


Остановите войну!
for scientists:


default search action
Dawu Gu
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j108]Chi Zhang, Xiangjun Lu, Pei Cao, Dawu Gu, Zheng Guo, Sen Xu:
A nonprofiled side-channel analysis based on variational lower bound related to mutual information. Sci. China Inf. Sci. 66(1) (2023) - [j107]Yiming Li, Shengli Liu, Shuai Han, Dawu Gu, Jian Weng:
Simulatable verifiable random function from the LWE assumption. Theor. Comput. Sci. 957: 113826 (2023) - [j106]Wei Li
, Chun Liu, Dawu Gu
, Jianning Gao, Wenqian Sun:
Statistical Differential Fault Analysis of the Saturnin Lightweight Cryptosystem in the Mobile Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 18: 1487-1496 (2023) - [j105]Xiaojun Zhang
, Chao Huang
, Dawu Gu
, Jingwei Zhang, Huaxiong Wang
:
BIB-MKS: Post-Quantum Secure Biometric Identity-Based Multi-Keyword Search Over Encrypted Data in Cloud Storage Systems. IEEE Trans. Serv. Comput. 16(1): 122-133 (2023) - [c177]Shuai Han
, Shengli Liu
, Dawu Gu
:
Almost Tight Multi-user Security Under Adaptive Corruptions & Leakages in the Standard Model. EUROCRYPT (3) 2023: 132-162 - [c176]Geng Wang, Shi-Feng Sun, Zhedong Wang, Dawu Gu:
Functional Encryption Against Probabilistic Queries: Definition, Construction and Applications. Public Key Cryptography (2) 2023: 429-458 - [c175]Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:
Fine-Grained Verifier NIZK and Its Applications. Public Key Cryptography (2) 2023: 482-511 - [c174]Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:
EKE Meets Tight Security in the Universally Composable Framework. Public Key Cryptography (1) 2023: 685-713 - [c173]Yakang Li, Yikun Hu, Yizhuo Wang, Yituo He, Haining Lu, Dawu Gu:
RGDroid: Detecting Android Malware with Graph Convolutional Networks against Structural Attacks. SANER 2023: 639-650 - [c172]Xuangan Xiao, Yizhuo Wang, Yikun Hu, Dawu Gu:
xVMP: An LLVM-based Code Virtualization Obfuscator. SANER 2023: 738-742 - [i44]Wenya Wang, Xingwei Lin, Jingyi Wang, Wang Gao, Dawu Gu, Wei Lv, Jiashui Wang:
HODOR: Shrinking Attack Surface on Node.js via System Call Limitation. CoRR abs/2306.13984 (2023) - [i43]Shuai Han, Shengli Liu, Dawu Gu:
Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model. IACR Cryptol. ePrint Arch. 2023: 153 (2023) - [i42]Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:
EKE Meets Tight Security in the Universally Composable Framework. IACR Cryptol. ePrint Arch. 2023: 170 (2023) - [i41]Shuai Han, Shengli Liu, Zhedong Wang, Dawu Gu:
Almost Tight Multi-User Security under Adaptive Corruptions from LWE in the Standard Model. IACR Cryptol. ePrint Arch. 2023: 1230 (2023) - 2022
- [j104]Wei Li, Shan Cao, Dawu Gu, Jiayao Li, Tianpei Cai, Menglin Wang, Li Sun, Zhiqiang Liu, Ya Liu:
Ciphertext-only fault analysis of GIFT lightweight cryptosystem. Sci. China Inf. Sci. 65(3) (2022) - [j103]Hui Wang, Dawu Gu, Yuanyuan Zhang, Yikun Hu:
An empirical study of security issues in SSO server-side implementations. Sci. China Inf. Sci. 65(7): 1-3 (2022) - [j102]Hehao Li, Yizhuo Wang, Yiwei Zhang, Juanru Li, Dawu Gu:
PEDroid: Automatically Extracting Patches from Android App Updates (Artifact). Dagstuhl Artifacts Ser. 8(2): 24:1-24:2 (2022) - [j101]Xiaojun Zhang, Chao Huang, Dawu Gu, Jingwei Zhang, Jingting Xue, Huaxiong Wang:
Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems. J. Syst. Archit. 127: 102508 (2022) - [j100]Xiaojun Zhang
, Wei Tang
, Dawu Gu
, Yuan Zhang
, Jingting Xue, Xin Wang:
Lightweight Multidimensional Encrypted Data Aggregation Scheme With Fault Tolerance for Fog-Assisted Smart Grids. IEEE Syst. J. 16(4): 6647-6657 (2022) - [j99]Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:
Tightly CCA-secure inner product functional encryption scheme. Theor. Comput. Sci. 898: 1-19 (2022) - [j98]Shifeng Sun
, Cong Zuo
, Joseph K. Liu
, Amin Sakzad
, Ron Steinfeld, Tsz Hon Yuen
, Xingliang Yuan
, Dawu Gu
:
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation. IEEE Trans. Dependable Secur. Comput. 19(1): 452-467 (2022) - [j97]Yanxue Jia
, Shifeng Sun
, Yuncong Zhang
, Qingzhao Zhang, Ning Ding, Zhiqiang Liu
, Joseph K. Liu
, Dawu Gu
:
${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions. IEEE Trans. Dependable Secur. Comput. 19(1): 647-662 (2022) - [j96]Pei Cao
, Chi Zhang
, Xiangjun Lu, Dawu Gu
, Sen Xu:
Improving Deep Learning Based Second-Order Side-Channel Analysis With Bilinear CNN. IEEE Trans. Inf. Forensics Secur. 17: 3863-3876 (2022) - [j95]Xiaojun Zhang
, Xin Wang, Dawu Gu
, Jingting Xue, Wei Tang
:
Conditional Anonymous Certificateless Public Auditing Scheme Supporting Data Dynamics for Cloud Storage Systems. IEEE Trans. Netw. Serv. Manag. 19(4): 5333-5347 (2022) - [j94]Tengfei Wang
, Chi Zhang
, Pei Cao
, Dawu Gu
:
Efficient Implementation of Dilithium Signature Scheme on FPGA SoC Platform. IEEE Trans. Very Large Scale Integr. Syst. 30(9): 1158-1171 (2022) - [c171]Shenwei Chen, Zhen Liu, Yu Long, Dawu Gu:
DeChain: A Blockchain Framework Enhancing Decentralization via Sharding. ACISP 2022: 469-488 - [c170]Yizhuo Wang
, Yikun Hu
, Xuangan Xiao
, Dawu Gu
:
iService: Detecting and Evaluating the Impact of Confused Deputy Problem in AppleOS. ACSAC 2022: 964-977 - [c169]You Lyu
, Shengli Liu
, Shuai Han
, Dawu Gu
:
Privacy-Preserving Authenticated Key Exchange in the Standard Model. ASIACRYPT (3) 2022: 210-240 - [c168]Yanxue Jia
, Shifeng Sun
, Hong-Sheng Zhou
, Dawu Gu
:
A Universally Composable Non-interactive Aggregate Cash System. ASIACRYPT (1) 2022: 745-773 - [c167]Yuncong Zhang
, Alan Szepieniec, Ren Zhang
, Shifeng Sun, Geng Wang, Dawu Gu:
VOProof: Efficient zkSNARKs from Vector Oracle Compilers. CCS 2022: 3195-3208 - [c166]You Chen, Ning Ding, Dawu Gu, Yang Bian:
Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion. Inscrypt 2022: 169-191 - [c165]Shuai Han
, Shengli Liu
, Zhedong Wang, Dawu Gu
:
Almost Tight Multi-user Security Under Adaptive Corruptions from LWE in the Standard Model. CRYPTO (5) 2022: 682-715 - [c164]Pei Cao
, Hongyi Zhang, Dawu Gu, Yan Lu, Yidong Yuan:
AL-PA: cross-device profiled side-channel attack using adversarial learning. DAC 2022: 691-696 - [c163]Yiwei Zhang, Siqi Ma, Juanru Li, Dawu Gu, Elisa Bertino:
KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications. DSN 2022: 488-500 - [c162]Ziyi Zhou, Xing Han, Zeyuan Chen, Yuhong Nan, Juanru Li, Dawu Gu:
SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services. DSN 2022: 534-546 - [c161]Hehao Li, Yizhuo Wang, Yiwei Zhang, Juanru Li, Dawu Gu:
PEDroid: Automatically Extracting Patches from Android App Updates. ECOOP 2022: 21:1-21:31 - [c160]Yu Song, Guoshun Fan, Yu Long, Zhen Liu, Xian Xu, Dawu Gu:
Grape: Efficient Hybrid Consensus Protocol Using DAG. DPM/CBT@ESORICS 2022: 258-274 - [c159]Mingming Jiang, Shengli Liu, Shuai Han, Dawu Gu:
Fuzzy Authenticated Key Exchange with Tight Security. ESORICS (2) 2022: 337-360 - [c158]Jiajun Du, Zhonghui Ge, Yu Long, Zhen Liu, Shifeng Sun, Xian Xu, Dawu Gu:
MixCT: Mixing Confidential Transactions from Homomorphic Commitment. ESORICS (3) 2022: 763-769 - [c157]Yi Zhang, Zhonghui Ge, Yu Long, Dawu Gu:
UCC: Universal and Committee-based Cross-chain Framework. ISPEC 2022: 93-111 - [c156]Gongyu Shi
, Geng Wang, Dawu Gu:
Further Cryptanalysis of a Type of RSA Variants. ISC 2022: 133-152 - [c155]Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu:
Shaduf: Non-Cycle Payment Channel Rebalancing. NDSS 2022 - [c154]Geng Wang
, Ming Wan
, Dawu Gu
:
More Efficient Verifiable Functional Encryption. ProvSec 2022: 36-51 - [c153]Yiwei Zhang, Juanru Li, Dawu Gu:
Rethinking the security of IoT from the perspective of developer customized device-cloud interaction. SAC 2022: 210-213 - [c152]Xuancheng Jin, Xuangan Xiao, Songlin Jia, Wang Gao, Dawu Gu, Hang Zhang, Siqi Ma, Zhiyun Qian, Juanru Li:
Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK. SP 2022: 650-665 - [c151]Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu:
Shuffle-based Private Set Union: Faster and More Secure. USENIX Security Symposium 2022: 2947-2964 - [i40]Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu:
Shuffle-based Private Set Union: Faster and More Secure. IACR Cryptol. ePrint Arch. 2022: 157 (2022) - [i39]Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu:
Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing. IACR Cryptol. ePrint Arch. 2022: 388 (2022) - [i38]Leizhang Wang, Wenwen Xia, Geng Wang, Baocang Wang, Dawu Gu:
Improved Pump and Jump BKZ by Sharp Simulator. IACR Cryptol. ePrint Arch. 2022: 468 (2022) - [i37]Gongyu Shi, Geng Wang, Dawu Gu:
Further Cryptanalysis of a Type of RSA Variants. IACR Cryptol. ePrint Arch. 2022: 611 (2022) - [i36]Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Dawu Gu:
The Ideal Functionalities for Private Set Union, Revisited. IACR Cryptol. ePrint Arch. 2022: 750 (2022) - [i35]Jiajun Du, Zhonghui Ge, Yu Long, Zhen Liu, Shifeng Sun, Xian Xu, Dawu Gu:
MixCT: Mixing Confidential Transactions from Homomorphic Commitment. IACR Cryptol. ePrint Arch. 2022: 951 (2022) - [i34]You Lyu, Shengli Liu, Shuai Han, Dawu Gu:
Privacy-Preserving Authenticated Key Exchange in the Standard Model. IACR Cryptol. ePrint Arch. 2022: 1217 (2022) - [i33]Xiangyu Liu, Shengli Liu, Dawu Gu:
Tightly Secure Chameleon Hash Functions in the Multi-User Setting and Their Applications. IACR Cryptol. ePrint Arch. 2022: 1258 (2022) - [i32]Wenwen Xia, Leizhang Wang, GengWang, Dawu Gu, Baocang Wang:
Improved Progressive BKZ with Lattice Sieving. IACR Cryptol. ePrint Arch. 2022: 1343 (2022) - [i31]Geng Wang, Wenwen Xia, Gongyu Shi, Ming Wan, Yuncong Zhang, Dawu Gu:
Revisiting the Concrete Hardness of SelfTargetMSIS in CRYSTALS-Dilithium. IACR Cryptol. ePrint Arch. 2022: 1601 (2022) - 2021
- [j93]Yanli Ren, Xinpeng Zhang, Dawu Gu, Guorui Feng:
Efficient outsourced extraction of histogram features over encrypted images in cloud. Sci. China Inf. Sci. 64(3) (2021) - [j92]Lin Ding
, Dawu Gu, Lei Wang, Chenhui Jin, Jie Guan:
Improved Guess and Determine attack on the MASHA stream cipher. Sci. China Inf. Sci. 64(9) (2021) - [j91]Nan Cui, Shengli Liu
, Dawu Gu, Jian Weng:
Robustly reusable fuzzy extractor with imperfect randomness. Des. Codes Cryptogr. 89(5): 1017-1059 (2021) - [j90]Yiming Li, Shengli Liu
, Shuai Han, Dawu Gu:
Pseudorandom functions in NC class from the standard LWE assumption. Des. Codes Cryptogr. 89(12): 2807-2839 (2021) - [j89]Ning Ding, Dawu Gu:
New cryptographic hardness for learning intersections of halfspaces over boolean cubes with membership queries. Inf. Comput. 281: 104771 (2021) - [j88]Lin Ding
, Dawu Gu, Lei Wang, Chenhui Jin, Jie Guan:
A real-time related key attack on the WG-16 stream cipher for securing 4G-LTE networks. J. Inf. Secur. Appl. 63: 103015 (2021) - [j87]Xiangjun Lu, Chi Zhang, Pei Cao
, Dawu Gu, Haining Lu:
Pay Attention to Raw Traces: A Deep Learning Architecture for End-to-End Profiling Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 235-274 (2021) - [j86]Pei Cao
, Chi Zhang, Xiangjun Lu, Dawu Gu:
Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 27-56 (2021) - [j85]Wei Li
, Jiayao Li
, Dawu Gu
, Chaoyun Li
, Tianpei Cai:
Statistical Fault Analysis of the Simeck Lightweight Cipher in the Ubiquitous Sensor Networks. IEEE Trans. Inf. Forensics Secur. 16: 4224-4233 (2021) - [j84]Yikun Hu
, Hui Wang, Yuanyuan Zhang, Bodong Li, Dawu Gu
:
A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison. IEEE Trans. Software Eng. 47(6): 1241-1258 (2021) - [c150]Yanxue Jia, Shifeng Sun, Yi Zhang, Zhiqiang Liu, Dawu Gu:
Redactable Blockchain Supporting Supervision and Self-Management. AsiaCCS 2021: 844-858 - [c149]Shuai Han
, Shengli Liu
, Dawu Gu
:
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-user Setting: Impossibility Result and Optimal Tightness. ASIACRYPT (2) 2021: 483-513 - [c148]Xiangjun Lu, Chi Zhang, Dawu Gu:
Attention - Based Non-Profiled Side-Channel Attack. AsianHOST 2021: 1-6 - [c147]Chi Zhang, Xiangjun Lu, Dawu Gu:
Binary Classification-Based Side-Channel Analysis. AsianHOST 2021: 1-6 - [c146]Geng Wang, Ming Wan, Zhen Liu, Dawu Gu:
Fully Secure Lattice-Based ABE from Noisy Linear Functional Encryption. Inscrypt 2021: 421-441 - [c145]Yaobin Shen, Lei Wang, Dawu Gu, Jian Weng:
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting. CRYPTO (3) 2021: 309-336 - [c144]Shifeng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K. Liu, Surya Nepal, Dawu Gu:
Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. NDSS 2021 - [c143]Wenya Wang, Yakang Li, Chao Wang, Yuan Yan, Juanru Li, Dawu Gu:
Re-Check Your Certificates! Experiences and Lessons Learnt from Real-World HTTPS Certificate Deployments. NSS 2021: 17-37 - [c142]Mingming Jiang, Shengli Liu, Shuai Han, Dawu Gu:
Authentication System Based on Fuzzy Extractors. WASA (3) 2021: 479-490 - [i30]Yuncong Zhang, Ren Zhang, Geng Wang, Dawu Gu:
VCProof: Constructing Shorter and Faster-to-Verify zkSNARKs with Vector Oracles. IACR Cryptol. ePrint Arch. 2021: 710 (2021) - [i29]Shuai Han, Shengli Liu, Dawu Gu:
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness. IACR Cryptol. ePrint Arch. 2021: 1146 (2021) - [i28]Yaobin Shen, Lei Wang, Dawu Gu:
LedMAC: More Efficient Variants of LightMAC. IACR Cryptol. ePrint Arch. 2021: 1210 (2021) - 2020
- [j83]Ya Liu
, Tiande Zang
, Dawu Gu
, Fengyu Zhao
, Wei Li
, Zhiqiang Liu
:
Improved Cryptanalysis of Reduced-Version QARMA-64/128. IEEE Access 8: 8361-8370 (2020) - [j82]Zhiqiang Liu, Shuai Han, Qingju Wang, Wei Li, Ya Liu, Dawu Gu:
New insights on linear cryptanalysis. Sci. China Inf. Sci. 63(1): 112104 (2020) - [j81]Wei Li, Linfeng Liao, Dawu Gu, Shan Cao, Yixin Wu, Jiayao Li, Zhihong Zhou, Zheng Guo, Ya Liu, Zhiqiang Liu:
Ciphertext-only fault analysis on the Midori lightweight cryptosystem. Sci. China Inf. Sci. 63(3) (2020) - [j80]Yiming Li, Shengli Liu, Dawu Gu, Kefei Chen:
Reusable Fuzzy Extractor Based on the LPN Assumption. Comput. J. 63(12): 1826-1834 (2020) - [j79]Ya Liu, Bing Shi, Dawu Gu, Fengyu Zhao, Wei Li, Zhiqiang Liu:
Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256. Comput. J. 63(12): 1859-1870 (2020) - [j78]Hui Liu, Juanru Li, Dawu Gu:
Understanding the security of app-in-the-middle IoT. Comput. Secur. 97: 102000 (2020) - [j77]Xiangjun Lu, Chi Zhang, Dawu Gu, Junrong Liu, Qian Peng, Hai-Feng Zhang:
Evaluating and Improving Linear Regression Based Profiling: On the Selection of Its Regularization. J. Comput. Sci. Technol. 35(5): 1175-1197 (2020) - [j76]Fan Zhang, Yiran Zhang, Huilong Jiang, Xiang Zhu, Shivam Bhasin, Xinjie Zhao, Zhe Liu, Dawu Gu, Kui Ren:
Persistent Fault Attack in Practice. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 172-195 (2020) - [c141]Xiangyu Liu, Shengli Liu, Dawu Gu:
Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications. ACISP 2020: 664-673 - [c140]Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng:
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security. ASIACRYPT (2) 2020: 785-814 - [c139]Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. Financial Cryptography 2020: 464-483 - [c138]Lin Ding
, Lei Wang, Dawu Gu, Chenhui Jin, Jie Guan:
A New General Method of Searching for Cubes in Cube Attacks. ICICS 2020: 369-385 - [c137]Shifeng Sun, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu:
Public-Key Puncturable Encryption: Modular and Compact Constructions. Public Key Cryptography (1) 2020: 309-338 - [c136]Yuyao Zhang, Siqi Ma, Juanru Li, Kailai Li, Surya Nepal
, Dawu Gu:
SMARTSHIELD: Automatic Smart Contract Protection Made Easy. SANER 2020: 23-34 - [i27]Shifeng Sun, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu:
Public-Key Puncturable Encryption: Modular and Compact Constructions. IACR Cryptol. ePrint Arch. 2020: 126 (2020) - [i26]Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng:
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security. IACR Cryptol. ePrint Arch. 2020: 1088 (2020)
2010 – 2019
- 2019
- [j75]Yikun Hu
, Yuanyuan Zhang, Dawu Gu:
Automatically Patching Vulnerabilities of Binary Programs via Code Transfer From Correct Versions. IEEE Access 7: 28170-28184 (2019) - [j74]Ya Liu, Yifan Shi, Dawu Gu, Bo Dai, Fengyu Zhao, Wei Li, Zhiqiang Liu, Zhiqiang Zeng:
Improved impossible differential cryptanalysis of large-block Rijndael. Sci. China Inf. Sci. 62(3): 32101:1-32101:14 (2019) - [j73]Kamel Ammour, Lei Wang, Dawu Gu:
Pseudo random oracle of Merkle-Damgård hash functions revisited. Sci. China Inf. Sci. 62(3): 32112:1-32112:15 (2019) - [j72]Sen Xu, Weija Wang, Xiangjun Lu, Zheng Guo, Junrong Liu, Dawu Gu:
Side channel attack of multiplication in GF(q)-application to secure RSA-CRT. Sci. China Inf. Sci. 62(3): 39105:1-39105:3 (2019) - [j71]Ya Liu, Yifan Shi, Dawu Gu, Zhiqiang Zeng, Fengyu Zhao, Wei Li, Zhiqiang Liu, Yang Bao:
Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC. Comput. J. 62(12): 1761-1776 (2019) - [j70]Yuncong Zhang
, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and efficient scheme in Zerocash. Comput. Secur. 86: 112-131 (2019) - [j69]Chun Guo, Yaobin Shen, Lei Wang, Dawu Gu:
Beyond-birthday secure domain-preserving PRFs from a single permutation. Des. Codes Cryptogr. 87(6): 1297-1322 (2019) - [j68]Wenbo Yang, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Security analysis of third-party in-app payment in mobile applications. J. Inf. Secur. Appl. 48 (2019) - [j67]Ya Liu, Liang Cheng, Fengyu Zhao, Chunhua Su, Zhiqiang Liu, Wei Li, Dawu Gu:
New Analysis of Reduced-Version of Piccolo in the Single-Key Scenario. KSII Trans. Internet Inf. Syst. 13(9): 4727-4741 (2019) - [j66]Chi Zhang, Junrong Liu, Dawu Gu, Weijia Wang
, Xiangjun Lu, Zheng Guo, Hai-Ning Lu:
Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks. J. Comput. Sci. Technol. 34(5): 1079-1095 (2019) - [j65]Lin Ding
, Lei Wang, Dawu Gu
, Chenhui Jin, Jie Guan:
Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping. Secur. Commun. Networks 2019: 7429320:1-7429320:5 (2019) - [j64]Xiao Zhang
, Shengli Liu, Dawu Gu, Joseph K. Liu:
A generic construction of tightly secure signatures in the multi-user setting. Theor. Comput. Sci. 775: 32-52 (2019) - [j63]Lin Lyu
, Shengli Liu, Dawu Gu:
Structure-preserving public-key encryption with leakage-resilient CCA security. Theor. Comput. Sci. 795: 57-80 (2019) - [j62]Xiao Zhang, Shengli Liu, Jiaxin Pan
, Dawu Gu:
Tightly secure signature schemes from the LWE and subset sum assumptions. Theor. Comput. Sci. 795: 326-344 (2019) - [j61]Wei Li
, Linfeng Liao, Dawu Gu, Chaoyun Li
, Chenyu Ge, Zheng Guo, Ya Liu, Zhiqiang Liu
:
Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things. IEEE Trans. Dependable Secur. Comput. 16(3): 454-461 (2019) - [c135]Nan Cui, Shengli Liu, Yunhua Wen, Dawu Gu:
Pseudorandom Functions from LWE: RKA Security and Application. ACISP 2019: 229-250 - [c134]Shifeng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, Joseph K. Liu:
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System. ACNS 2019: 486-506 - [c133]Huayi Li, Yuanyuan Zhang, Jianqiang Wang, Dawu Gu:
SymSem: Symbolic Execution with Time Stamps for Deobfuscation. Inscrypt 2019: 225-245 - [c132]Shuai Han, Shengli Liu, Lin Lyu
, Dawu Gu:
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System. CRYPTO (2) 2019: