


Остановите войну!
for scientists:
Dawu Gu
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j98]Wei Li, Shan Cao, Dawu Gu, Jiayao Li, Tianpei Cai, Menglin Wang, Li Sun, Zhiqiang Liu, Ya Liu:
Ciphertext-only fault analysis of GIFT lightweight cryptosystem. Sci. China Inf. Sci. 65(3) (2022) - [j97]Leizhang Wang, Wenwen Xia, Geng Wang, Baocang Wang, Dawu Gu:
Improved Pump and Jump BKZ by Sharp Simulator. IACR Cryptol. ePrint Arch. 2022: 468 (2022) - [j96]Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:
Tightly CCA-secure inner product functional encryption scheme. Theor. Comput. Sci. 898: 1-19 (2022) - [j95]Shi-Feng Sun
, Cong Zuo
, Joseph K. Liu
, Amin Sakzad
, Ron Steinfeld, Tsz Hon Yuen
, Xingliang Yuan
, Dawu Gu
:
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation. IEEE Trans. Dependable Secur. Comput. 19(1): 452-467 (2022) - [j94]Yanxue Jia
, Shi-Feng Sun
, Yuncong Zhang, Qingzhao Zhang, Ning Ding, Zhiqiang Liu
, Joseph K. Liu
, Dawu Gu
:
${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions. IEEE Trans. Dependable Secur. Comput. 19(1): 647-662 (2022) - [c150]Yiwei Zhang, Juanru Li, Dawu Gu:
Rethinking the security of IoT from the perspective of developer customized device-cloud interaction. SAC 2022: 210-213 - [i34]Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu:
Shuffle-based Private Set Union: Faster and More Secure. IACR Cryptol. ePrint Arch. 2022: 157 (2022) - [i33]Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu:
Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing. IACR Cryptol. ePrint Arch. 2022: 388 (2022) - 2021
- [j93]Yanli Ren, Xinpeng Zhang, Dawu Gu, Guorui Feng:
Efficient outsourced extraction of histogram features over encrypted images in cloud. Sci. China Inf. Sci. 64(3) (2021) - [j92]Lin Ding, Dawu Gu, Lei Wang, Chenhui Jin, Jie Guan:
Improved Guess and Determine attack on the MASHA stream cipher. Sci. China Inf. Sci. 64(9) (2021) - [j91]Nan Cui, Shengli Liu
, Dawu Gu, Jian Weng:
Robustly reusable fuzzy extractor with imperfect randomness. Des. Codes Cryptogr. 89(5): 1017-1059 (2021) - [j90]Yiming Li, Shengli Liu
, Shuai Han, Dawu Gu:
Pseudorandom functions in NC class from the standard LWE assumption. Des. Codes Cryptogr. 89(12): 2807-2839 (2021) - [j89]Ning Ding, Dawu Gu:
New cryptographic hardness for learning intersections of halfspaces over boolean cubes with membership queries. Inf. Comput. 281: 104771 (2021) - [j88]Lin Ding, Dawu Gu, Lei Wang, Chenhui Jin, Jie Guan:
A real-time related key attack on the WG-16 stream cipher for securing 4G-LTE networks. J. Inf. Secur. Appl. 63: 103015 (2021) - [j87]Xiangjun Lu, Chi Zhang, Pei Cao, Dawu Gu, Haining Lu:
Pay Attention to Raw Traces: A Deep Learning Architecture for End-to-End Profiling Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 235-274 (2021) - [j86]Pei Cao, Chi Zhang, Xiangjun Lu, Dawu Gu:
Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 27-56 (2021) - [j85]Wei Li
, Jiayao Li
, Dawu Gu
, Chaoyun Li, Tianpei Cai:
Statistical Fault Analysis of the Simeck Lightweight Cipher in the Ubiquitous Sensor Networks. IEEE Trans. Inf. Forensics Secur. 16: 4224-4233 (2021) - [j84]Yikun Hu
, Hui Wang, Yuanyuan Zhang, Bodong Li, Dawu Gu
:
A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison. IEEE Trans. Software Eng. 47(6): 1241-1258 (2021) - [c149]Yanxue Jia, Shi-Feng Sun, Yi Zhang, Zhiqiang Liu, Dawu Gu:
Redactable Blockchain Supporting Supervision and Self-Management. AsiaCCS 2021: 844-858 - [c148]Shuai Han
, Shengli Liu
, Dawu Gu
:
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-user Setting: Impossibility Result and Optimal Tightness. ASIACRYPT (2) 2021: 483-513 - [c147]Xiangjun Lu, Chi Zhang, Dawu Gu:
Attention - Based Non-Profiled Side-Channel Attack. AsianHOST 2021: 1-6 - [c146]Chi Zhang, Xiangjun Lu, Dawu Gu:
Binary Classification-Based Side-Channel Analysis. AsianHOST 2021: 1-6 - [c145]Geng Wang, Ming Wan, Zhen Liu, Dawu Gu:
Fully Secure Lattice-Based ABE from Noisy Linear Functional Encryption. Inscrypt 2021: 421-441 - [c144]Yaobin Shen, Lei Wang, Dawu Gu, Jian Weng:
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting. CRYPTO (3) 2021: 309-336 - [c143]Shi-Feng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K. Liu, Surya Nepal, Dawu Gu:
Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. NDSS 2021 - [c142]Wenya Wang, Yakang Li, Chao Wang, Yuan Yan, Juanru Li, Dawu Gu:
Re-Check Your Certificates! Experiences and Lessons Learnt from Real-World HTTPS Certificate Deployments. NSS 2021: 17-37 - [c141]Mingming Jiang, Shengli Liu, Shuai Han, Dawu Gu:
Authentication System Based on Fuzzy Extractors. WASA (3) 2021: 479-490 - [i32]Yuncong Zhang, Ren Zhang, Geng Wang, Dawu Gu:
VCProof: Constructing Shorter and Faster-to-Verify zkSNARKs with Vector Oracles. IACR Cryptol. ePrint Arch. 2021: 710 (2021) - [i31]Shuai Han, Shengli Liu, Dawu Gu:
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness. IACR Cryptol. ePrint Arch. 2021: 1146 (2021) - [i30]Yaobin Shen, Lei Wang, Dawu Gu:
LedMAC: More Efficient Variants of LightMAC. IACR Cryptol. ePrint Arch. 2021: 1210 (2021) - 2020
- [j83]Ya Liu
, Tiande Zang
, Dawu Gu
, Fengyu Zhao
, Wei Li
, Zhiqiang Liu
:
Improved Cryptanalysis of Reduced-Version QARMA-64/128. IEEE Access 8: 8361-8370 (2020) - [j82]Zhiqiang Liu, Shuai Han, Qingju Wang, Wei Li, Ya Liu, Dawu Gu:
New insights on linear cryptanalysis. Sci. China Inf. Sci. 63(1): 112104 (2020) - [j81]Wei Li, Linfeng Liao, Dawu Gu, Shan Cao, Yixin Wu, Jiayao Li, Zhihong Zhou, Zheng Guo, Ya Liu, Zhiqiang Liu:
Ciphertext-only fault analysis on the Midori lightweight cryptosystem. Sci. China Inf. Sci. 63(3) (2020) - [j80]Yiming Li, Shengli Liu, Dawu Gu, Kefei Chen:
Reusable Fuzzy Extractor Based on the LPN Assumption. Comput. J. 63(12): 1826-1834 (2020) - [j79]Ya Liu, Bing Shi, Dawu Gu, Fengyu Zhao, Wei Li, Zhiqiang Liu:
Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256. Comput. J. 63(12): 1859-1870 (2020) - [j78]Hui Liu, Juanru Li, Dawu Gu:
Understanding the security of app-in-the-middle IoT. Comput. Secur. 97: 102000 (2020) - [j77]Xiangjun Lu, Chi Zhang, Dawu Gu, Junrong Liu, Qian Peng, Hai-Feng Zhang:
Evaluating and Improving Linear Regression Based Profiling: On the Selection of Its Regularization. J. Comput. Sci. Technol. 35(5): 1175-1197 (2020) - [j76]Fan Zhang, Yiran Zhang, Huilong Jiang, Xiang Zhu, Shivam Bhasin, Xinjie Zhao, Zhe Liu, Dawu Gu, Kui Ren:
Persistent Fault Attack in Practice. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 172-195 (2020) - [c140]Xiangyu Liu, Shengli Liu, Dawu Gu:
Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications. ACISP 2020: 664-673 - [c139]Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng:
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security. ASIACRYPT (2) 2020: 785-814 - [c138]Tsz Hon Yuen, Shi-Feng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. Financial Cryptography 2020: 464-483 - [c137]Lin Ding, Lei Wang, Dawu Gu, Chenhui Jin, Jie Guan:
A New General Method of Searching for Cubes in Cube Attacks. ICICS 2020: 369-385 - [c136]Shi-Feng Sun, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu:
Public-Key Puncturable Encryption: Modular and Compact Constructions. Public Key Cryptography (1) 2020: 309-338 - [c135]Yuyao Zhang, Siqi Ma, Juanru Li, Kailai Li, Surya Nepal
, Dawu Gu:
SMARTSHIELD: Automatic Smart Contract Protection Made Easy. SANER 2020: 23-34 - [i29]Geng Wang, Ming Wan, Zhen Liu, Dawu Gu:
Dual System in Lattice: Fully Secure ABE from LWE Assumption. IACR Cryptol. ePrint Arch. 2020: 64 (2020) - [i28]Shi-Feng Sun, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu:
Public-Key Puncturable Encryption: Modular and Compact Constructions. IACR Cryptol. ePrint Arch. 2020: 126 (2020) - [i27]Shuyang Tang, Qingzhao Zhang, Zhengfeng Gao, Jilai Zheng, Dawu Gu:
Bracing A Transaction DAG with A Backbone Chain. IACR Cryptol. ePrint Arch. 2020: 472 (2020) - [i26]Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng:
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security. IACR Cryptol. ePrint Arch. 2020: 1088 (2020)
2010 – 2019
- 2019
- [j75]Yikun Hu
, Yuanyuan Zhang, Dawu Gu:
Automatically Patching Vulnerabilities of Binary Programs via Code Transfer From Correct Versions. IEEE Access 7: 28170-28184 (2019) - [j74]Ya Liu, Yifan Shi, Dawu Gu, Bo Dai, Fengyu Zhao, Wei Li, Zhiqiang Liu, Zhiqiang Zeng:
Improved impossible differential cryptanalysis of large-block Rijndael. Sci. China Inf. Sci. 62(3): 32101:1-32101:14 (2019) - [j73]Kamel Ammour, Lei Wang, Dawu Gu:
Pseudo random oracle of Merkle-Damgård hash functions revisited. Sci. China Inf. Sci. 62(3): 32112:1-32112:15 (2019) - [j72]Sen Xu, Weija Wang, Xiangjun Lu, Zheng Guo, Junrong Liu, Dawu Gu:
Side channel attack of multiplication in GF(q)-application to secure RSA-CRT. Sci. China Inf. Sci. 62(3): 39105:1-39105:3 (2019) - [j71]Ya Liu, Yifan Shi, Dawu Gu, Zhiqiang Zeng, Fengyu Zhao, Wei Li, Zhiqiang Liu, Yang Bao:
Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC. Comput. J. 62(12): 1761-1776 (2019) - [j70]Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and efficient scheme in Zerocash. Comput. Secur. 86: 112-131 (2019) - [j69]Chun Guo, Yaobin Shen, Lei Wang, Dawu Gu:
Beyond-birthday secure domain-preserving PRFs from a single permutation. Des. Codes Cryptogr. 87(6): 1297-1322 (2019) - [j68]Wenbo Yang, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Security analysis of third-party in-app payment in mobile applications. J. Inf. Secur. Appl. 48 (2019) - [j67]Ya Liu, Liang Cheng, Fengyu Zhao, Chunhua Su, Zhiqiang Liu, Wei Li, Dawu Gu:
New Analysis of Reduced-Version of Piccolo in the Single-Key Scenario. KSII Trans. Internet Inf. Syst. 13(9): 4727-4741 (2019) - [j66]Chi Zhang, Junrong Liu, Dawu Gu, Weijia Wang
, Xiangjun Lu, Zheng Guo, Hai-Ning Lu:
Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks. J. Comput. Sci. Technol. 34(5): 1079-1095 (2019) - [j65]Lin Ding
, Lei Wang, Dawu Gu
, Chenhui Jin, Jie Guan:
Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping. Secur. Commun. Networks 2019: 7429320:1-7429320:5 (2019) - [j64]Xiao Zhang
, Shengli Liu, Dawu Gu, Joseph K. Liu:
A generic construction of tightly secure signatures in the multi-user setting. Theor. Comput. Sci. 775: 32-52 (2019) - [j63]Lin Lyu
, Shengli Liu, Dawu Gu:
Structure-preserving public-key encryption with leakage-resilient CCA security. Theor. Comput. Sci. 795: 57-80 (2019) - [j62]Xiao Zhang, Shengli Liu, Jiaxin Pan
, Dawu Gu:
Tightly secure signature schemes from the LWE and subset sum assumptions. Theor. Comput. Sci. 795: 326-344 (2019) - [j61]Wei Li
, Linfeng Liao, Dawu Gu, Chaoyun Li
, Chenyu Ge, Zheng Guo, Ya Liu, Zhiqiang Liu
:
Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things. IEEE Trans. Dependable Secur. Comput. 16(3): 454-461 (2019) - [c134]Nan Cui, Shengli Liu, Yunhua Wen, Dawu Gu:
Pseudorandom Functions from LWE: RKA Security and Application. ACISP 2019: 229-250 - [c133]Shi-Feng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, Joseph K. Liu:
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System. ACNS 2019: 486-506 - [c132]Huayi Li, Yuanyuan Zhang, Jianqiang Wang, Dawu Gu:
SymSem: Symbolic Execution with Time Stamps for Deobfuscation. Inscrypt 2019: 225-245 - [c131]Shuai Han, Shengli Liu, Lin Lyu
, Dawu Gu:
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System. CRYPTO (2) 2019: 417-447 - [c130]Geng Wang, Zhen Liu, Dawu Gu:
Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption. ICICS 2019: 378-396 - [c129]Long Mai, Yuan Yan, Songlin Jia, Shuran Wang, Jianqiang Wang, Juanru Li, Siqi Ma, Dawu Gu:
Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features. ICICS 2019: 430-446 - [c128]Lin Ding, Dawu Gu, Lei Wang:
Mixing Property Tester: A General Framework for Evaluating the Mixing Properties of Initialization of Stream Ciphers. iSCI 2019: 570-582 - [c127]Feng Shen, Yu Long, Zhen Liu, Zhiqiang Liu, Hongyang Liu, Dawu Gu, Ning Liu:
A Practical Dynamic Enhanced BFT Protocol. NSS 2019: 288-304 - [c126]Chen Pan, Shuyang Tang, Zhonghui Ge, Zhiqiang Liu, Yu Long, Zhen Liu, Dawu Gu:
Gnocchi: Multiplexed Payment Channels for Cryptocurrencies. NSS 2019: 488-503 - [c125]Yunhua Wen, Shengli Liu, Dawu Gu:
Generic Constructions of Robustly Reusable Fuzzy Extractor. Public Key Cryptography (2) 2019: 349-378 - [c124]Yi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Dawu Gu, Fei Huan, Yanxue Jia:
TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility. ProvSec 2019: 339-346 - [c123]Jianqiang Wang, Siqi Ma, Yuanyuan Zhang, Juanru Li, Zheyu Ma, Long Mai, Tiancheng Chen, Dawu Gu:
NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification. RAID 2019: 309-321 - [c122]Shuyang Tang, Jilai Zheng, Yao Deng, Ziyu Wang, Zhiqiang Liu, Dawu Gu, Zhen Liu, Yu Long:
Towards a Multi-chain Future of Proof-of-Space. SecureComm (1) 2019: 23-38 - [c121]Qingyi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Zhimei Sui, Shifeng Sun, Shuyang Tang, Dawu Gu:
Making Monero Hard-to-Trace and More Efficient. TrustCom/BigDataSE 2019: 514-521 - [c120]Hongyang Liu, Feng Shen, Zhiqiang Liu, Yu Long, Zhen Liu, Shifeng Sun, Shuyang Tang, Dawu Gu:
A Secure and Practical Blockchain Scheme for IoT. TrustCom/BigDataSE 2019: 538-545 - [c119]Bodong Li, Yuanyuan Zhang, Juanru Li, Runhan Feng, Dawu Gu:
APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps. SANER 2019: 344-354 - [i25]Yikun Hu, Hui Wang, Yuanyuan Zhang, Bodong Li, Dawu Gu:
A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison. CoRR abs/1907.01374 (2019) - [i24]Shuyang Tang, Jilai Zheng, Yao Deng, Ziyu Wang, Zhiqiang Liu, Dawu Gu:
Towards a Multi-Chain Future of Proof-of-Space. CoRR abs/1907.07896 (2019) - [i23]Yunhua Wen, Shengli Liu, Dawu Gu:
Generic Constructions of Robustly Reusable Fuzzy Extractor. IACR Cryptol. ePrint Arch. 2019: 18 (2019) - [i22]Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. IACR Cryptol. ePrint Arch. 2019: 508 (2019) - [i21]Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu:
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System. IACR Cryptol. ePrint Arch. 2019: 512 (2019) - 2018
- [j60]Ya Liu, Liang Cheng, Zhiqiang Liu, Wei Li, Qingju Wang, Dawu Gu:
Improved meet-in-the-middle attacks on reduced-round Piccolo. Sci. China Inf. Sci. 61(3): 032108:1-032108:13 (2018) - [j59]Sen Xu, Xiangjun Lu, Kaiyu Zhang, Yang Li, Lei Wang, Weijia Wang
, Haihua Gu, Zheng Guo, Junrong Liu, Dawu Gu:
Similar operation template attack on RSA-CRT as a case study. Sci. China Inf. Sci. 61(3): 032111:1-032111:17 (2018) - [j58]Ya Liu
, Anren Yang, Bo Dai, Wei Li, Zhiqiang Liu, Dawu Gu, Zhiqiang Zeng:
Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128. Comput. J. 61(8): 1252-1258 (2018) - [j57]Shuai Han, Shengli Liu, Lin Lyu
, Dawu Gu:
Tightly Secure Encryption Schemes against Related-Key Attacks. Comput. J. 61(12): 1825-1844 (2018) - [j56]Shuai Han, Shengli Liu, Baodong Qin, Dawu Gu:
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness. Des. Codes Cryptogr. 86(3): 517-554 (2018) - [j55]Wei Li, Linfeng Liao, Dawu Gu, Chenyu Ge, Zhiyong Gao, Zhihong Zhou, Zheng Guo, Ya Liu, Zhiqiang Liu:
Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network. KSII Trans. Internet Inf. Syst. 12(1): 476-496 (2018) - [j54]Wei Li, Chenyu Ge, Dawu Gu, Linfeng Liao, Zhiyong Gao, Xiujin Shi, Ting Lu, Ya Liu, Zhiqiang Liu:
Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks. KSII Trans. Internet Inf. Syst. 12(7): 3421-3437 (2018) - [j53]Bodong Li, Yuanyuan Zhang, Juanru Li, Wenbo Yang, Dawu Gu:
AppSpear: Automating the hidden-code extraction and reassembling of packed android malware. J. Syst. Softw. 140: 3-16 (2018) - [j52]Weijia Wang
, Yu Yu
, François-Xavier Standaert
, Junrong Liu, Zheng Guo, Dawu Gu:
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips. IEEE Trans. Inf. Forensics Secur. 13(5): 1301-1316 (2018) - [c118]Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and Efficient Scheme in Zerocash. ACISP 2018: 687-705 - [c117]Haohuang Wen, Juanru Li, Yuanyuan Zhang, Dawu Gu:
An Empirical Study of SDK Credential Misuse in iOS Apps. APSEC 2018: 258-267 - [c116]Juanru Li, Zhiqiang Lin, Juan Caballero, Yuanyuan Zhang, Dawu Gu:
K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces. CCS 2018: 412-425 - [c115]Hao Xu, Yu Long, Zhiqiang Liu, Zhen Liu, Dawu Gu:
Dynamic Practical Byzantine Fault Tolerance. CNS 2018: 1-8 - [c114]Yikun Hu, Yuanyuan Zhang, Juanru Li, Hui Wang, Bodong Li, Dawu Gu:
BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis. ICSME 2018: 104-114 - [c113]Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Burn After Reading: Expunging Execution Footprints of Android Apps. NSS 2018: 46-63 - [c112]Lin Lyu
, Shengli Liu
, Shuai Han
, Dawu Gu:
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions. Public Key Cryptography (1) 2018: 62-92 - [c111]Chen Lyu, Amit Pande, Yuanyuan Zhang, Dawu Gu, Prasant Mohapatra:
FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways. SECON 2018: 289-297 - [c110]Changyu Li, Quanpu Cai, Juanru Li, Hui Liu, Yuanyuan Zhang, Dawu Gu, Yu Yu:
Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning. WISEC 2018: 1-11 - [i20]Yikun Hu, Yuanyuan Zhang, Juanru Li, Hui Wang, Bodong Li, Dawu Gu:
BinMatch: A Semantics-based Hybrid Approach on Binary Code Clone Analysis. CoRR abs/1808.06216 (2018) - [i19]Lin Lyu, Shengli Liu, Shuai Han, Dawu Gu:
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions. IACR Cryptol. ePrint Arch. 2018: 30 (2018) - [i18]Yaobin Shen, Lei Wang, Dawu Gu:
ISO/IEC 9797-1 Revisited: Beyond Birthday Bound. IACR Cryptol. ePrint Arch. 2018: 468 (2018) - 2017
- [j51]Baodong Qin, Shengli Liu, Shifeng Sun, Robert H. Deng
, Dawu Gu:
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman. Inf. Sci. 406: 1-11 (2017) - [j50]Wei Li, Zhiyong Gao, Dawu Gu, Chenyu Ge, Linfeng Liao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:
Security Analysis of the Whirlpool Hash Function in the Cloud of Things. KSII Trans. Internet Inf. Syst. 11(1): 536-551 (2017) - [j49]Shi-Feng Sun, Dawu Gu, Udaya Parampalli
, Yu Yu, Baodong Qin:
Public key encryption resilient to leakage and tampering attacks. J. Comput. Syst. Sci. 89: 142-156 (2017) - [j48]Junliang Shu, Yuanyuan Zhang, Juanru Li, Bodong Li, Dawu Gu:
Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems. ACM Trans. Embed. Comput. Syst. 16(2): 61:1-61:22 (2017) - [c109]Xiao Zhang, Shengli Liu, Dawu Gu:
Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption. ACISP (1) 2017: 453-468 - [c108]Ning Ding, Yanli Ren, Dawu Gu:
PAC Learning Depth-3 $\textrm{AC}^0$ Circuits of Bounded Top Fanin. ALT 2017: 667-680 - [c107]Qi Zhang, Juanru Li, Yuanyuan Zhang, Hui Wang, Dawu Gu:
Oh-Pwn-VPN! Security Analysis of OpenVPN-Based Android Apps. CANS 2017: 373-389 - [c106]Sihang Pu, Yu Yu, Weijia Wang
, Zheng Guo, Junrong Liu, Dawu Gu, Lingyun Wang, Jie Gan:
Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA? CARDIS 2017: 232-247 - [c105]Hui Liu, Changyu Li, Xuancheng Jin, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Smart Solution, Poor Protection: An Empirical Study of Security and Privacy Issues in Developing and Deploying Smart Home Devices. IoT S&P@CCS 2017: 13-18 - [c104]