default search action
Yuyu Wang 0001
Person information
- unicode name: 王煜宇
- affiliation: University of Electronic Science and Technology of China, Chengdu, China
- affiliation (former): Tokyo Institute of Technology, Department of Mathematical and Computing Sciences, Japan
- affiliation (former): National Institute of Advanced Industrial Science and Technology (AIST), Tokyo, Japan
Other persons with the same name
- Yuyu Wang (aka: Yu-Yu Wang) — disambiguation page
- Yuyu Wang 0002 — Beijing University of Posts and Telecommunications, Wireless Signal Processing and Network Lab, China
- Yuyu Wang 0003 — University of Eastern Finland, Finland
- Yuyu Wang 0004 — Changchun University of Science and Technology, School of Electronic Information Engineering, China
- Yuyu Wang 0005 — Beijing Forestry University, Centre for East Asian-Australasian Flyway Studies, School of Ecology and Nature Conservation, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Yuyu Wang, Chuanjie Su, Jiaxin Pan:
Fine-Grained Non-interactive Key-Exchange Without Idealized Assumptions. CRYPTO (2) 2024: 251-285 - 2023
- [j5]Yuyu Wang, Jiaxin Pan, Yu Chen:
Fine-Grained Secure Attribute-Based Encryption. J. Cryptol. 36(4): 33 (2023) - [c15]Yuyu Wang, Chuanjie Su, Jiaxin Pan, Yu Chen:
A Simple and Efficient Framework of Proof Systems for NP. ASIACRYPT (2) 2023: 174-207 - [i11]Yuyu Wang, Jiaxin Pan:
Unconditionally Secure NIZK in the Fine-Grained Setting. IACR Cryptol. ePrint Arch. 2023: 15 (2023) - [i10]Yuyu Wang, Jiaxin Pan, Yu Chen:
Fine-Grained Secure Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2023: 1327 (2023) - [i9]Yuyu Wang, Chuanjie Su, Jiaxin Pan, Yu Chen:
A Simple and Efficient Framework of Proof Systems for NP. IACR Cryptol. ePrint Arch. 2023: 1857 (2023) - 2022
- [c14]Yuyu Wang, Jiaxin Pan:
Unconditionally Secure NIZK in the Fine-Grained Setting. ASIACRYPT (2) 2022: 437-465 - [c13]Yuyu Wang, Jiaxin Pan:
Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security. EUROCRYPT (2) 2022: 305-335 - [i8]Yuyu Wang, Jiaxin Pan:
Non-Interactive Zero-Knowledge Proofs with Fine-Grained Security. IACR Cryptol. ePrint Arch. 2022: 548 (2022) - 2021
- [j4]Shohei Egashira, Yuyu Wang, Keisuke Tanaka:
Fine-Grained Cryptography Revisited. J. Cryptol. 34(3): 23 (2021) - [c12]Yu Chen, Qiang Tang, Yuyu Wang:
Hierarchical Integrated Signature and Encryption - (or: Key Separation vs. Key Reuse: Enjoy the Best of both Worlds). ASIACRYPT (2) 2021: 514-543 - [c11]Yuyu Wang, Jiaxin Pan, Yu Chen:
Fine-Grained Secure Attribute-Based Encryption. CRYPTO (4) 2021: 179-207 - [c10]Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties. Public Key Cryptography (1) 2021: 389-420 - [i7]Yu Chen, Qiang Tang, Yuyu Wang:
Hierarchical Integrated Signature and Encryption. IACR Cryptol. ePrint Arch. 2021: 1237 (2021)
2010 – 2019
- 2019
- [c9]Shohei Egashira, Yuyu Wang, Keisuke Tanaka:
Fine-Grained Cryptography Revisited. ASIACRYPT (3) 2019: 637-666 - [c8]Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Jiaxin Pan, Arnab Roy, Yuyu Wang:
Shorter QA-NIZK and SPS with Tighter Security. ASIACRYPT (3) 2019: 669-699 - [i6]Masayuki Abe, Charanjit S. Jutla, Miyako Ohkubo, Jiaxin Pan, Arnab Roy, Yuyu Wang:
Shorter QA-NIZK and SPS with Tighter Security. IACR Cryptol. ePrint Arch. 2019: 1284 (2019) - [i5]Shohei Egashira, Yuyu Wang, Keisuke Tanaka:
Fine-Grained Cryptography Revisited. IACR Cryptol. ePrint Arch. 2019: 1488 (2019) - 2018
- [c7]Yu Chen, Yuyu Wang, Hong-Sheng Zhou:
Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation. ASIACRYPT (2) 2018: 575-606 - [c6]Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Memory Lower Bounds of Reductions Revisited. EUROCRYPT (1) 2018: 61-90 - [i4]Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Memory Lower Bounds of Reductions Revisited. IACR Cryptol. ePrint Arch. 2018: 155 (2018) - [i3]Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties. IACR Cryptol. ePrint Arch. 2018: 564 (2018) - [i2]Yu Chen, Yuyu Wang, Hong-Sheng Zhou:
Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation. IACR Cryptol. ePrint Arch. 2018: 781 (2018) - 2017
- [j3]Yuyu Wang, Keisuke Tanaka:
Generic Transformation for Signatures in the Continual Leakage Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1857-1869 (2017) - [p1]Yuyu Wang, Keisuke Tanaka:
How to Strengthen the Security of Signature Schemes in the Leakage Models: A Survey. CREST Crypto-Math Project 2017: 315-330 - 2016
- [j2]Yuyu Wang, Keisuke Tanaka:
Strongly simulation-extractable leakage-resilient NIZK. Int. J. Inf. Sec. 15(1): 67-79 (2016) - [j1]Yuyu Wang, Keisuke Tanaka:
Generic transformations for existentially unforgeable signature schemes in the bounded leakage model. Secur. Commun. Networks 9(12): 1829-1842 (2016) - [c5]Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones. ASIACRYPT (2) 2016: 465-495 - [c4]Yuyu Wang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Signatures Resilient to Uninvertible Leakage. SCN 2016: 372-390 - [i1]Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones. IACR Cryptol. ePrint Arch. 2016: 877 (2016) - 2015
- [c3]Yuyu Wang, Keisuke Tanaka:
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency. ACISP 2015: 213-229 - 2014
- [c2]Yuyu Wang, Keisuke Tanaka:
Strongly Simulation-Extractable Leakage-Resilient NIZK. ACISP 2014: 66-81 - [c1]Yuyu Wang, Keisuke Tanaka:
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency. ProvSec 2014: 117-129
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint