default search action
Wei Yu 0008
Person information
- affiliation: Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
- affiliation: University of Science and Technology of China, Hefei
Other persons with the same name
- Wei Yu — disambiguation page
- Wei Yu 0001 — University of Toronto, Department of Electrical and Computer Engineering, ON, Canada (and 1 more)
- Wei Yu 0002 — Towson University, Department of Computer & Information Sciences (and 1 more)
- Wei Yu 0003 — Microsoft Corporation, Redmond, USA (and 1 more)
- Wei Yu 0004 — Harbin Institute of Technology, School of Computer Science and Technology, China
- Wei Yu 0005 — Citadel Investment Group, Chicago, USA (and 1 more)
- Wei Yu 0006 — Centers for Disease Control and Prevention, Atlanta, USA
- Wei Yu 0007 — Tsinghua University, National Laboratory for Information Science and Technology (and 2 more)
- Wei Yu 0009 — Wuhan University, Computer School, China
- Wei Yu 0010 — Zhijiang University, Hangzhou, China
- Wei Yu 0011 — East China University of Science and Technology, Shanghai, China
- Wei Yu 0012 — Xiamen University, China
- Wei Yu 0013 — Earth Resources Technology, Inc., Laurel, MD, USA
- Wei Yu 0014 — Graz University of Technology, Austria
- Wei Yu 0015 — Nanjing Forestry University, College of Automobile and Transport Engineering, China
- Wei Yu 0016 — Tianjin University, School of Computer Science and Technology, China
- Wei Yu 0017 — Nantong University, School of Electronics and Information / Engineering Training Center, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Xiuxiu Li, Wei Yu, Kunpeng Wang:
A Novel Window τNAF on Koblitz Curves. ACISP (1) 2024: 411-428 - [c23]Luying Li, Wei Yu, Peng Xu:
Fast and Simple Point Operations on Edwards448 and E448. Public Key Cryptography (4) 2024: 389-411 - 2023
- [c22]Xiuxiu Li, Wei Yu, Kunpeng Wang:
Implementation of the Elliptic Curve Method. SciSec 2023: 115-126 - [c21]Xiuxiu Li, Wei Yu, Kunpeng Wang, Luying Li:
Almost Injective and Invertible Encodings for Jacobi Quartic Curves. SciSec 2023: 127-138 - 2022
- [c20]Simeng Yuan, Wei Yu, Kunpeng Wang, Xiuxiu Li:
Partial Key Exposure Attacks on RSA with Moduli N=prqs. ISIT 2022: 1436-1440 - [c19]Xiuxiu Li, Wei Yu, Kunpeng Wang:
Efficient Scalar Multiplication on Koblitz Curves with Pre-computation. ISC 2022: 162-172 - 2021
- [c18]Wei Yu, Guangwu Xu:
Pre-computation Scheme of Window τNAF for Koblitz Curves Revisited. EUROCRYPT (2) 2021: 187-218 - [i4]Wei Yu, Guangwu Xu:
Pre-Computation Scheme of Window τNAF for Koblitz Curves Revisited. IACR Cryptol. ePrint Arch. 2021: 171 (2021) - 2020
- [j2]Xingran Li, Wei Yu, Bao Li:
Parallel and Regular Algorithm of Elliptic Curve Scalar Multiplication over Binary Fields. Secur. Commun. Networks 2020: 4087873:1-4087873:10 (2020) - [c17]Wei Yu, Saud Al Musa, Bao Li:
Double-Base Chains for Scalar Multiplications on Elliptic Curves. EUROCRYPT (3) 2020: 538-565 - [i3]Wei Yu, Saud Al Musa, Bao Li:
Double-Base Chains for Scalar Multiplications on Elliptic Curves. IACR Cryptol. ePrint Arch. 2020: 144 (2020)
2010 – 2019
- 2019
- [c16]Weixuan Li, Wei Yu, Bao Li, Xuejun Fan:
Speeding up Scalar Multiplication on Koblitz Curves Using \mu _4 Coordinates. ACISP 2019: 620-629 - [c15]Xiu Xu, Christopher Leonardi, Anzo Teh, David Jao, Kunpeng Wang, Wei Yu, Reza Azarderakhsh:
Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings. ISPEC 2019: 293-309 - 2018
- [j1]Song Tian, Bao Li, Kunpeng Wang, Wei Yu:
Cover attacks for elliptic curves with cofactor two. Des. Codes Cryptogr. 86(11): 2451-2468 (2018) - [i2]Xiu Xu, Haiyang Xue, Kunpeng Wang, Song Tian, Bei Liang, Wei Yu:
Strongly Secure Authenticated Key Exchange from Supersingular Isogeny. IACR Cryptol. ePrint Arch. 2018: 760 (2018) - 2017
- [c14]Xiaoyang He, Wei Yu, Kunpeng Wang:
Hashing into Twisted Jacobi Intersection Curves. Inscrypt 2017: 117-138 - [i1]Wei Yu, Saud Al Musa, Guangwu Xu, Bao Li:
A Novel Pre-Computation Scheme of Window τNAF for Koblitz Curves. IACR Cryptol. ePrint Arch. 2017: 1020 (2017) - 2016
- [c13]Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, Song Tian:
Deterministic Encoding into Twisted Edwards Curves. ACISP (2) 2016: 285-297 - [c12]Xiu Xu, Wei Yu, Kunpeng Wang, Xiaoyang He:
Constructing Isogenies on Extended Jacobi Quartic Curves. Inscrypt 2016: 416-427 - 2015
- [c11]Xiaoyang He, Wei Yu, Kunpeng Wang:
Hashing into Generalized Huff Curves. Inscrypt 2015: 22-44 - [c10]Weixuan Li, Wei Yu, Kunpeng Wang:
Improved Tripling on Elliptic Curves. Inscrypt 2015: 193-205 - [c9]Weixuan Li, Wei Yu, Kunpeng Wang:
Analysis of Fractional ωmbNAF for Scalar Multiplication. ISPEC 2015: 109-120 - [c8]Song Tian, Wei Yu, Bao Li, Kunpeng Wang:
Models of Curves from GHS Attack in Odd Characteristic. ISPEC 2015: 171-180 - [c7]Song Tian, Wei Yu, Bao Li, Kunpeng Wang:
Some Elliptic Subcovers of Genus 3 Hyperelliptic Curves. ISPEC 2015: 181-191 - [c6]Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, Song Tian:
Hashing into Jacobi Quartic Curves. ISC 2015: 355-375 - 2014
- [c5]Song Tian, Kunpeng Wang, Bao Li, Wei Yu:
A Note on Diem's Proof. Inscrypt 2014: 463-471 - 2013
- [c4]Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
On the Expansion Length Of Triple-Base Number Systems. AFRICACRYPT 2013: 424-432 - [c3]Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
Triple-Base Number System for Scalar Multiplication. AFRICACRYPT 2013: 433-451 - [c2]Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
About Hash into Montgomery Form Elliptic Curves. ISPEC 2013: 147-159 - [c1]Wei Yu, Kunpeng Wang, Bao Li, Song Tian:
Joint Triple-Base Number System for Multi-Scalar Multiplication. ISPEC 2013: 160-173
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint