default search action
Yupu Hu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c43]Huiwen Jia, Yupu Hu, Chunming Tang, Lin Wang:
Towards Compact Identity-Based Encryption on Ideal Lattices. CT-RSA 2024: 354-378 - [i20]Huiwen Jia, Yupu Hu, Chunming Tang, Lin Wang:
Towards Compact Identity-based Encryption on Ideal Lattices. IACR Cryptol. ePrint Arch. 2024: 26 (2024) - 2023
- [j104]Wenju Xu, Baocang Wang, Yupu Hu, Pu Duan, Benyu Zhang, Momeng Liu:
Multi-key Fully Homomorphic Encryption from Additive Homomorphism. Comput. J. 66(1): 197-207 (2023) - [j103]Jun Liu, Dachao Wang, Yupu Hu, Jie Chen, Baocang Wang:
Improved integral cryptanalysis of SPNbox in digital rights management systems. IET Inf. Secur. 17(1): 147-158 (2023) - [i19]Yupu Hu, Siyue Dong, Baocang Wang, Xingting Dong:
On the Invalidity of LV16/Lin17 Obfuscation Schemes. IACR Cryptol. ePrint Arch. 2023: 692 (2023) - [i18]Yupu Hu, Siyue Dong, Baocang Wang, Xingting Dong:
On the Invalidity of LV16/Lin17 Obfuscation Schemes Revisited. IACR Cryptol. ePrint Arch. 2023: 1291 (2023) - 2022
- [j102]Jun Liu, Vincent Rijmen, Yupu Hu, Jie Chen, Baocang Wang:
WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix. Sci. China Inf. Sci. 65(3) (2022) - [j101]Jun Liu, Dachao Wang, Yupu Hu, Jie Chen, Baocang Wang:
Improved key-recovery attacks on reduced-round WEM-8. Des. Codes Cryptogr. 90(10): 2419-2448 (2022) - [j100]Huiwen Jia, Yupu Hu, Chunming Tang:
Lattice-based hash-and-sign signatures using approximate trapdoor, revisited. IET Inf. Secur. 16(1): 41-50 (2022) - [j99]Furong Li, Yange Chen, Pu Duan, Benyu Zhang, Zhiyong Hong, Yupu Hu, Baocang Wang:
Privacy-preserving convolutional neural network prediction with low latency and lightweight users. Int. J. Intell. Syst. 37(1): 568-595 (2022) - [j98]Yanhua Zhang, Ximeng Liu, Yupu Hu, Yong Gan, Huiwen Jia:
Verifier-local revocation group signatures with backward unlinkability from lattices. Frontiers Inf. Technol. Electron. Eng. 23(6): 876-892 (2022) - [j97]Songyang Wu, Wenju Xu, Zhiyong Hong, Pu Duan, Benyu Zhang, Yupu Hu, Baocang Wang:
Updatable privacy-preserving itK-nearest neighbor query in location-based s-ervice. Peer-to-Peer Netw. Appl. 15(2): 1076-1089 (2022) - [j96]Wenjuan Jia, Guanhao Xue, Baocang Wang, Yupu Hu:
Module-LWE-Based Key Exchange Protocol Using Error Reconciliation Mechanism. Secur. Commun. Networks 2022: 8299232:1-8299232:7 (2022) - [j95]Wenju Xu, Qingqing Zhao, Yu Zhan, Baocang Wang, Yupu Hu:
Privacy-preserving association rule mining based on electronic medical system. Wirel. Networks 28(1): 303-317 (2022) - [c42]Yanhua Zhang, Ximeng Liu, Yupu Hu:
Simplified Server-Aided Revocable Identity-Based Encryption from Lattices. ProvSec 2022: 71-87 - [i17]Yupu Hu, Siyue Dong, Baocang Wang, Jun Liu:
Notes on Reusable Garbling. IACR Cryptol. ePrint Arch. 2022: 1208 (2022) - 2021
- [j94]Yupu Hu, Siyue Dong, Xingting Dong:
Analysis on Aigis-Enc: Asymmetrical and symmetrical. IET Inf. Secur. 15(2): 147-155 (2021) - [j93]Xingting Dong, Yupu Hu, Baocang Wang, Momeng Liu, Wen Gao:
Lattice-based revocable attribute-based encryption with decryption key exposure resistance. IET Inf. Secur. 15(6): 428-441 (2021) - [j92]Jiangshan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao:
Novel efficient identity-based signature on lattices. Frontiers Inf. Technol. Electron. Eng. 22(2): 244-250 (2021) - [j91]Wenju Xu, Baocang Wang, Rongxing Lu, Quanbo Qu, Yange Chen, Yupu Hu:
Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials. Secur. Commun. Networks 2021: 5553256:1-5553256:14 (2021) - [c41]Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:
Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security. ACNS Workshops 2021: 332-345 - [c40]Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia:
Revocable Identity-Based Encryption with Server-Aided Ciphertext Evolution from Lattices. Inscrypt 2021: 442-465 - [c39]Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia:
Cloud-Aided Scalable Revocable Identity-Based Encryption with Ciphertext Update from Lattices. FCS 2021: 269-287 - [c38]Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia:
On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices. NSS 2021: 79-99 - [c37]Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia:
Cryptanalysis of a Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018. NSS 2021: 369-382 - [i16]Yupu Hu, Xingting Dong, Baocang Wang:
Size of IK00 Branching Program. IACR Cryptol. ePrint Arch. 2021: 400 (2021) - [i15]Yupu Hu, Jun Liu, Baocang Wang, Xingting Dong, Yanbin Pan:
P/poly Invalidity of the Agr17 Functional Encryption Scheme. IACR Cryptol. ePrint Arch. 2021: 1442 (2021) - [i14]Yupu Hu, Siyue Dong, Baocang Wang, Jun Liu:
A Note on P/poly Validity of GVW15 Predicate Encryption Scheme. IACR Cryptol. ePrint Arch. 2021: 1602 (2021) - 2020
- [j90]Zhen Zhao, Ge Wu, Fuchun Guo, Willy Susilo, Yi Mu, Baocang Wang, Yupu Hu:
Black-Box Accountable Authority Identity-Based Revocation System. Comput. J. 63(4): 525-535 (2020) - [j89]Zhen Zhao, Fuchun Guo, Jianchang Lai, Willy Susilo, Baocang Wang, Yupu Hu:
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts. Theor. Comput. Sci. 809: 73-87 (2020) - [c36]Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:
Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from Lattices. WISA 2020: 334-346 - [i13]Yupu Hu, Siyue Dong, Xingting Dong:
Analysis on Aigis-Enc: asymmetrical and symmetrical. IACR Cryptol. ePrint Arch. 2020: 36 (2020)
2010 – 2019
- 2019
- [j88]Zhen Zhao, Jianchang Lai, Willy Susilo, Baocang Wang, Yupu Hu, Fuchun Guo:
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption. IEEE Access 7: 25936-25947 (2019) - [j87]Yupu Hu, Jiangshan Chen, Shanshan Zhang:
Collusion Trap Against GVW'13 ABE. IEEE Access 7: 36334-36339 (2019) - [j86]Momeng Liu, Yupu Hu, Shanshan Zhang, Linming Gong:
Smooth Hash Proof System Based on the Learning With Errors Problem With Multi-Bit Key Output. IEEE Access 7: 155143-155157 (2019) - [j85]Yupu Hu, Huiwen Jia:
A new Gaussian sampling for trapdoor lattices with arbitrary modulus. Des. Codes Cryptogr. 87(11): 2553-2570 (2019) - [j84]Momeng Liu, Yupu Hu:
Universally composable oblivious transfer from ideal lattice. Frontiers Comput. Sci. 13(4): 879-906 (2019) - [j83]Yupu Hu, Shanshan Zhang, Jiangshan Chen, Baocang Wang:
Revisiting BGG+14 ABE with weakness analysis. IET Inf. Secur. 13(6): 685-691 (2019) - [j82]Yupu Hu, Zhizhu Lian, Jiangshan Chen, Baocang Wang, Shanshan Zhang:
Algebraic Attacks Against Several Weak Variants of GVW'13 ABE. Int. J. Found. Comput. Sci. 30(4): 607-618 (2019) - [j81]Wen Gao, Liqun Chen, Yupu Hu, Christopher J. P. Newton, Baocang Wang, Jiangshan Chen:
Lattice-based deniable ring signatures. Int. J. Inf. Sec. 18(3): 355-370 (2019) - [j80]Zhen Zhao, Ge Wu, Willy Susilo, Fuchun Guo, Baocang Wang, Yupu Hu:
Accountable identity-based encryption with distributed private key generators. Inf. Sci. 505: 352-366 (2019) - [j79]Yanhua Zhang, Yupu Hu, Yong Gan, Yifeng Yin, Huiwen Jia:
Efficient fuzzy identity-based signature from lattices for identities in a small (or large) universe. J. Inf. Secur. Appl. 47: 86-93 (2019) - [j78]Jiangshan Chen, Yupu Hu, Wen Gao, Hong-Liang Li:
Lattice-based Threshold Ring Signature with Message Block Sharing. KSII Trans. Internet Inf. Syst. 13(2): 1003-1019 (2019) - [c35]Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:
Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease. CANS 2019: 120-140 - [c34]Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:
Attribute-Based Signatures for Inner-Product Predicate from Lattices. CSS (1) 2019: 173-185 - [c33]Yanhua Zhang, Yupu Hu, Qikun Zhang, Huiwen Jia:
On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local Revocation. ISC 2019: 190-208 - [i12]Zhizhu Lian, Yupu Hu, Hu Chen, Baocang Wang:
Faster Bootstrapping of FHE over the integers with large prime message space. IACR Cryptol. ePrint Arch. 2019: 561 (2019) - 2018
- [j77]Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu:
Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud. Int. J. High Perform. Comput. Netw. 11(1): 45-54 (2018) - [j76]Huiwen Jia, Yupu Hu:
Extensional schemes of multipartite non-interactive key exchange from multilinear maps and their applications. Int. J. High Perform. Comput. Netw. 12(2): 148-155 (2018) - [j75]Baocang Wang, Hao Lei, Yupu Hu:
D-NTRU: More efficient and average-case IND-CPA secure NTRU variant. Inf. Sci. 438: 15-31 (2018) - [j74]Zhizhu Lian, Yupu Hu, Hu Chen, Baocang Wang:
Bootstrapping of FHE over the Integers with Large Message Space. Secur. Commun. Networks 2018: 6520258:1-6520258:11 (2018) - 2017
- [j73]Huiwen Jia, Yupu Hu:
Cryptanalysis of multilinear maps from ideal lattices: revisited. Des. Codes Cryptogr. 84(3): 311-324 (2017) - [j72]Wen Gao, Yupu Hu, Baocang Wang, Jia Xie:
Improved identification protocol in the quantum random oracle model.. Int. Arab J. Inf. Technol. 14(3): 339-345 (2017) - [j71]Fengrong Zhang, Shixiong Xia, Yupu Hu, Min Xie:
Constructions of involutions with optimal minimum degree. IET Inf. Secur. 11(5): 261-266 (2017) - [j70]Leyou Zhang, Zongchen Sun, Yi Mu, Yupu Hu:
Revocable hierarchical identity-based encryption over lattice for pay-TV systems. Int. J. Embed. Syst. 9(4): 379-398 (2017) - [j69]Momeng Liu, Yu-Pu Hu:
Equational Security of a Lattice-based Oblivious Transfer Protocol. J. Netw. Intell. 2(3): 231-249 (2017) - [j68]Momeng Liu, Juliane Krämer, Yu-pu Hu, Johannes Buchmann:
Quantum security analysis of a lattice-based oblivious transfer protocol. Frontiers Inf. Technol. Electron. Eng. 18(9): 1348-1369 (2017) - 2016
- [j67]Fengrong Zhang, Claude Carlet, Yupu Hu, Wenzheng Zhang:
New secondary constructions of Bent functions. Appl. Algebra Eng. Commun. Comput. 27(5): 413-434 (2016) - [j66]Jin Sun, Yupu Hu:
Chosen-ciphertext secure bidirectional proxy broadcast re-encryption schemes. Int. J. Inf. Commun. Technol. 8(4): 405-419 (2016) - [j65]Yanhua Zhang, Yupu Hu, Wen Gao, Mingming Jiang:
Simpler Efficient Group Signature Scheme with Verifier-Local Revocation from Lattices. KSII Trans. Internet Inf. Syst. 10(1): 414-430 (2016) - [j64]Jia Xie, Yupu Hu, Juntao Gao, Wen Gao, Mingming Jiang:
Efficient Certificateless Signature Scheme on NTRU Lattice. KSII Trans. Internet Inf. Syst. 10(10): 5190-5208 (2016) - [j63]Jia Xie, Yupu Hu, Juntao Gao, Wen Gao:
Efficient identity-based signature over NTRU lattice. Frontiers Inf. Technol. Electron. Eng. 17(2): 135-142 (2016) - [j62]He Wang, Yuqing Zhang, Xuefeng Liu, YuPu Hu:
Efficient quantum dialogue using entangled states and entanglement swapping without information leakage. Quantum Inf. Process. 15(6): 2593-2603 (2016) - [j61]Zhenhua Liu, Xiangsong Zhang, Yupu Hu, Tsuyoshi Takagi:
Revocable and strongly unforgeable identity-based signature scheme in the standard model. Secur. Commun. Networks 9(14): 2422-2433 (2016) - [j60]Yanhua Zhang, Yupu Hu, Jia Xie, Mingming Jiang:
Efficient ring signature schemes over NTRU Lattices. Secur. Commun. Networks 9(18): 5252-5261 (2016) - [j59]Jia Xie, Yupu Hu, Juntao Gao:
Multi-use unidirectional lattice-based proxy re-signatures in standard model. Secur. Commun. Networks 9(18): 5615-5624 (2016) - [c32]Wen Gao, Yupu Hu, Baocang Wang, Jia Xie:
Identity-Based Blind Signature from Lattices in Standard Model. Inscrypt 2016: 205-218 - [c31]Yupu Hu, Huiwen Jia:
Cryptanalysis of GGH Map. EUROCRYPT (1) 2016: 537-565 - 2015
- [j58]Hu Chen, Yupu Hu, Zhizhu Lian, Huiwen Jia, Xu An Wang:
An Additively Homomorphic Encryption over Large Message Space. Int. J. Inf. Technol. Web Eng. 10(3): 82-102 (2015) - [j57]Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi:
Revocable Identity-based Signcryption Scheme Without Random Oracles. Int. J. Netw. Secur. 17(2): 110-122 (2015) - [j56]Qiqi Lai, Yupu Hu, Yuan Chen, Baocang Wang, Fenghe Wang:
New method of key-dependent message security for asymmetric encryption. Secur. Commun. Networks 8(13): 2157-2170 (2015) - [j55]Mingming Jiang, Yupu Hu, Baocang Wang, F. H. Wang, Qiqi Lai:
Lattice-based multi-use unidirectional proxy re-encryption. Secur. Commun. Networks 8(18): 3796-3803 (2015) - [c30]Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu:
Fully Secure Hierarchical Inner Product Encryption for Privacy Preserving Keyword Searching in Cloud. 3PGCIC 2015: 449-453 - [c29]Huiwen Jia, Yupu Hu, Xu An Wang, Zheliang Liu, Wei Xiong:
Extensional Schemes of Multipartite Non-interactive Key Exchange from Multilinear Maps. 3PGCIC 2015: 771-774 - [c28]Hu Chen, Yupu Hu, Huiwen Jia:
An Additively Homomorphic Encryption from Ideal Lattices. 3PGCIC 2015: 780-784 - [i11]Yupu Hu, Huiwen Jia:
Cryptanalysis of GGH Map. IACR Cryptol. ePrint Arch. 2015: 301 (2015) - [i10]Yupu Hu, Huiwen Jia:
A Comment on Gu Map-1. IACR Cryptol. ePrint Arch. 2015: 448 (2015) - [i9]Yupu Hu, Huiwen Jia:
An Optimization of Gu Map-1. IACR Cryptol. ePrint Arch. 2015: 453 (2015) - 2014
- [j54]Yupu Hu, Hao Lei, Fenghe Wang, Wenzheng Zhang:
Gaussian sampling of lattices for cryptographic applications. Sci. China Inf. Sci. 57(7): 1-8 (2014) - [j53]Qiqi Lai, Yuan Chen, Yupu Hu, Baocang Wang, Mingming Jiang:
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model. Frontiers Comput. Sci. 8(3): 469-477 (2014) - [j52]Mingming Jiang, Yupu Hu, Hao Lei, Baocang Wang, Qiqi Lai:
Lattice-based certificateless encryption scheme. Frontiers Comput. Sci. 8(5): 828-836 (2014) - [j51]Baocang Wang, Fagen Li, Yupu Hu:
Improvement on a Knapsack-Based Probabilistic Encryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 421-424 (2014) - [j50]Fengrong Zhang, Claude Carlet, Yupu Hu, Tian-Jie Cao:
Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions. Inf. Sci. 283: 94-106 (2014) - [j49]Baocang Wang, Yupu Hu:
Signature Scheme Using the Root Extraction Problem on Quaternions. J. Appl. Math. 2014: 819182:1-819182:7 (2014) - [j48]Baocang Wang, Yupu Hu, Xixiang Lv:
Indistinguishable against adaptive chosen ciphertext attack secure public key cryptosystem with double trapdoor decryption mechanism. Secur. Commun. Networks 7(11): 1805-1814 (2014) - 2013
- [j47]Fenghe Wang, Yupu Hu, Baocang Wang:
Lattice-based linearly homomorphic signature scheme over binary field. Sci. China Inf. Sci. 56(11): 1-9 (2013) - [j46]Yang Yang, Yupu Hu, Chun-hui Sun, Chao Lv, Leyou Zhang:
An efficient group key agreement scheme for mobile ad-hoc networks. Int. Arab J. Inf. Technol. 10(1): 10-17 (2013) - [j45]Jin Sun, Yupu Hu, Leyou Zhang:
A key-policy attribute-based broadcast encryption. Int. Arab J. Inf. Technol. 10(5): 444-452 (2013) - [j44]Yupu Hu, Fengrong Zhang, Wenzheng Zhang:
Hard fault analysis of Trivium. Inf. Sci. 229: 142-158 (2013) - [j43]Leyou Zhang, Yupu Hu:
New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing. KSII Trans. Internet Inf. Syst. 7(5): 1343-1356 (2013) - [j42]Yang Yang, Yupu Hu, Leyou Zhang:
An Efficient Biometric Identity Based Signature Scheme. KSII Trans. Internet Inf. Syst. 7(8): 2010-2026 (2013) - [j41]Baocang Wang, Yupu Hu:
Sieve Method for Polynomial Linear Equivalence. J. Appl. Math. 2013: 872962:1-872962:8 (2013) - [j40]Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Fagen Li:
Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model. Secur. Commun. Networks 6(1): 69-77 (2013) - [j39]Huan Yang, Yuqing Zhang, Yu-pu Hu, Qixu Liu:
IKE vulnerability discovery based on fuzzing. Secur. Commun. Networks 6(7): 889-901 (2013) - [j38]Yan-Xiao Liu, Yuqing Zhang, Lein Harn, Yu-pu Hu:
Verifiable symmetric polynomial-based key distribution schemes. Secur. Commun. Networks 6(8): 1028-1034 (2013) - [c27]Senshan Pan, Yupu Hu, Baocang Wang:
The termination of the F5 algorithm revisited. ISSAC 2013: 291-298 - 2012
- [j37]Claude Carlet, Fengrong Zhang, Yupu Hu:
Secondary constructions of bent functions and their enforcement. Adv. Math. Commun. 6(3): 305-314 (2012) - [j36]Yupu Hu, Juntao Gao, Qing Liu, Yiwei Zhang:
Fault analysis of Trivium. Des. Codes Cryptogr. 62(3): 289-311 (2012) - [j35]Fengrong Zhang, Yupu Hu, Yanyan Jia, Min Xie:
New constructions of balanced Boolean functions with high nonlinearity and optimal algebraic degree. Int. J. Comput. Math. 89(10): 1319-1331 (2012) - [j34]Juntao Gao, Yupu Hu, Xuelian Li:
Linear spans of optimal sets of frequency hopping sequences. RAIRO Theor. Informatics Appl. 46(3): 343-354 (2012) - [j33]Leyou Zhang, Yupu Hu, Qing Wu:
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups. Math. Comput. Model. 55(1-2): 12-18 (2012) - [j32]Yanyan Jia, Yupu Hu, Fenghe Wang, Hongxian Wang:
Correlation power analysis of Trivium. Secur. Commun. Networks 5(5): 479-484 (2012) - [j31]Fengrong Zhang, Yupu Hu, Min Xie, Yongzhuang Wei:
Constructions of 1-resilient Boolean functions on odd number of variables with a high nonlinearity. Secur. Commun. Networks 5(6): 614-624 (2012) - [j30]Yongzhuang Wei, Enes Pasalic, Yupu Hu:
Guess and Determine Attacks on Filter Generators - Revisited. IEEE Trans. Inf. Theory 58(4): 2530-2539 (2012) - [c26]Leyou Zhang, Qing Wu, Yupu Hu:
Direct CCA Secure Identity-Based Broadcast Encryption. NSS 2012: 348-360 - [i8]Fengrong Zhang, Claude Carlet, Yupu Hu, Wenzheng Zhang:
Secondary Constructions of Bent Functions and Highly Nonlinear Resilient Functions. CoRR abs/1211.4191 (2012) - [i7]Yupu Hu, Fenghe Wang:
An Attack on a Fully Homomorphic Encryption Scheme. IACR Cryptol. ePrint Arch. 2012: 561 (2012) - 2011
- [j29]Xuelian Li, Yupu Hu, Juntao Gao:
On the value distributions of Walsh spectrums of quadratic Plateaued functions. Comput. Electr. Eng. 37(6): 849-857 (2011) - [j28]Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma:
Provably secure multi-proxy signature scheme with revocation in the standard model. Comput. Commun. 34(3): 494-501 (2011) - [j27]Wenfeng Yang, Yupu Hu:
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions. Frontiers Comput. Sci. China 5(2): 158-162 (2011) - [j26]Xuelian Li, Yupu Hu, Juntao Gao:
Lower Bounds on the Second Order nonlinearity of Boolean Functions. Int. J. Found. Comput. Sci. 22(6): 1331-1349 (2011) - [j25]Leyou Zhang, Qing Wu, Yupu Hu:
New Constructions of Identity-based Broadcast Encryption without Random Oracles. KSII Trans. Internet Inf. Syst. 5(2): 428-439 (2011) - [j24]Leyou Zhang, Qing Wu, Yupu Hu:
Secure Identity-based Threshold Broadcast Encryption in the Standard Model. J. Networks 6(11): 1602-1609 (2011) - [j23]Leyou Zhang, Qing Wu, Yupu Hu:
New Constructions of Short Signatures in the Standard Model. J. Softw. 6(10): 1921-1928 (2011) - [j22]Yang Yang, Yupu Hu, Leyou Zhang, Chun-hui Sun:
CCA2 secure biometric identity based encryption with constant-size ciphertext. J. Zhejiang Univ. Sci. C 12(10): 819-827 (2011) - [j21]Yongzhuang Wei, Enes Pasalic, Yupu Hu:
A New Correlation Attack on Nonlinear Combining Generators. IEEE Trans. Inf. Theory 57(9): 6321-6331 (2011) - [c25]Yang Yang, Yupu Hu, Fengrong Zhang, Fenghe Wang:
New construction of identity-based encryption with wildcards. EMEIT 2011: 4728-4731 - [c24]Yongzhuang Wei, Jiqiang Lu, Yupu Hu:
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits. ISPEC 2011: 222-232 - 2010
- [j20]Baocang Wang, Yupu Hu:
Quadratic compact knapsack public-key cryptosystem. Comput. Math. Appl. 59(1): 194-206 (2010) - [j19]Baocang Wang, Yupu Hu:
A Novel Combinatorial Public Key Cryptosystem. Informatica 21(4): 611-626 (2010) - [j18]Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma:
Certificateless signcryption scheme in the standard model. Inf. Sci. 180(3): 452-464 (2010) - [j17]Leyou Zhang, Yupu Hu, Qing Wu:
Identity-based Threshold Broadcast Encryption in the Standard Model. KSII Trans. Internet Inf. Syst. 4(3): 400-410 (2010) - [c23]Fengrong Zhang, Yupu Hu, Hua Ma, Min Xie:
Constructions of Maiorana-McFarland's Bent Functions of Prescribed Degree. CIS 2010: 315-319 - [c22]Leyou Zhang, Yupu Hu, Qing Wu:
Short Signature from the Bilinear Pairing. ICICA (LNCS) 2010: 111-118 - [i6]Xuelian Li, Yupu Hu, Juntao Gao:
The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions. IACR Cryptol. ePrint Arch. 2010: 9 (2010) - [i5]Yongzhuang Wei, Jiqiang Lu, Yupu Hu:
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits. IACR Cryptol. ePrint Arch. 2010: 537 (2010)
2000 – 2009
- 2009
- [j16]Yongzhuang Wei, YuPu Hu:
New related-key rectangle attacks on reduced AES-192 and AES-256. Sci. China Ser. F Inf. Sci. 52(4): 617-626 (2009) - [j15]Leyou Zhang, Yupu Hu, Qing Wu:
New Construction of Short Hierarchical ID-Based Signature in the Standard Model. Fundam. Informaticae 90(1-2): 191-201 (2009) - [j14]Baocang Wang, Yupu Hu:
Signature scheme based on the root extraction problem over braid groups. IET Inf. Secur. 3(2): 53-59 (2009) - [c21]Baocang Wang, Hui Liu, Yupu Hu:
Cryptanalysis of a Knapsack Public Key Cryptosystem. IAS 2009: 49-52 - [c20]Weidong Zhang, Baocang Wang, Yupu Hu:
A New Knapsack Public-Key Cryptosystem. IAS 2009: 53-56 - [c19]Qiong Liu, Yupu Hu:
A Fast Correlation Attack via Parallel Computing. IAS 2009: 651-654 - [i4]Yupu Hu, Fengrong Zhang, Yiwei Zhang:
Hard Fault Analysis of Trivium. CoRR abs/0907.2315 (2009) - [i3]Yupu Hu, Juntao Gao, Qing Liu:
Floating Fault analysis of Trivium under Weaker Assumptions. IACR Cryptol. ePrint Arch. 2009: 169 (2009) - [i2]Yupu Hu, Fengrong Zhang, Yiwei Zhang:
Hard Fault Analysis of Trivium. IACR Cryptol. ePrint Arch. 2009: 333 (2009) - 2008
- [j13]Fagen Li, Xiangjun Xin, Yupu Hu:
Indentity-based broadcast signcryption. Comput. Stand. Interfaces 30(1-2): 89-94 (2008) - [j12]Fagen Li, Xiangjun Xin, Yupu Hu:
ID-based threshold proxy signcryption scheme from bilinear pairings. Int. J. Secur. Networks 3(3): 206-215 (2008) - [j11]Yifeng Yin, Xinshe Li, Yupu Hu:
Fast S-box security mechanism research based on the polymorphic cipher. Inf. Sci. 178(6): 1603-1610 (2008) - [j10]Yupu Hu, Baocang Wang, Wencai He:
NTRUSign With a New Perturbation. IEEE Trans. Inf. Theory 54(7): 3216-3221 (2008) - [c18]Xinshe Li, Lei Zhang, Yu-pu Hu:
A Novel Generation Key Scheme Based on DNA. CIS (1) 2008: 264-266 - [c17]Ningbo Mu, Yupu Hu, Leyou Zhang:
On the Computational Efficiency of XTR+. Inscrypt 2008: 305-313 - [c16]Xuanwu Zhou, Xiaoyuan Yang, Ping Wei, Yupu Hu:
Evolutionary Algorithm Based Immune Intrusion Analysis Engine. ICNC (7) 2008: 138-142 - [c15]Leyou Zhang, Yupu Hu, Ningbo Mu:
An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks. ICYCS 2008: 1619-1623 - [c14]Zhenhua Liu, Yupu Hu, Hua Ma:
Secure Proxy Multi-signature Scheme in the Standard Model. ProvSec 2008: 127-140 - 2007
- [j9]Jie Chen, YuPu Hu, Yueyu Zhang:
Impossible differential cryptanalysis of Advanced Encryption Standard. Sci. China Ser. F Inf. Sci. 50(3): 342-350 (2007) - [j8]Fagen Li, Yupu Hu:
Security Analysis of the Pomykala-Barabasz Scheme. Fundam. Informaticae 80(4): 453-459 (2007) - [j7]Fagen Li, Xiangjun Xin, Yupu Hu:
Key management in ad hoc networks using self-certified public key system. Int. J. Mob. Commun. 5(1): 94-106 (2007) - [j6]Baocang Wang, Qianhong Wu, Yupu Hu:
A knapsack-based probabilistic encryption scheme. Inf. Sci. 177(19): 3981-3994 (2007) - [c13]Fagen Li, Yupu Hu, Chuanrong Zhang:
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks. ACNS 2007: 373-384 - [c12]Xuanwu Zhou, Xiaoyuan Yang, Ping Wei, Yupu Hu:
BSADF: Blind Signature Based Anonymous Digital Fingerprint. FSKD (4) 2007: 426-430 - [c11]Xuanwu Zhou, Xiaoyuan Yang, Ping Wei, Yupu Hu:
Dynamic Group Signature with Forward Security and Its Application. GCC 2007: 473-480 - [c10]Yongzhuang Wei, Yupu Hu:
Maximum Autocorrelation Analysis of Nonlinear Combining Functions in Stream Ciphers. ISIT 2007: 176-180 - 2006
- [j5]Fagen Li, Xiangjun Xin, Yupu Hu:
ID-based Signcryption Scheme with (t, n) Shared Unsigncryption. Int. J. Netw. Secur. 3(2): 155-159 (2006) - [c9]Fagen Li, Yupu Hu, Shuanggen Liu:
ID-Based ( t , n ) Threshold Proxy Signcryption for Multi-agent Systems. CIS 2006: 406-416 - [c8]Baocang Wang, Yupu Hu:
Diophantine Approximation Attack on a Fast Public Key Cryptosystem. ISPEC 2006: 25-32 - [c7]Lihua Dong, Yupu Hu, Yong Zeng:
Computing the k-Error N-Adic Complexity of a Sequence of Period pn. SETA 2006: 190-198 - [c6]Yiliang Han, Xiaoyuan Yang, Ping Wei, Yuming Wang, Yupu Hu:
ECGSC: Elliptic Curve Based Generalized Signcryption. UIC 2006: 956-965 - [i1]Fagen Li, Yupu Hu, Shuanggen Liu:
Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings. IACR Cryptol. ePrint Arch. 2006: 338 (2006) - 2005
- [c5]Lihua Dong, Yong Zeng, Yupu Hu:
Stability of the Linear Complexity of the Generalized Self-shrinking Sequences. CIS (2) 2005: 68-73 - [c4]Fagen Li, Juntao Gao, Yupu Hu:
ID-Based Threshold Unsigncryption Scheme from Pairings. CISC 2005: 242-253 - [c3]Yongzhuang Wei, Yu-pu Hu:
A construction of resilient functions with satisfying synthetical cryptographic criteria. ITW 2005: 248-252 - 2004
- [j4]Yupu Hu, Guozhen Xiao:
Pseudo-randomness of the fourth class of GSS sequences. Sci. China Ser. F Inf. Sci. 47(2): 170-183 (2004) - [j3]Yupu Hu, Guozhen Xiao:
Stream cipher based on GSS sequences. Sci. China Ser. F Inf. Sci. 47(6): 681-696 (2004) - [j2]Yupu Hu, Guozhen Xiao:
Generalized self-shrinking generator. IEEE Trans. Inf. Theory 50(4): 714-719 (2004) - [c2]Yongzhuang Wei, Yu-Pu Hu:
New construction of resilient functions with satisfying multiple cryptographic criteria. InfoSecu 2004: 175-180 - [c1]Yiliang Han, Xiaoyuan Yang, Yupu Hu:
Signcryption based on elliptic curve and its multi-party schemes. InfoSecu 2004: 216-217 - 2003
- [j1]Yupu Hu, Guozhen Xiao:
Resilient functions over finite fields. IEEE Trans. Inf. Theory 49(8): 2040-2046 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint