia, 2015

SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs.
Comput. Commun., 2015

Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks.
Comput. J., 2015

The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

CLIP: Continuous Location Integrity and Provenance for Mobile Phones.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards.
Proceedings of the Computer Security - ESORICS 2015, 2015

(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

SSG: Sensor Security Guard for Android Smartphones.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Vulnerability Assessment of OAuth Implementations in Android Applications.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions.
IACR Cryptol. ePrint Arch., 2014

Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible II.
IACR Cryptol. ePrint Arch., 2014

The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions.
Electron. Colloquium Comput. Complex., 2014

iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications.
Proceedings of the Network and System Security - 8th International Conference, 2014

Proofs of Retrievability Based on MRD Codes.
Proceedings of the Information Security Practice and Experience, 2014

TagDroid: Hybrid SSL Certificate Verification in Android.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering.
Proceedings of the 2014 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2014

Android App Protection via Interpretation Obfuscation.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

An Improved Side-Channel Attack Based on Support Vector Machine.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

APKLancet: tumor payload diagnosis and purification for android applications.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

DIAS: Automated Online Analysis for Android Applications.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Legitimate-reader-only attack on MIFARE Classic.
Math. Comput. Model., 2013

Differential Fault Analysis on the MD5 Compression Function.
J. Comput., 2013

Towards Efficient and Secure Geographic Routing Protocol for Hostile Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Proofs of Data Possession and Retrievability Based on MRD Codes.
IACR Cryptol. ePrint Arch., 2013

Differential power analysis of stream ciphers with LFSRs.
Comput. Math. Appl., 2013

Efficient, fast and scalable authentication for VANETs.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Efficient Leakage-Resilient Identity-Based Encryption with CCA Security.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

Efficient Implementation of Tate Pairing with Montgomery Ladder Method.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Automatic Detection and Analysis of Encrypted Messages in Malware.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

A Power Analysis on SMS4 Using the Chosen Plaintext Method.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Security analysis and enhancement for three-party password-based authenticated key exchange protocol.
Secur. Commun. Networks, 2012

On weaknesses of the HDCP authentication and key exchange protocol and its repair.
Math. Comput. Model., 2012

Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256.
J. Syst. Softw., 2012

Fault Detection on the Software Implementation of CLEFIA Lightweight Cipher.
J. Networks, 2012

Provably secure three-party password-based authenticated key exchange protocol.
Inf. Sci., 2012

Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network.
Int. J. Comput. Intell. Syst., 2012

Improved Impossible Differential Attack on Reduced Version of Camellia-192/256.
IACR Cryptol. ePrint Arch., 2012

Impossible Differential Attacks on Reduced-Round LBlock.
Proceedings of the Information Security Practice and Experience, 2012

Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy.
Proceedings of the Internet and Distributed Computing Systems, 2012

Improved Impossible Differential Attacks on Large-Block Rijndael.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

On Constant-Round Precise Zero-Knowledge.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Phrase Search over Encrypted Data with Symmetric Encryption Scheme.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Android Malware Forensics: Reconstruction of Malicious Events.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

Differential Fault Analysis on Lightweight Blockciphers with Statistical Cryptanalysis Techniques.
Proceedings of the 2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2012

Reducing extra storage in searchable symmetric encryption scheme.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

A Highly Efficient Correlation Power Analysis on PRINT Cipher.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Improved Differential Fault Analysis of SOSEMANUK.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Fault Analysis of the Piccolo Block Cipher.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Linear Fault Analysis of Block Ciphers.
Proceedings of the Applied Cryptography and Network Security, 2012

On Improving the Performance of Public Key Encryption with Keyword Search.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

2011
A New Differential Fault Attack on SPN Structure, with Application to AES Cipher.
J. Comput., 2011

Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256.
IACR Cryptol. ePrint Arch., 2011

A Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-Encryption.
Proceedings of the Theory and Applications of Models of Computation, 2011

Detection and Analysis of Cryptographic Data Inside Software.
Proceedings of the Information Security, 14th International Conference, 2011

A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware.
Proceedings of the Information Security Practice and Experience, 2011

Fault Detection of the MacGuffin Cipher against Differential Fault Attack.
Proceedings of the Trusted Systems - Third International Conference, 2011

Linear Cryptanalysis of ARIA Block Cipher.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

An improved dynamic provable data possession model.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011

A Note on (Im)Possibilities of Obfuscating Programs of Zero-Knowledge Proofs of Knowledge.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Provably secure authenticated key exchange protocol under the CDH assumption.
J. Syst. Softw., 2010

CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles.
J. Syst. Softw., 2010

Differential fault analysis on Camellia.
J. Syst. Softw., 2010

New Fuzzy Identity-Based Encryption in the Standard Model.
Informatica, 2010

Hierarchical Identity-Based Proxy Re-Encryption without Random Oracles.
Int. J. Found. Comput. Sci., 2010

Stronger Security Model of Group Key Agreement.
IACR Cryptol. ePrint Arch., 2010

An efficient fault-tolerant group key agreement protocol.
Comput. Commun., 2010

Precise bounded-concurrent zero-knowledge proofs for NP.
Sci. China Inf. Sci., 2010

Denial of Service Detection with Hybrid Fuzzy Set Based Feed Forward Neural Network.
Proceedings of the Advances in Neural Networks, 2010

Classification of Malicious Software Behaviour Detection with Hybrid Set Based Feed Forward Neural Network.
Proceedings of the Advances in Neural Networks, 2010

Efficient Pairing Computation on Elliptic Curves in Hessian Form.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Digital Forensic Analysis on Runtime Instruction Flow.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

On Obfuscating Programs with Tamper-proof Hardware.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Correlation Power Analysis Against Stream Cipher MICKEY v2.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin.
J. Syst. Softw., 2009

Fully CCA2 secure identity based broadcast encryption without random oracles.
Inf. Process. Lett., 2009

Architecture Support for Memory Confidentiality and Integrity in Embedded Systems.
Int. J. Distributed Sens. Networks, 2009

Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher.
IACR Cryptol. ePrint Arch., 2009

Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds.
IACR Cryptol. ePrint Arch., 2009

Precise Time and Space Simulatable Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2009

Speeding Up the Double-Base Recoding Algorithm of Scalar Multiplication.
Cryptologia, 2009

An Extension of Differential Fault Analysis on AES.
Proceedings of the Third International Conference on Network and System Security, 2009

Design and Implementation of Self-securing Disk.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Performance and Consistency Improvements of Hash Tree Based Disk Storage Protection.
Proceedings of the International Conference on Networking, Architecture, and Storage, 2009

Network Intrusion Detection with Workflow Feature Definition Using BP Neural Network.
Proceedings of the Advances in Neural Networks, 2009

Differential-Multiple Linear Cryptanalysis.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

2008
Differential fault analysis on the ARIA algorithm.
Inf. Sci., 2008

Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model.
Informatica (Slovenia), 2008

Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks.
Comput. Commun., 2008

Secure Remote Storage through Authenticated Encryption.
Proceedings of The 2008 IEEE International Conference on Networking, 2008

Efficient disk encryption and verification through trusted nonce.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

Secure Hierarchical Identity Based Encryption Scheme in the Standard Model.
Proceedings of the Progress in Cryptology, 2008

An Easy-to-Deploy Penetration Testing Platform.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Efficient Authenticated Encryption for Hybrid Hard Drives Based on GCM.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Data privacy and integrity appropriate for disk protection.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2007
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security.
Proceedings of the Provable Security, 2007

A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

2006
An extension of secure group communication using key graph.
Inf. Sci., 2006

2005
An Efficient Group Key Management Scheme: Link Tree Protocol.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

2004
Authenticated group key agreement with admission control.
Proceedings of the 3rd International Conference on Information Security, 2004

Research on authenticated key agreement in group settings.
Proceedings of the 3rd International Conference on Information Security, 2004

2002
A New Offline Privacy Protecting E-cash System with Revokable Anonymity.
Proceedings of the Information Security, 5th International Conference, 2002

2001
On the Techniques of Enhancing the Security of Block Ciphers.
ACM SIGOPS Oper. Syst. Rev., 2001


  Loading...