Gu, Dawu
222  Ergebnisse:
Personensuche X
?
1

Efficient KZG-Based Univariate Sum-Check and Lookup Argumen:

, In: Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2024,
Zhang, Yuncong ; Sun, Shi-Feng ; Gu, Dawu - p. 400-425 , 2024
 
?
2

FaBFT: Flexible Asynchronous BFT Protocol Using DAG:

, In: Information Security and Cryptology; Lecture Notes in Computer Science,
Song, Yu ; Long, Yu ; Xu, Xian. - p. 343-355 , 2024
 
?
 
?
5

More Efficient Public-Key Cryptography with Leakage and Tam..:

, In: Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2024,
Han, Shuai ; Liu, Shengli ; Gu, Dawu - p. 3-34 , 2024
 
?
6

BlindShuffler: Universal and Trustless Mixing for Confident..:

, In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security,
Wang, Chenke ; Ge, Zhonghui ; Long, Yu... - p. 1430-1446 , 2024
 
?
7

Enabling Fast and Privacy-Preserving Broadcast Authenticati..:

Lyu, Chen ; Pande, Amit ; Zhang, Yuanyuan..
IEEE Transactions on Mobile Computing.  23 (2024)  4 - p. 3309-3327 , 2024
 
?
8

Optimized Hardware-Software Co-Design for Kyber and Dilithi..:

Wang, Tengfei ; Zhang, Chi ; Zhang, Xiaolin..
IACR Transactions on Cryptographic Hardware and Embedded Systems.  2024 (2024)  3 - p. 99-135 , 2024
 
?
9

On the (In)Security of Manufacturer-Provided Remote Attesta..:

, In: Computer Security – ESORICS 2023; Lecture Notes in Computer Science,
Zhou, Ziyi ; Xiao, Xuangan ; Hou, Tianxiao.. - p. 250-270 , 2024
 
?
10

A Refined Hardness Estimation of LWE in Two-Step Mode:

, In: Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2024,
Xia, Wenwen ; Wang, Leizhang ; Wang, Geng.. - p. 3-35 , 2024
 
?
11

Function-Hiding Zero Predicate Inner Product Functional Enc..:

, In: Lecture Notes in Computer Science; Information Security,
Wan, Ming ; Wang, Geng ; Sun, Shi-Feng. - p. 516-534 , 2023
 
?
12

Statistical Differential Fault Analysis of the Saturnin Lig..:

Li, Wei ; Liu, Chun ; Gu, Dawu..
IEEE Transactions on Information Forensics and Security.  18 (2023)  - p. 1487-1496 , 2023
 
?
13

Old School, New Primitive: Toward Scalable PUF-Based Authen..:

Zhang, Xiaolin ; Gu, Dawu ; Wang, Tengfei.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.  42 (2023)  12 - p. 4569-4582 , 2023
 
?
14

EKE Meets Tight Security in the Universally Composable Fram..:

, In: Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2023,
Liu, Xiangyu ; Liu, Shengli ; Han, Shuai. - p. 685-713 , 2023
 
?
15

Almost Tight Multi-user Security Under Adaptive Corruptions..:

, In: Advances in Cryptology – CRYPTO 2023; Lecture Notes in Computer Science,
Han, Shuai ; Liu, Shengli ; Wang, Zhedong. - p. 682-715 , 2023
 
1-15