Yuncong Hu

Orcid: 0000-0002-8338-3507

According to our database1, Yuncong Hu authored at least 17 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
HasteBoots: Proving FHE Bootstrapping in Seconds.
IACR Cryptol. ePrint Arch., 2025

DFS: Delegation-friendly zkSNARK and Private Delegation of Provers.
IACR Cryptol. ePrint Arch., 2025

GKR for Boolean Circuits with Sub-linear RAM Operations.
IACR Cryptol. ePrint Arch., 2025

2024
A Verifiable and Privacy-Preserving Federated Learning Training Framework.
IEEE Trans. Dependable Secur. Comput., 2024

Hadamard Product Argument from Lagrange-Based Univariate Polynomials.
IACR Cryptol. ePrint Arch., 2024

Advanced Transparency System.
IACR Cryptol. ePrint Arch., 2024

A Succinct Range Proof for Polynomial-based Vector Commitment.
IACR Cryptol. ePrint Arch., 2024

HuRef: HUman-REadable Fingerprint for Large Language Models.
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024

2022
Decentralized Ledgers: Design and Applications
PhD thesis, 2022

Gemini: Elastic SNARKs for Diverse Environments.
IACR Cryptol. ePrint Arch., 2022

Question-Driven Graph Fusion Network for Visual Question Answering.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

2021
Merkle^2: A Low-Latency Transparency Log System.
IACR Cryptol. ePrint Arch., 2021

Non-Interactive Differentially Anonymous Router.
IACR Cryptol. ePrint Arch., 2021

Merkle<sup>2</sup>: A Low-Latency Transparency Log System.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust.
IACR Cryptol. ePrint Arch., 2020

2019
Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS.
IACR Cryptol. ePrint Arch., 2019

JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT.
Proceedings of the 28th USENIX Security Symposium, 2019


  Loading...