default search action
Yupu Hu
YuPu Hu – Yu-pu Hu – Yu-Pu Hu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j106]Momeng Liu, Yupu Hu, Qiqi Lai, Shanshan Zhang, Huiwen Jia, Wen Gao, Baocang Wang:
Dual-Mode Encryption for UC-Secure String OT from Learning with Errors. IET Inf. Secur. 2024: 1-16 (2024) - [j105]Momeng Liu, Yupu Hu, Qiqi Lai, Shanshan Zhang, Huiwen Jia, Wen Gao, Baocang Wang:
Dual-Mode Encryption for UC-Secure String OT from Learning with Errors. IET Inf. Secur. 2024: 1-16 (2024) - [c43]Huiwen Jia, Yupu Hu, Chunming Tang, Lin Wang:
Towards Compact Identity-Based Encryption on Ideal Lattices. CT-RSA 2024: 354-378 - [i20]Huiwen Jia, Yupu Hu, Chunming Tang, Lin Wang:
Towards Compact Identity-based Encryption on Ideal Lattices. IACR Cryptol. ePrint Arch. 2024: 26 (2024) - 2023
- [j104]Wenju Xu, Baocang Wang, Yupu Hu, Pu Duan, Benyu Zhang, Momeng Liu:
Multi-key Fully Homomorphic Encryption from Additive Homomorphism. Comput. J. 66(1): 197-207 (2023) - [j103]Jun Liu, Dachao Wang, Yupu Hu, Jie Chen, Baocang Wang:
Improved integral cryptanalysis of SPNbox in digital rights management systems. IET Inf. Secur. 17(1): 147-158 (2023) - [i19]Yupu Hu, Siyue Dong, Baocang Wang, Xingting Dong:
On the Invalidity of LV16/Lin17 Obfuscation Schemes. IACR Cryptol. ePrint Arch. 2023: 692 (2023) - [i18]Yupu Hu, Siyue Dong, Baocang Wang, Xingting Dong:
On the Invalidity of LV16/Lin17 Obfuscation Schemes Revisited. IACR Cryptol. ePrint Arch. 2023: 1291 (2023) - 2022
- [j102]Jun Liu, Vincent Rijmen, Yupu Hu, Jie Chen, Baocang Wang:
WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix. Sci. China Inf. Sci. 65(3) (2022) - [j101]Jun Liu, Dachao Wang, Yupu Hu, Jie Chen, Baocang Wang:
Improved key-recovery attacks on reduced-round WEM-8. Des. Codes Cryptogr. 90(10): 2419-2448 (2022) - [j100]Huiwen Jia, Yupu Hu, Chunming Tang:
Lattice-based hash-and-sign signatures using approximate trapdoor, revisited. IET Inf. Secur. 16(1): 41-50 (2022) - [j99]Furong Li, Yange Chen, Pu Duan, Benyu Zhang, Zhiyong Hong, Yupu Hu, Baocang Wang:
Privacy-preserving convolutional neural network prediction with low latency and lightweight users. Int. J. Intell. Syst. 37(1): 568-595 (2022) - [j98]Yanhua Zhang, Ximeng Liu, Yupu Hu, Yong Gan, Huiwen Jia:
Verifier-local revocation group signatures with backward unlinkability from lattices. Frontiers Inf. Technol. Electron. Eng. 23(6): 876-892 (2022) - [j97]Songyang Wu, Wenju Xu, Zhiyong Hong, Pu Duan, Benyu Zhang, Yupu Hu, Baocang Wang:
Updatable privacy-preserving itK-nearest neighbor query in location-based s-ervice. Peer-to-Peer Netw. Appl. 15(2): 1076-1089 (2022) - [j96]Wenjuan Jia, Guanhao Xue, Baocang Wang, Yupu Hu:
Module-LWE-Based Key Exchange Protocol Using Error Reconciliation Mechanism. Secur. Commun. Networks 2022: 8299232:1-8299232:7 (2022) - [j95]Wenju Xu, Qingqing Zhao, Yu Zhan, Baocang Wang, Yupu Hu:
Privacy-preserving association rule mining based on electronic medical system. Wirel. Networks 28(1): 303-317 (2022) - [c42]Yanhua Zhang, Ximeng Liu, Yupu Hu:
Simplified Server-Aided Revocable Identity-Based Encryption from Lattices. ProvSec 2022: 71-87 - [i17]Yupu Hu, Siyue Dong, Baocang Wang, Jun Liu:
Notes on Reusable Garbling. IACR Cryptol. ePrint Arch. 2022: 1208 (2022) - 2021
- [j94]Yupu Hu, Siyue Dong, Xingting Dong:
Analysis on Aigis-Enc: Asymmetrical and symmetrical. IET Inf. Secur. 15(2): 147-155 (2021) - [j93]Xingting Dong, Yupu Hu, Baocang Wang, Momeng Liu, Wen Gao:
Lattice-based revocable attribute-based encryption with decryption key exposure resistance. IET Inf. Secur. 15(6): 428-441 (2021) - [j92]Jiangshan Chen, Yu-pu Hu, Hong-mei Liang, Wen Gao:
Novel efficient identity-based signature on lattices. Frontiers Inf. Technol. Electron. Eng. 22(2): 244-250 (2021) - [j91]Wenju Xu, Baocang Wang, Rongxing Lu, Quanbo Qu, Yange Chen, Yupu Hu:
Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials. Secur. Commun. Networks 2021: 5553256:1-5553256:14 (2021) - [c41]Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:
Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security. ACNS Workshops 2021: 332-345 - [c40]Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia:
Revocable Identity-Based Encryption with Server-Aided Ciphertext Evolution from Lattices. Inscrypt 2021: 442-465 - [c39]Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia:
Cloud-Aided Scalable Revocable Identity-Based Encryption with Ciphertext Update from Lattices. FCS 2021: 269-287 - [c38]Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia:
On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices. NSS 2021: 79-99 - [c37]Yanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia:
Cryptanalysis of a Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018. NSS 2021: 369-382 - [i16]Yupu Hu, Xingting Dong, Baocang Wang:
Size of IK00 Branching Program. IACR Cryptol. ePrint Arch. 2021: 400 (2021) - [i15]Yupu Hu, Jun Liu, Baocang Wang, Xingting Dong, Yanbin Pan:
P/poly Invalidity of the Agr17 Functional Encryption Scheme. IACR Cryptol. ePrint Arch. 2021: 1442 (2021) - [i14]Yupu Hu, Siyue Dong, Baocang Wang, Jun Liu:
A Note on P/poly Validity of GVW15 Predicate Encryption Scheme. IACR Cryptol. ePrint Arch. 2021: 1602 (2021) - 2020
- [j90]Zhen Zhao, Ge Wu, Fuchun Guo, Willy Susilo, Yi Mu, Baocang Wang, Yupu Hu:
Black-Box Accountable Authority Identity-Based Revocation System. Comput. J. 63(4): 525-535 (2020) - [j89]Zhen Zhao, Fuchun Guo, Jianchang Lai, Willy Susilo, Baocang Wang, Yupu Hu:
Accountable authority identity-based broadcast encryption with constant-size private keys and ciphertexts. Theor. Comput. Sci. 809: 73-87 (2020) - [c36]Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:
Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from Lattices. WISA 2020: 334-346 - [i13]Yupu Hu, Siyue Dong, Xingting Dong:
Analysis on Aigis-Enc: asymmetrical and symmetrical. IACR Cryptol. ePrint Arch. 2020: 36 (2020)
2010 – 2019
- 2019
- [j88]Zhen Zhao, Jianchang Lai, Willy Susilo, Baocang Wang, Yupu Hu, Fuchun Guo:
Efficient Construction for Full Black-Box Accountable Authority Identity-Based Encryption. IEEE Access 7: 25936-25947 (2019) - [j87]Yupu Hu, Jiangshan Chen, Shanshan Zhang:
Collusion Trap Against GVW'13 ABE. IEEE Access 7: 36334-36339 (2019) - [j86]Momeng Liu, Yupu Hu, Shanshan Zhang, Linming Gong:
Smooth Hash Proof System Based on the Learning With Errors Problem With Multi-Bit Key Output. IEEE Access 7: 155143-155157 (2019) - [j85]Yupu Hu, Huiwen Jia:
A new Gaussian sampling for trapdoor lattices with arbitrary modulus. Des. Codes Cryptogr. 87(11): 2553-2570 (2019) - [j84]Momeng Liu, Yupu Hu:
Universally composable oblivious transfer from ideal lattice. Frontiers Comput. Sci. 13(4): 879-906 (2019) - [j83]Yupu Hu, Shanshan Zhang, Jiangshan Chen, Baocang Wang:
Revisiting BGG+14 ABE with weakness analysis. IET Inf. Secur. 13(6): 685-691 (2019) - [j82]Yupu Hu, Zhizhu Lian, Jiangshan Chen, Baocang Wang, Shanshan Zhang:
Algebraic Attacks Against Several Weak Variants of GVW'13 ABE. Int. J. Found. Comput. Sci. 30(4): 607-618 (2019) - [j81]Wen Gao, Liqun Chen, Yupu Hu, Christopher J. P. Newton, Baocang Wang, Jiangshan Chen:
Lattice-based deniable ring signatures. Int. J. Inf. Sec. 18(3): 355-370 (2019) - [j80]Zhen Zhao, Ge Wu, Willy Susilo, Fuchun Guo, Baocang Wang, Yupu Hu:
Accountable identity-based encryption with distributed private key generators. Inf. Sci. 505: 352-366 (2019) - [j79]Yanhua Zhang, Yupu Hu, Yong Gan, Yifeng Yin, Huiwen Jia:
Efficient fuzzy identity-based signature from lattices for identities in a small (or large) universe. J. Inf. Secur. Appl. 47: 86-93 (2019) - [j78]Jiangshan Chen, Yupu Hu, Wen Gao, Hong-Liang Li:
Lattice-based Threshold Ring Signature with Message Block Sharing. KSII Trans. Internet Inf. Syst. 13(2): 1003-1019 (2019) - [c35]Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:
Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease. CANS 2019: 120-140 - [c34]Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:
Attribute-Based Signatures for Inner-Product Predicate from Lattices. CSS (1) 2019: 173-185 - [c33]Yanhua Zhang, Yupu Hu, Qikun Zhang, Huiwen Jia:
On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local Revocation. ISC 2019: 190-208 - [i12]Zhizhu Lian, Yupu Hu, Hu Chen, Baocang Wang:
Faster Bootstrapping of FHE over the integers with large prime message space. IACR Cryptol. ePrint Arch. 2019: 561 (2019) - 2018
- [j77]Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu:
Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud. Int. J. High Perform. Comput. Netw. 11(1): 45-54 (2018) - [j76]Huiwen Jia, Yupu Hu:
Extensional schemes of multipartite non-interactive key exchange from multilinear maps and their applications. Int. J. High Perform. Comput. Netw. 12(2): 148-155 (2018) - [j75]Baocang Wang, Hao Lei, Yupu Hu:
D-NTRU: More efficient and average-case IND-CPA secure NTRU variant. Inf. Sci. 438: 15-31 (2018) - [j74]Zhizhu Lian, Yupu Hu, Hu Chen, Baocang Wang:
Bootstrapping of FHE over the Integers with Large Message Space. Secur. Commun. Networks 2018: 6520258:1-6520258:11 (2018) - 2017
- [j73]Huiwen Jia, Yupu Hu:
Cryptanalysis of multilinear maps from ideal lattices: revisited. Des. Codes Cryptogr. 84(3): 311-324 (2017) - [j72]Wen Gao, Yupu Hu, Baocang Wang, Jia Xie:
Improved identification protocol in the quantum random oracle model.. Int. Arab J. Inf. Technol. 14(3): 339-345 (2017) - [j71]Fengrong Zhang, Shixiong Xia, Yupu Hu, Min Xie:
Constructions of involutions with optimal minimum degree. IET Inf. Secur. 11(5): 261-266 (2017) - [j70]Leyou Zhang, Zongchen Sun, Yi Mu, Yupu Hu:
Revocable hierarchical identity-based encryption over lattice for pay-TV systems. Int. J. Embed. Syst. 9(4): 379-398 (2017) - [j69]Momeng Liu, Yu-Pu Hu:
Equational Security of a Lattice-based Oblivious Transfer Protocol. J. Netw. Intell. 2(3): 231-249 (2017) - [j68]Momeng Liu, Juliane Krämer, Yu-pu Hu, Johannes Buchmann:
Quantum security analysis of a lattice-based oblivious transfer protocol. Frontiers Inf. Technol. Electron. Eng. 18(9): 1348-1369 (2017) - 2016
- [j67]Fengrong Zhang, Claude Carlet, Yupu Hu, Wenzheng Zhang:
New secondary constructions of Bent functions. Appl. Algebra Eng. Commun. Comput. 27(5): 413-434 (2016) - [j66]Jin Sun, Yupu Hu:
Chosen-ciphertext secure bidirectional proxy broadcast re-encryption schemes. Int. J. Inf. Commun. Technol. 8(4): 405-419 (2016) - [j65]Yanhua Zhang, Yupu Hu, Wen Gao, Mingming Jiang:
Simpler Efficient Group Signature Scheme with Verifier-Local Revocation from Lattices. KSII Trans. Internet Inf. Syst. 10(1): 414-430 (2016) - [j64]Jia Xie, Yupu Hu, Juntao Gao, Wen Gao, Mingming Jiang:
Efficient Certificateless Signature Scheme on NTRU Lattice. KSII Trans. Internet Inf. Syst. 10(10): 5190-5208 (2016) - [j63]Jia Xie, Yupu Hu, Juntao Gao, Wen Gao:
Efficient identity-based signature over NTRU lattice. Frontiers Inf. Technol. Electron. Eng. 17(2): 135-142 (2016) - [j62]He Wang, Yuqing Zhang, Xuefeng Liu, YuPu Hu:
Efficient quantum dialogue using entangled states and entanglement swapping without information leakage. Quantum Inf. Process. 15(6): 2593-2603 (2016) - [j61]Zhenhua Liu, Xiangsong Zhang, Yupu Hu, Tsuyoshi Takagi:
Revocable and strongly unforgeable identity-based signature scheme in the standard model. Secur. Commun. Networks 9(14): 2422-2433 (2016) - [j60]Yanhua Zhang, Yupu Hu, Jia Xie, Mingming Jiang:
Efficient ring signature schemes over NTRU Lattices. Secur. Commun. Networks 9(18): 5252-5261 (2016) - [j59]Jia Xie, Yupu Hu, Juntao Gao:
Multi-use unidirectional lattice-based proxy re-signatures in standard model. Secur. Commun. Networks 9(18): 5615-5624 (2016) - [c32]Wen Gao, Yupu Hu, Baocang Wang, Jia Xie:
Identity-Based Blind Signature from Lattices in Standard Model. Inscrypt 2016: 205-218 - [c31]Yupu Hu, Huiwen Jia:
Cryptanalysis of GGH Map. EUROCRYPT (1) 2016: 537-565 - 2015
- [j58]Hu Chen, Yupu Hu, Zhizhu Lian, Huiwen Jia, Xu An Wang:
An Additively Homomorphic Encryption over Large Message Space. Int. J. Inf. Technol. Web Eng. 10(3): 82-102 (2015) - [j57]Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi:
Revocable Identity-based Signcryption Scheme Without Random Oracles. Int. J. Netw. Secur. 17(2): 110-122 (2015) - [j56]Qiqi Lai, Yupu Hu, Yuan Chen, Baocang Wang, Fenghe Wang:
New method of key-dependent message security for asymmetric encryption. Secur. Commun. Networks 8(13): 2157-2170 (2015) - [j55]Mingming Jiang, Yupu Hu, Baocang Wang, F. H. Wang, Qiqi Lai:
Lattice-based multi-use unidirectional proxy re-encryption. Secur. Commun. Networks 8(18): 3796-3803 (2015) - [c30]Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu:
Fully Secure Hierarchical Inner Product Encryption for Privacy Preserving Keyword Searching in Cloud. 3PGCIC 2015: 449-453 - [c29]Huiwen Jia, Yupu Hu, Xu An Wang, Zheliang Liu, Wei Xiong:
Extensional Schemes of Multipartite Non-interactive Key Exchange from Multilinear Maps. 3PGCIC 2015: 771-774 - [c28]Hu Chen, Yupu Hu, Huiwen Jia:
An Additively Homomorphic Encryption from Ideal Lattices. 3PGCIC 2015: 780-784 - [i11]Yupu Hu, Huiwen Jia:
Cryptanalysis of GGH Map. IACR Cryptol. ePrint Arch. 2015: 301 (2015) - [i10]Yupu Hu, Huiwen Jia:
A Comment on Gu Map-1. IACR Cryptol. ePrint Arch. 2015: 448 (2015) - [i9]Yupu Hu, Huiwen Jia:
An Optimization of Gu Map-1. IACR Cryptol. ePrint Arch. 2015: 453 (2015) - 2014
- [j54]Yupu Hu, Hao Lei, Fenghe Wang, Wenzheng Zhang:
Gaussian sampling of lattices for cryptographic applications. Sci. China Inf. Sci. 57(7): 1-8 (2014) - [j53]Qiqi Lai, Yuan Chen, Yupu Hu, Baocang Wang, Mingming Jiang:
Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model. Frontiers Comput. Sci. 8(3): 469-477 (2014) - [j52]Mingming Jiang, Yupu Hu, Hao Lei, Baocang Wang, Qiqi Lai:
Lattice-based certificateless encryption scheme. Frontiers Comput. Sci. 8(5): 828-836 (2014) - [j51]Baocang Wang, Fagen Li, Yupu Hu:
Improvement on a Knapsack-Based Probabilistic Encryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 421-424 (2014) - [j50]Fengrong Zhang, Claude Carlet, Yupu Hu, Tian-Jie Cao:
Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions. Inf. Sci. 283: 94-106 (2014) - [j49]Baocang Wang, Yupu Hu:
Signature Scheme Using the Root Extraction Problem on Quaternions. J. Appl. Math. 2014: 819182:1-819182:7 (2014) - [j48]Baocang Wang, Yupu Hu, Xixiang Lv:
Indistinguishable against adaptive chosen ciphertext attack secure public key cryptosystem with double trapdoor decryption mechanism. Secur. Commun. Networks 7(11): 1805-1814 (2014) - 2013
- [j47]Fenghe Wang, Yupu Hu, Baocang Wang:
Lattice-based linearly homomorphic signature scheme over binary field. Sci. China Inf. Sci. 56(11): 1-9 (2013) - [j46]Yang Yang, Yupu Hu, Chun-hui Sun, Chao Lv, Leyou Zhang:
An efficient group key agreement scheme for mobile ad-hoc networks. Int. Arab J. Inf. Technol. 10(1): 10-17 (2013) - [j45]Jin Sun, Yupu Hu, Leyou Zhang:
A key-policy attribute-based broadcast encryption. Int. Arab J. Inf. Technol. 10(5): 444-452 (2013) - [j44]Yupu Hu, Fengrong Zhang, Wenzheng Zhang:
Hard fault analysis of Trivium. Inf. Sci. 229: 142-158 (2013) - [j43]Leyou Zhang, Yupu Hu:
New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing. KSII Trans. Internet Inf. Syst. 7(5): 1343-1356 (2013) - [j42]Yang Yang, Yupu Hu, Leyou Zhang:
An Efficient Biometric Identity Based Signature Scheme. KSII Trans. Internet Inf. Syst. 7(8): 2010-2026 (2013) - [j41]Baocang Wang, Yupu Hu:
Sieve Method for Polynomial Linear Equivalence. J. Appl. Math. 2013: 872962:1-872962:8 (2013) - [j40]Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Fagen Li:
Efficient and strongly unforgeable identity-based signature scheme from lattices in the standard model. Secur. Commun. Networks 6(1): 69-77 (2013) - [j39]Huan Yang, Yuqing Zhang, Yu-pu Hu, Qixu Liu:
IKE vulnerability discovery based on fuzzing. Secur. Commun. Networks 6(7): 889-901 (2013) - [j38]Yan-Xiao Liu, Yuqing Zhang, Lein Harn, Yu-pu Hu:
Verifiable symmetric polynomial-based key distribution schemes. Secur. Commun. Networks 6(8): 1028-1034 (2013) - [c27]Senshan Pan, Yupu Hu, Baocang Wang:
The termination of the F5 algorithm revisited. ISSAC 2013: 291-298 - 2012
- [j37]Claude Carlet, Fengrong Zhang, Yupu Hu:
Secondary constructions of bent functions and their enforcement. Adv. Math. Commun. 6(3): 305-314 (2012) - [j36]Yupu Hu, Juntao Gao, Qing Liu, Yiwei Zhang:
Fault analysis of Trivium. Des. Codes Cryptogr. 62(3): 289-311 (2012) - [j35]Fengrong Zhang, Yupu Hu, Yanyan Jia, Min Xie:
New constructions of balanced Boolean functions with high nonlinearity and optimal algebraic degree. Int. J. Comput. Math. 89(10): 1319-1331 (2012) - [j34]Juntao Gao, Yupu Hu, Xuelian Li:
Linear spans of optimal sets of frequency hopping sequences. RAIRO Theor. Informatics Appl. 46(3): 343-354 (2012) - [j33]Leyou Zhang, Yupu Hu, Qing Wu:
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups. Math. Comput. Model. 55(1-2): 12-18 (2012) - [j32]Yanyan Jia, Yupu Hu, Fenghe Wang, Hongxian Wang:
Correlation power analysis of Trivium. Secur. Commun. Networks 5(5): 479-484 (2012) - [j31]Fengrong Zhang, Yupu Hu, Min Xie, Yongzhuang Wei:
Constructions of 1-resilient Boolean functions on odd number of variables with a high nonlinearity. Secur. Commun. Networks 5(6): 614-624 (2012) - [j30]Yongzhuang Wei, Enes Pasalic, Yupu Hu:
Guess and Determine Attacks on Filter Generators - Revisited. IEEE Trans. Inf. Theory 58(4): 2530-2539 (2012) - [c26]Leyou Zhang, Qing Wu, Yupu Hu:
Direct CCA Secure Identity-Based Broadcast Encryption. NSS 2012: 348-360 - [i8]Fengrong Zhang, Claude Carlet, Yupu Hu, Wenzheng Zhang:
Secondary Constructions of Bent Functions and Highly Nonlinear Resilient Functions. CoRR abs/1211.4191 (2012) - [i7]Yupu Hu, Fenghe Wang:
An Attack on a Fully Homomorphic Encryption Scheme. IACR Cryptol. ePrint Arch. 2012: 561 (2012) - 2011
- [j29]Xuelian Li, Yupu Hu, Juntao Gao:
On the value distributions of Walsh spectrums of quadratic Plateaued functions. Comput. Electr. Eng. 37(6): 849-857 (2011) - [j28]Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma:
Provably secure multi-proxy signature scheme with revocation in the standard model. Comput. Commun. 34(3): 494-501 (2011) - [j27]Wenfeng Yang, Yupu Hu:
A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions. Frontiers Comput. Sci. China 5(2): 158-162 (2011) - [j26]Xuelian Li, Yupu Hu, Juntao Gao:
Lower Bounds on the Second Order nonlinearity of Boolean Functions. Int. J. Found. Comput. Sci. 22(6): 1331-1349 (2011) - [j25]Leyou Zhang, Qing Wu, Yupu Hu:
New Constructions of Identity-based Broadcast Encryption without Random Oracles. KSII Trans. Internet Inf. Syst. 5(2): 428-439 (2011) - [j24]Leyou Zhang, Qing Wu, Yupu Hu:
Secure Identity-based Threshold Broadcast Encryption in the Standard Model. J. Networks 6(11): 1602-1609 (2011) - [j23]