default search action
Dawu Gu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j116]Tengfei Wang, Chi Zhang, Xiaolin Zhang, Dawu Gu, Pei Cao:
Optimized Hardware-Software Co-Design for Kyber and Dilithium on RISC-V SoC FPGA. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 99-135 (2024) - [j115]Mingming Jiang, Shengli Liu, Shuai Han, Dawu Gu:
Biometric-based two-factor authentication scheme under database leakage. Theor. Comput. Sci. 1000: 114552 (2024) - [j114]Kaiyan He, Yikun Hu, Xuehui Li, Yunhao Song, Yubo Zhao, Dawu Gu:
Strtune: Data Dependence-Based Code Slicing for Binary Similarity Detection With Fine-Tuned Representation. IEEE Trans. Inf. Forensics Secur. 19: 10233-10245 (2024) - [j113]Chen Lyu, Amit Pande, Yuanyuan Zhang, Dawu Gu, Prasant Mohapatra:
Enabling Fast and Privacy-Preserving Broadcast Authentication With Efficient Revocation for Inter-Vehicle Connections. IEEE Trans. Mob. Comput. 23(4): 3309-3327 (2024) - [j112]Gongyu Shi, Geng Wang, Shifeng Sun, Dawu Gu:
Efficient cryptanalysis of an encrypted database supporting data interoperability. VLDB J. 33(5): 1357-1375 (2024) - [c193]Kailun Qin, Dawu Gu:
One System Call Hook to Rule All TEE OSes in the Cloud. CLOUD 2024: 205-216 - [c192]Zhilong Luo, Shifeng Sun, Zhedong Wang, Dawu Gu:
Non-interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy. ACISP (1) 2024: 281-302 - [c191]Chenke Wang, Zhonghui Ge, Yu Long, Xian Xu, Shi-Feng Sun, Dawu Gu:
BlindShuffler: Universal and Trustless Mixing for Confidential Transactions. AsiaCCS 2024 - [c190]Yunling Wang, Shi-Feng Sun, Jianfeng Wang, Xiaofeng Chen, Joseph K. Liu, Dawu Gu:
Practical Non-interactive Encrypted Conjunctive Search with Leakage Suppression. CCS 2024: 4658-4672 - [c189]Shipei Qu, Xiaolin Zhang, Chi Zhang, Dawu Gu:
Trapped by Your WORDs: (Ab)using Processor Exception for Generic Binary Instrumentation on Bare-metal Embedded Devices. DAC 2024: 285:1-285:6 - [c188]Shuai Han, Shengli Liu, Dawu Gu:
More Efficient Public-Key Cryptography with Leakage and Tamper Resilience. Public Key Cryptography (4) 2024: 3-34 - [c187]Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang:
A Refined Hardness Estimation of LWE in Two-Step Mode. Public Key Cryptography (3) 2024: 3-35 - [c186]Yuncong Zhang, Shifeng Sun, Dawu Gu:
Efficient KZG-Based Univariate Sum-Check and Lookup Argument. Public Key Cryptography (2) 2024: 400-425 - [c185]Yanxue Jia, Shi-Feng Sun, Hong-Sheng Zhou, Dawu Gu:
Scalable Private Set Union, with Stronger Security. USENIX Security Symposium 2024 - [c184]Boshi Yuan, Shixuan Yang, Yongxiang Zhang, Ning Ding, Dawu Gu, Shi-Feng Sun:
MD-ML: Super Fast Privacy-Preserving Machine Learning for Malicious Security with a Dishonest Majority. USENIX Security Symposium 2024 - [i58]Xiaolin Zhang, Kailun Qin, Shipei Qu, Tengfei Wang, Chi Zhang, Dawu Gu:
Teamwork Makes TEE Work: Open and Resilient Remote Attestation on Decentralized Trust. CoRR abs/2402.08908 (2024) - [i57]Xiaolin Zhang, Chenghao Chen, Kailun Qin, Chi Zhang, Shipei Qu, Tengfei Wang, Yuxuan Wang, Dawu Gu:
Armored Core of PKI: Remove Signing Keys for CA via Physically Unclonable Function. CoRR abs/2404.15582 (2024) - [i56]Wenwen Xia, Leizhang Wang, Geng Wang, Dawu Gu, Baocang Wang:
A Refined Hardness Estimation of LWE in Two-step Mode. IACR Cryptol. ePrint Arch. 2024: 67 (2024) - [i55]Yuncong Zhang, Shifeng Sun, Dawu Gu:
Efficient KZG-based Univariate Sum-check and Lookup Argument. IACR Cryptol. ePrint Arch. 2024: 618 (2024) - [i54]Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Dawu Gu:
Scalable Private Set Union, with Stronger Security. IACR Cryptol. ePrint Arch. 2024: 922 (2024) - [i53]Weidan Ji, Zhedong Wang, Haoxiang Jin, Qi Wang, Geng Wang, Dawu Gu:
Identity-Based Encryption from Lattices with More Compactness in the Standard Model. IACR Cryptol. ePrint Arch. 2024: 1295 (2024) - [i52]Yuxuan Wang, Jintong Yu, Shipei Qu, Xiaolin Zhang, Xiaowei Li, Chi Zhang, Dawu Gu:
Beware of Keccak: Practical Fault Attacks on SHA-3 to Compromise Kyber and Dilithium on ARM Cortex-M Devices. IACR Cryptol. ePrint Arch. 2024: 1522 (2024) - [i51]Haoxiang Jin, Feng-Hao Liu, Zhedong Wang, Dawu Gu:
Discrete Gaussians Modulo Sub-Lattices: New Leftover Hash Lemmas for Discrete Gaussians. IACR Cryptol. ePrint Arch. 2024: 1695 (2024) - [i50]Haoxiang Jin, Feng-Hao Liu, Zhedong Wang, Yang Yu, Dawu Gu:
Revisiting the Robustness of (R/M)LWR under Polynomial Moduli with Applications to Lattice-Based Compact SO-CCA Security. IACR Cryptol. ePrint Arch. 2024: 1696 (2024) - 2023
- [j111]Chi Zhang, Xiangjun Lu, Pei Cao, Dawu Gu, Zheng Guo, Sen Xu:
A nonprofiled side-channel analysis based on variational lower bound related to mutual information. Sci. China Inf. Sci. 66(1) (2023) - [j110]Pei Cao, Chi Zhang, Xiangjun Lu, Hai-Ning Lu, Dawu Gu:
Side-Channel Analysis for the Re-Keying Protocol of Bluetooth Low Energy. J. Comput. Sci. Technol. 38(5): 1132-1148 (2023) - [j109]Xiaolin Zhang, Dawu Gu, Tengfei Wang, Yu Huang:
Old School, New Primitive: Toward Scalable PUF-Based Authenticated Encryption Scheme in IoT. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(12): 4569-4582 (2023) - [j108]Yiming Li, Shengli Liu, Shuai Han, Dawu Gu, Jian Weng:
Simulatable verifiable random function from the LWE assumption. Theor. Comput. Sci. 957: 113826 (2023) - [j107]Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu:
Magma: Robust and Flexible Multi-Party Payment Channel. IEEE Trans. Dependable Secur. Comput. 20(6): 5024-5042 (2023) - [j106]Wei Li, Chun Liu, Dawu Gu, Jianning Gao, Wenqian Sun:
Statistical Differential Fault Analysis of the Saturnin Lightweight Cryptosystem in the Mobile Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 18: 1487-1496 (2023) - [j105]Xiaojun Zhang, Chao Huang, Dawu Gu, Jingwei Zhang, Huaxiong Wang:
BIB-MKS: Post-Quantum Secure Biometric Identity-Based Multi-Keyword Search Over Encrypted Data in Cloud Storage Systems. IEEE Trans. Serv. Comput. 16(1): 122-133 (2023) - [c183]Yuncong Zhang, Shifeng Sun, Ren Zhang, Dawu Gu:
Polynomial IOPs for Memory Consistency Checks in Zero-Knowledge Virtual Machines. ASIACRYPT (2) 2023: 111-141 - [c182]Zhonghui Ge, Jiayuan Gu, Chenke Wang, Yu Long, Xian Xu, Dawu Gu:
Accio: Variable-Amount, Optimized-Unlinkable and NIZK-Free Off-Chain Payments via Hubs. CCS 2023: 1541-1555 - [c181]Wenya Wang, Xingwei Lin, Jingyi Wang, Wang Gao, Dawu Gu, Wei Lv, Jiashui Wang:
HODOR: Shrinking Attack Surface on Node.js via System Call Limitation. CCS 2023: 2800-2814 - [c180]Yu Song, Yu Long, Xian Xu, Dawu Gu:
FaBFT: Flexible Asynchronous BFT Protocol Using DAG. Inscrypt (2) 2023: 343-355 - [c179]Shuai Han, Shengli Liu, Zhedong Wang, Dawu Gu:
Almost Tight Multi-user Security Under Adaptive Corruptions from LWE in the Standard Model. CRYPTO (5) 2023: 682-715 - [c178]Ziyi Zhou, Xuangan Xiao, Tianxiao Hou, Yikun Hu, Dawu Gu:
On the (In)Security of Manufacturer-Provided Remote Attestation Frameworks in Android. ESORICS (4) 2023: 250-270 - [c177]Shuai Han, Shengli Liu, Dawu Gu:
Almost Tight Multi-user Security Under Adaptive Corruptions & Leakages in the Standard Model. EUROCRYPT (3) 2023: 132-162 - [c176]Ming Wan, Geng Wang, Shifeng Sun, Dawu Gu:
Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings. ISC 2023: 516-534 - [c175]Geng Wang, Shi-Feng Sun, Zhedong Wang, Dawu Gu:
Functional Encryption Against Probabilistic Queries: Definition, Construction and Applications. Public Key Cryptography (2) 2023: 429-458 - [c174]Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:
Fine-Grained Verifier NIZK and Its Applications. Public Key Cryptography (2) 2023: 482-511 - [c173]Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:
EKE Meets Tight Security in the Universally Composable Framework. Public Key Cryptography (1) 2023: 685-713 - [c172]Yakang Li, Yikun Hu, Yizhuo Wang, Yituo He, Haining Lu, Dawu Gu:
RGDroid: Detecting Android Malware with Graph Convolutional Networks against Structural Attacks. SANER 2023: 639-650 - [c171]Xuangan Xiao, Yizhuo Wang, Yikun Hu, Dawu Gu:
xVMP: An LLVM-based Code Virtualization Obfuscator. SANER 2023: 738-742 - [i49]Wenya Wang, Xingwei Lin, Jingyi Wang, Wang Gao, Dawu Gu, Wei Lv, Jiashui Wang:
HODOR: Shrinking Attack Surface on Node.js via System Call Limitation. CoRR abs/2306.13984 (2023) - [i48]Shipei Qu, Xiaolin Zhang, Chi Zhang, Dawu Gu:
Abusing Processor Exception for General Binary Instrumentation on Bare-metal Embedded Devices. CoRR abs/2311.16532 (2023) - [i47]Shuai Han, Shengli Liu, Dawu Gu:
Almost Tight Multi-User Security under Adaptive Corruptions & Leakages in the Standard Model. IACR Cryptol. ePrint Arch. 2023: 153 (2023) - [i46]Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:
EKE Meets Tight Security in the Universally Composable Framework. IACR Cryptol. ePrint Arch. 2023: 170 (2023) - [i45]Shuai Han, Shengli Liu, Zhedong Wang, Dawu Gu:
Almost Tight Multi-User Security under Adaptive Corruptions from LWE in the Standard Model. IACR Cryptol. ePrint Arch. 2023: 1230 (2023) - [i44]Zhonghui Ge, Jiayuan Gu, Chenke Wang, Yu Long, Xian Xu, Dawu Gu:
Accio: Variable-Amount, Optimized-Unlinkable and NIZK-Free Off-Chain Payments via Hubs. IACR Cryptol. ePrint Arch. 2023: 1326 (2023) - [i43]Yuncong Zhang, Shi-Feng Sun, Ren Zhang, Dawu Gu:
Polynomial IOPs for Memory Consistency Checks in Zero-Knowledge Virtual Machines. IACR Cryptol. ePrint Arch. 2023: 1555 (2023) - [i42]Yu Song, Yu Long, Xian Xu, Dawu Gu:
FaBFT: Flexible Asynchronous BFT Protocol Using DAG. IACR Cryptol. ePrint Arch. 2023: 1660 (2023) - [i41]Shuai Han, Shengli Liu, Dawu Gu:
More Efficient Public-Key Cryptography with Leakage and Tamper Resilience. IACR Cryptol. ePrint Arch. 2023: 1965 (2023) - 2022
- [j104]Wei Li, Shan Cao, Dawu Gu, Jiayao Li, Tianpei Cai, Menglin Wang, Li Sun, Zhiqiang Liu, Ya Liu:
Ciphertext-only fault analysis of GIFT lightweight cryptosystem. Sci. China Inf. Sci. 65(3) (2022) - [j103]Hui Wang, Dawu Gu, Yuanyuan Zhang, Yikun Hu:
An empirical study of security issues in SSO server-side implementations. Sci. China Inf. Sci. 65(7): 1-3 (2022) - [j102]Hehao Li, Yizhuo Wang, Yiwei Zhang, Juanru Li, Dawu Gu:
PEDroid: Automatically Extracting Patches from Android App Updates (Artifact). Dagstuhl Artifacts Ser. 8(2): 24:1-24:2 (2022) - [j101]Xiaojun Zhang, Chao Huang, Dawu Gu, Jingwei Zhang, Jingting Xue, Huaxiong Wang:
Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems. J. Syst. Archit. 127: 102508 (2022) - [j100]Xiaojun Zhang, Wei Tang, Dawu Gu, Yuan Zhang, Jingting Xue, Xin Wang:
Lightweight Multidimensional Encrypted Data Aggregation Scheme With Fault Tolerance for Fog-Assisted Smart Grids. IEEE Syst. J. 16(4): 6647-6657 (2022) - [j99]Xiangyu Liu, Shengli Liu, Shuai Han, Dawu Gu:
Tightly CCA-secure inner product functional encryption scheme. Theor. Comput. Sci. 898: 1-19 (2022) - [j98]Shifeng Sun, Cong Zuo, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen, Xingliang Yuan, Dawu Gu:
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation. IEEE Trans. Dependable Secur. Comput. 19(1): 452-467 (2022) - [j97]Yanxue Jia, Shifeng Sun, Yuncong Zhang, Qingzhao Zhang, Ning Ding, Zhiqiang Liu, Joseph K. Liu, Dawu Gu:
${\sf PBT}$PBT: A New Privacy-Preserving Payment Protocol for Blockchain Transactions. IEEE Trans. Dependable Secur. Comput. 19(1): 647-662 (2022) - [j96]Pei Cao, Chi Zhang, Xiangjun Lu, Dawu Gu, Sen Xu:
Improving Deep Learning Based Second-Order Side-Channel Analysis With Bilinear CNN. IEEE Trans. Inf. Forensics Secur. 17: 3863-3876 (2022) - [j95]Xiaojun Zhang, Xin Wang, Dawu Gu, Jingting Xue, Wei Tang:
Conditional Anonymous Certificateless Public Auditing Scheme Supporting Data Dynamics for Cloud Storage Systems. IEEE Trans. Netw. Serv. Manag. 19(4): 5333-5347 (2022) - [j94]Tengfei Wang, Chi Zhang, Pei Cao, Dawu Gu:
Efficient Implementation of Dilithium Signature Scheme on FPGA SoC Platform. IEEE Trans. Very Large Scale Integr. Syst. 30(9): 1158-1171 (2022) - [c170]Shenwei Chen, Zhen Liu, Yu Long, Dawu Gu:
DeChain: A Blockchain Framework Enhancing Decentralization via Sharding. ACISP 2022: 469-488 - [c169]Yizhuo Wang, Yikun Hu, Xuangan Xiao, Dawu Gu:
iService: Detecting and Evaluating the Impact of Confused Deputy Problem in AppleOS. ACSAC 2022: 964-977 - [c168]You Lyu, Shengli Liu, Shuai Han, Dawu Gu:
Privacy-Preserving Authenticated Key Exchange in the Standard Model. ASIACRYPT (3) 2022: 210-240 - [c167]Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Dawu Gu:
A Universally Composable Non-interactive Aggregate Cash System. ASIACRYPT (1) 2022: 745-773 - [c166]Yuncong Zhang, Alan Szepieniec, Ren Zhang, Shifeng Sun, Geng Wang, Dawu Gu:
VOProof: Efficient zkSNARKs from Vector Oracle Compilers. CCS 2022: 3195-3208 - [c165]You Chen, Ning Ding, Dawu Gu, Yang Bian:
Practical Multi-party Private Set Intersection Cardinality and Intersection-Sum Under Arbitrary Collusion. Inscrypt 2022: 169-191 - [c164]Pei Cao, Hongyi Zhang, Dawu Gu, Yan Lu, Yidong Yuan:
AL-PA: cross-device profiled side-channel attack using adversarial learning. DAC 2022: 691-696 - [c163]Yiwei Zhang, Siqi Ma, Juanru Li, Dawu Gu, Elisa Bertino:
KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications. DSN 2022: 488-500 - [c162]Ziyi Zhou, Xing Han, Zeyuan Chen, Yuhong Nan, Juanru Li, Dawu Gu:
SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services. DSN 2022: 534-546 - [c161]Hehao Li, Yizhuo Wang, Yiwei Zhang, Juanru Li, Dawu Gu:
PEDroid: Automatically Extracting Patches from Android App Updates. ECOOP 2022: 21:1-21:31 - [c160]Yu Song, Guoshun Fan, Yu Long, Zhen Liu, Xian Xu, Dawu Gu:
Grape: Efficient Hybrid Consensus Protocol Using DAG. DPM/CBT@ESORICS 2022: 258-274 - [c159]Mingming Jiang, Shengli Liu, Shuai Han, Dawu Gu:
Fuzzy Authenticated Key Exchange with Tight Security. ESORICS (2) 2022: 337-360 - [c158]Jiajun Du, Zhonghui Ge, Yu Long, Zhen Liu, Shifeng Sun, Xian Xu, Dawu Gu:
MixCT: Mixing Confidential Transactions from Homomorphic Commitment. ESORICS (3) 2022: 763-769 - [c157]Yi Zhang, Zhonghui Ge, Yu Long, Dawu Gu:
UCC: Universal and Committee-based Cross-chain Framework. ISPEC 2022: 93-111 - [c156]Gongyu Shi, Geng Wang, Dawu Gu:
Further Cryptanalysis of a Type of RSA Variants. ISC 2022: 133-152 - [c155]Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu:
Shaduf: Non-Cycle Payment Channel Rebalancing. NDSS 2022 - [c154]Geng Wang, Ming Wan, Dawu Gu:
More Efficient Verifiable Functional Encryption. ProvSec 2022: 36-51 - [c153]Yiwei Zhang, Juanru Li, Dawu Gu:
Rethinking the security of IoT from the perspective of developer customized device-cloud interaction. SAC 2022: 210-213 - [c152]Xuancheng Jin, Xuangan Xiao, Songlin Jia, Wang Gao, Dawu Gu, Hang Zhang, Siqi Ma, Zhiyun Qian, Juanru Li:
Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK. SP 2022: 650-665 - [c151]Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu:
Shuffle-based Private Set Union: Faster and More Secure. USENIX Security Symposium 2022: 2947-2964 - [i40]Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Jiajun Du, Dawu Gu:
Shuffle-based Private Set Union: Faster and More Secure. IACR Cryptol. ePrint Arch. 2022: 157 (2022) - [i39]Zhonghui Ge, Yi Zhang, Yu Long, Dawu Gu:
Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing. IACR Cryptol. ePrint Arch. 2022: 388 (2022) - [i38]Leizhang Wang, Wenwen Xia, Geng Wang, Baocang Wang, Dawu Gu:
Improved Pump and Jump BKZ by Sharp Simulator. IACR Cryptol. ePrint Arch. 2022: 468 (2022) - [i37]Gongyu Shi, Geng Wang, Dawu Gu:
Further Cryptanalysis of a Type of RSA Variants. IACR Cryptol. ePrint Arch. 2022: 611 (2022) - [i36]Yanxue Jia, Shifeng Sun, Hong-Sheng Zhou, Dawu Gu:
The Ideal Functionalities for Private Set Union, Revisited. IACR Cryptol. ePrint Arch. 2022: 750 (2022) - [i35]Jiajun Du, Zhonghui Ge, Yu Long, Zhen Liu, Shifeng Sun, Xian Xu, Dawu Gu:
MixCT: Mixing Confidential Transactions from Homomorphic Commitment. IACR Cryptol. ePrint Arch. 2022: 951 (2022) - [i34]You Lyu, Shengli Liu, Shuai Han, Dawu Gu:
Privacy-Preserving Authenticated Key Exchange in the Standard Model. IACR Cryptol. ePrint Arch. 2022: 1217 (2022) - [i33]Xiangyu Liu, Shengli Liu, Dawu Gu:
Tightly Secure Chameleon Hash Functions in the Multi-User Setting and Their Applications. IACR Cryptol. ePrint Arch. 2022: 1258 (2022) - [i32]Wenwen Xia, Leizhang Wang, GengWang, Dawu Gu, Baocang Wang:
Improved Progressive BKZ with Lattice Sieving. IACR Cryptol. ePrint Arch. 2022: 1343 (2022) - [i31]Geng Wang, Wenwen Xia, Gongyu Shi, Ming Wan, Yuncong Zhang, Dawu Gu:
Revisiting the Concrete Hardness of SelfTargetMSIS in CRYSTALS-Dilithium. IACR Cryptol. ePrint Arch. 2022: 1601 (2022) - 2021
- [j93]Yanli Ren, Xinpeng Zhang, Dawu Gu, Guorui Feng:
Efficient outsourced extraction of histogram features over encrypted images in cloud. Sci. China Inf. Sci. 64(3) (2021) - [j92]Lin Ding, Dawu Gu, Lei Wang, Chenhui Jin, Jie Guan:
Improved Guess and Determine attack on the MASHA stream cipher. Sci. China Inf. Sci. 64(9) (2021) - [j91]Nan Cui, Shengli Liu, Dawu Gu, Jian Weng:
Robustly reusable fuzzy extractor with imperfect randomness. Des. Codes Cryptogr. 89(5): 1017-1059 (2021) - [j90]Yiming Li, Shengli Liu, Shuai Han, Dawu Gu:
Pseudorandom functions in NC class from the standard LWE assumption. Des. Codes Cryptogr. 89(12): 2807-2839 (2021) - [j89]Ning Ding, Dawu Gu:
New cryptographic hardness for learning intersections of halfspaces over boolean cubes with membership queries. Inf. Comput. 281: 104771 (2021) - [j88]Lin Ding, Dawu Gu, Lei Wang, Chenhui Jin, Jie Guan:
A real-time related key attack on the WG-16 stream cipher for securing 4G-LTE networks. J. Inf. Secur. Appl. 63: 103015 (2021) - [j87]Xiangjun Lu, Chi Zhang, Pei Cao, Dawu Gu, Haining Lu:
Pay Attention to Raw Traces: A Deep Learning Architecture for End-to-End Profiling Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(3): 235-274 (2021) - [j86]Pei Cao, Chi Zhang, Xiangjun Lu, Dawu Gu:
Cross-Device Profiled Side-Channel Attack with Unsupervised Domain Adaptation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4): 27-56 (2021) - [j85]Wei Li, Jiayao Li, Dawu Gu, Chaoyun Li, Tianpei Cai:
Statistical Fault Analysis of the Simeck Lightweight Cipher in the Ubiquitous Sensor Networks. IEEE Trans. Inf. Forensics Secur. 16: 4224-4233 (2021) - [j84]Yikun Hu, Hui Wang, Yuanyuan Zhang, Bodong Li, Dawu Gu:
A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison. IEEE Trans. Software Eng. 47(6): 1241-1258 (2021) - [c150]Yanxue Jia, Shifeng Sun, Yi Zhang, Zhiqiang Liu, Dawu Gu:
Redactable Blockchain Supporting Supervision and Self-Management. AsiaCCS 2021: 844-858 - [c149]Shuai Han, Shengli Liu, Dawu Gu:
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-user Setting: Impossibility Result and Optimal Tightness. ASIACRYPT (2) 2021: 483-513 - [c148]Xiangjun Lu, Chi Zhang, Dawu Gu:
Attention - Based Non-Profiled Side-Channel Attack. AsianHOST 2021: 1-6 - [c147]Chi Zhang, Xiangjun Lu, Dawu Gu:
Binary Classification-Based Side-Channel Analysis. AsianHOST 2021: 1-6 - [c146]Geng Wang, Ming Wan, Zhen Liu, Dawu Gu:
Fully Secure Lattice-Based ABE from Noisy Linear Functional Encryption. Inscrypt 2021: 421-441 - [c145]Yaobin Shen, Lei Wang, Dawu Gu, Jian Weng:
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting. CRYPTO (3) 2021: 309-336 - [c144]Shifeng Sun, Ron Steinfeld, Shangqi Lai, Xingliang Yuan, Amin Sakzad, Joseph K. Liu, Surya Nepal, Dawu Gu:
Practical Non-Interactive Searchable Encryption with Forward and Backward Privacy. NDSS 2021 - [c143]Wenya Wang, Yakang Li, Chao Wang, Yuan Yan, Juanru Li, Dawu Gu:
Re-Check Your Certificates! Experiences and Lessons Learnt from Real-World HTTPS Certificate Deployments. NSS 2021: 17-37 - [c142]Mingming Jiang, Shengli Liu, Shuai Han, Dawu Gu:
Authentication System Based on Fuzzy Extractors. WASA (3) 2021: 479-490 - [i30]Yuncong Zhang, Ren Zhang, Geng Wang, Dawu Gu:
VCProof: Constructing Shorter and Faster-to-Verify zkSNARKs with Vector Oracles. IACR Cryptol. ePrint Arch. 2021: 710 (2021) - [i29]Shuai Han, Shengli Liu, Dawu Gu:
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-User Setting: Impossibility Result and Optimal Tightness. IACR Cryptol. ePrint Arch. 2021: 1146 (2021) - [i28]Yaobin Shen, Lei Wang, Dawu Gu:
LedMAC: More Efficient Variants of LightMAC. IACR Cryptol. ePrint Arch. 2021: 1210 (2021) - 2020
- [j83]Ya Liu, Tiande Zang, Dawu Gu, Fengyu Zhao, Wei Li, Zhiqiang Liu:
Improved Cryptanalysis of Reduced-Version QARMA-64/128. IEEE Access 8: 8361-8370 (2020) - [j82]Zhiqiang Liu, Shuai Han, Qingju Wang, Wei Li, Ya Liu, Dawu Gu:
New insights on linear cryptanalysis. Sci. China Inf. Sci. 63(1): 112104 (2020) - [j81]Wei Li, Linfeng Liao, Dawu Gu, Shan Cao, Yixin Wu, Jiayao Li, Zhihong Zhou, Zheng Guo, Ya Liu, Zhiqiang Liu:
Ciphertext-only fault analysis on the Midori lightweight cryptosystem. Sci. China Inf. Sci. 63(3) (2020) - [j80]Yiming Li, Shengli Liu, Dawu Gu, Kefei Chen:
Reusable Fuzzy Extractor Based on the LPN Assumption. Comput. J. 63(12): 1826-1834 (2020) - [j79]Ya Liu, Bing Shi, Dawu Gu, Fengyu Zhao, Wei Li, Zhiqiang Liu:
Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256. Comput. J. 63(12): 1859-1870 (2020) - [j78]Hui Liu, Juanru Li, Dawu Gu:
Understanding the security of app-in-the-middle IoT. Comput. Secur. 97: 102000 (2020) - [j77]Xiangjun Lu, Chi Zhang, Dawu Gu, Junrong Liu, Qian Peng, Hai-Feng Zhang:
Evaluating and Improving Linear Regression Based Profiling: On the Selection of Its Regularization. J. Comput. Sci. Technol. 35(5): 1175-1197 (2020) - [j76]Fan Zhang, Yiran Zhang, Huilong Jiang, Xiang Zhu, Shivam Bhasin, Xinjie Zhao, Zhe Liu, Dawu Gu, Kui Ren:
Persistent Fault Attack in Practice. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 172-195 (2020) - [c141]Xiangyu Liu, Shengli Liu, Dawu Gu:
Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications. ACISP 2020: 664-673 - [c140]Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng:
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security. ASIACRYPT (2) 2020: 785-814 - [c139]Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. Financial Cryptography 2020: 464-483 - [c138]Lin Ding, Lei Wang, Dawu Gu, Chenhui Jin, Jie Guan:
A New General Method of Searching for Cubes in Cube Attacks. ICICS 2020: 369-385 - [c137]Shifeng Sun, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu:
Public-Key Puncturable Encryption: Modular and Compact Constructions. Public Key Cryptography (1) 2020: 309-338 - [c136]Yuyao Zhang, Siqi Ma, Juanru Li, Kailai Li, Surya Nepal, Dawu Gu:
SMARTSHIELD: Automatic Smart Contract Protection Made Easy. SANER 2020: 23-34 - [i27]Shifeng Sun, Amin Sakzad, Ron Steinfeld, Joseph K. Liu, Dawu Gu:
Public-Key Puncturable Encryption: Modular and Compact Constructions. IACR Cryptol. ePrint Arch. 2020: 126 (2020) - [i26]Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng:
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security. IACR Cryptol. ePrint Arch. 2020: 1088 (2020)
2010 – 2019
- 2019
- [j75]Yikun Hu, Yuanyuan Zhang, Dawu Gu:
Automatically Patching Vulnerabilities of Binary Programs via Code Transfer From Correct Versions. IEEE Access 7: 28170-28184 (2019) - [j74]Ya Liu, Yifan Shi, Dawu Gu, Bo Dai, Fengyu Zhao, Wei Li, Zhiqiang Liu, Zhiqiang Zeng:
Improved impossible differential cryptanalysis of large-block Rijndael. Sci. China Inf. Sci. 62(3): 32101:1-32101:14 (2019) - [j73]Kamel Ammour, Lei Wang, Dawu Gu:
Pseudo random oracle of Merkle-Damgård hash functions revisited. Sci. China Inf. Sci. 62(3): 32112:1-32112:15 (2019) - [j72]Sen Xu, Weija Wang, Xiangjun Lu, Zheng Guo, Junrong Liu, Dawu Gu:
Side channel attack of multiplication in GF(q)-application to secure RSA-CRT. Sci. China Inf. Sci. 62(3): 39105:1-39105:3 (2019) - [j71]Ya Liu, Yifan Shi, Dawu Gu, Zhiqiang Zeng, Fengyu Zhao, Wei Li, Zhiqiang Liu, Yang Bao:
Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC. Comput. J. 62(12): 1761-1776 (2019) - [j70]Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and efficient scheme in Zerocash. Comput. Secur. 86: 112-131 (2019) - [j69]Chun Guo, Yaobin Shen, Lei Wang, Dawu Gu:
Beyond-birthday secure domain-preserving PRFs from a single permutation. Des. Codes Cryptogr. 87(6): 1297-1322 (2019) - [j68]Wenbo Yang, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Security analysis of third-party in-app payment in mobile applications. J. Inf. Secur. Appl. 48 (2019) - [j67]Ya Liu, Liang Cheng, Fengyu Zhao, Chunhua Su, Zhiqiang Liu, Wei Li, Dawu Gu:
New Analysis of Reduced-Version of Piccolo in the Single-Key Scenario. KSII Trans. Internet Inf. Syst. 13(9): 4727-4741 (2019) - [j66]Chi Zhang, Junrong Liu, Dawu Gu, Weijia Wang, Xiangjun Lu, Zheng Guo, Hai-Ning Lu:
Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks. J. Comput. Sci. Technol. 34(5): 1079-1095 (2019) - [j65]Lin Ding, Lei Wang, Dawu Gu, Chenhui Jin, Jie Guan:
Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping. Secur. Commun. Networks 2019: 7429320:1-7429320:5 (2019) - [j64]Xiao Zhang, Shengli Liu, Dawu Gu, Joseph K. Liu:
A generic construction of tightly secure signatures in the multi-user setting. Theor. Comput. Sci. 775: 32-52 (2019) - [j63]Lin Lyu, Shengli Liu, Dawu Gu:
Structure-preserving public-key encryption with leakage-resilient CCA security. Theor. Comput. Sci. 795: 57-80 (2019) - [j62]Xiao Zhang, Shengli Liu, Jiaxin Pan, Dawu Gu:
Tightly secure signature schemes from the LWE and subset sum assumptions. Theor. Comput. Sci. 795: 326-344 (2019) - [j61]Wei Li, Linfeng Liao, Dawu Gu, Chaoyun Li, Chenyu Ge, Zheng Guo, Ya Liu, Zhiqiang Liu:
Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things. IEEE Trans. Dependable Secur. Comput. 16(3): 454-461 (2019) - [c135]Nan Cui, Shengli Liu, Yunhua Wen, Dawu Gu:
Pseudorandom Functions from LWE: RKA Security and Application. ACISP 2019: 229-250 - [c134]Shifeng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, Joseph K. Liu:
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System. ACNS 2019: 486-506 - [c133]Huayi Li, Yuanyuan Zhang, Jianqiang Wang, Dawu Gu:
SymSem: Symbolic Execution with Time Stamps for Deobfuscation. Inscrypt 2019: 225-245 - [c132]Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu:
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System. CRYPTO (2) 2019: 417-447 - [c131]Lin Ding, Dawu Gu, Lei Wang:
New Key Recovery Attack on the MICKEY Family of Stream Ciphers. FCS 2019: 239-249 - [c130]Geng Wang, Zhen Liu, Dawu Gu:
Ciphertext Policy Attribute-Based Encryption for Circuits from LWE Assumption. ICICS 2019: 378-396 - [c129]Long Mai, Yuan Yan, Songlin Jia, Shuran Wang, Jianqiang Wang, Juanru Li, Siqi Ma, Dawu Gu:
Accelerating SM2 Digital Signature Algorithm Using Modern Processor Features. ICICS 2019: 430-446 - [c128]Lin Ding, Dawu Gu, Lei Wang:
Mixing Property Tester: A General Framework for Evaluating the Mixing Properties of Initialization of Stream Ciphers. iSCI 2019: 570-582 - [c127]Feng Shen, Yu Long, Zhen Liu, Zhiqiang Liu, Hongyang Liu, Dawu Gu, Ning Liu:
A Practical Dynamic Enhanced BFT Protocol. NSS 2019: 288-304 - [c126]Chen Pan, Shuyang Tang, Zhonghui Ge, Zhiqiang Liu, Yu Long, Zhen Liu, Dawu Gu:
Gnocchi: Multiplexed Payment Channels for Cryptocurrencies. NSS 2019: 488-503 - [c125]Yunhua Wen, Shengli Liu, Dawu Gu:
Generic Constructions of Robustly Reusable Fuzzy Extractor. Public Key Cryptography (2) 2019: 349-378 - [c124]Yi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Dawu Gu, Fei Huan, Yanxue Jia:
TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility. ProvSec 2019: 339-346 - [c123]Jianqiang Wang, Siqi Ma, Yuanyuan Zhang, Juanru Li, Zheyu Ma, Long Mai, Tiancheng Chen, Dawu Gu:
NLP-EYE: Detecting Memory Corruptions via Semantic-Aware Memory Operation Function Identification. RAID 2019: 309-321 - [c122]Shuyang Tang, Jilai Zheng, Yao Deng, Ziyu Wang, Zhiqiang Liu, Dawu Gu, Zhen Liu, Yu Long:
Towards a Multi-chain Future of Proof-of-Space. SecureComm (1) 2019: 23-38 - [c121]Qingyi Liu, Zhen Liu, Yu Long, Zhiqiang Liu, Zhimei Sui, Shifeng Sun, Shuyang Tang, Dawu Gu:
Making Monero Hard-to-Trace and More Efficient. TrustCom/BigDataSE 2019: 514-521 - [c120]Hongyang Liu, Feng Shen, Zhiqiang Liu, Yu Long, Zhen Liu, Shifeng Sun, Shuyang Tang, Dawu Gu:
A Secure and Practical Blockchain Scheme for IoT. TrustCom/BigDataSE 2019: 538-545 - [c119]Bodong Li, Yuanyuan Zhang, Juanru Li, Runhan Feng, Dawu Gu:
APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps. SANER 2019: 344-354 - [i25]Yikun Hu, Hui Wang, Yuanyuan Zhang, Bodong Li, Dawu Gu:
A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison. CoRR abs/1907.01374 (2019) - [i24]Shuyang Tang, Jilai Zheng, Yao Deng, Ziyu Wang, Zhiqiang Liu, Dawu Gu:
Towards a Multi-Chain Future of Proof-of-Space. CoRR abs/1907.07896 (2019) - [i23]Yunhua Wen, Shengli Liu, Dawu Gu:
Generic Constructions of Robustly Reusable Fuzzy Extractor. IACR Cryptol. ePrint Arch. 2019: 18 (2019) - [i22]Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. IACR Cryptol. ePrint Arch. 2019: 508 (2019) - [i21]Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu:
Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System. IACR Cryptol. ePrint Arch. 2019: 512 (2019) - 2018
- [j60]Ya Liu, Liang Cheng, Zhiqiang Liu, Wei Li, Qingju Wang, Dawu Gu:
Improved meet-in-the-middle attacks on reduced-round Piccolo. Sci. China Inf. Sci. 61(3): 032108:1-032108:13 (2018) - [j59]Sen Xu, Xiangjun Lu, Kaiyu Zhang, Yang Li, Lei Wang, Weijia Wang, Haihua Gu, Zheng Guo, Junrong Liu, Dawu Gu:
Similar operation template attack on RSA-CRT as a case study. Sci. China Inf. Sci. 61(3): 032111:1-032111:17 (2018) - [j58]Ya Liu, Anren Yang, Bo Dai, Wei Li, Zhiqiang Liu, Dawu Gu, Zhiqiang Zeng:
Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128. Comput. J. 61(8): 1252-1258 (2018) - [j57]Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu:
Tightly Secure Encryption Schemes against Related-Key Attacks. Comput. J. 61(12): 1825-1844 (2018) - [j56]Shuai Han, Shengli Liu, Baodong Qin, Dawu Gu:
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness. Des. Codes Cryptogr. 86(3): 517-554 (2018) - [j55]Wei Li, Linfeng Liao, Dawu Gu, Chenyu Ge, Zhiyong Gao, Zhihong Zhou, Zheng Guo, Ya Liu, Zhiqiang Liu:
Security Analysis of the PHOTON Lightweight Cryptosystem in the Wireless Body Area Network. KSII Trans. Internet Inf. Syst. 12(1): 476-496 (2018) - [j54]Wei Li, Chenyu Ge, Dawu Gu, Linfeng Liao, Zhiyong Gao, Xiujin Shi, Ting Lu, Ya Liu, Zhiqiang Liu:
Security Analysis of the Khudra Lightweight Cryptosystem in the Vehicular Ad-hoc Networks. KSII Trans. Internet Inf. Syst. 12(7): 3421-3437 (2018) - [j53]Bodong Li, Yuanyuan Zhang, Juanru Li, Wenbo Yang, Dawu Gu:
AppSpear: Automating the hidden-code extraction and reassembling of packed android malware. J. Syst. Softw. 140: 3-16 (2018) - [j52]Weijia Wang, Yu Yu, François-Xavier Standaert, Junrong Liu, Zheng Guo, Dawu Gu:
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips. IEEE Trans. Inf. Forensics Secur. 13(5): 1301-1316 (2018) - [c118]Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and Efficient Scheme in Zerocash. ACISP 2018: 687-705 - [c117]Haohuang Wen, Juanru Li, Yuanyuan Zhang, Dawu Gu:
An Empirical Study of SDK Credential Misuse in iOS Apps. APSEC 2018: 258-267 - [c116]Juanru Li, Zhiqiang Lin, Juan Caballero, Yuanyuan Zhang, Dawu Gu:
K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces. CCS 2018: 412-425 - [c115]Hao Xu, Yu Long, Zhiqiang Liu, Zhen Liu, Dawu Gu:
Dynamic Practical Byzantine Fault Tolerance. CNS 2018: 1-8 - [c114]Yikun Hu, Yuanyuan Zhang, Juanru Li, Hui Wang, Bodong Li, Dawu Gu:
BinMatch: A Semantics-Based Hybrid Approach on Binary Code Clone Analysis. ICSME 2018: 104-114 - [c113]Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Burn After Reading: Expunging Execution Footprints of Android Apps. NSS 2018: 46-63 - [c112]Lin Lyu, Shengli Liu, Shuai Han, Dawu Gu:
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions. Public Key Cryptography (1) 2018: 62-92 - [c111]Chen Lyu, Amit Pande, Yuanyuan Zhang, Dawu Gu, Prasant Mohapatra:
FastTrust: Fast and Anonymous Spatial-Temporal Trust for Connected Cars on Expressways. SECON 2018: 289-297 - [c110]Changyu Li, Quanpu Cai, Juanru Li, Hui Liu, Yuanyuan Zhang, Dawu Gu, Yu Yu:
Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning. WISEC 2018: 1-11 - [i20]Yikun Hu, Yuanyuan Zhang, Juanru Li, Hui Wang, Bodong Li, Dawu Gu:
BinMatch: A Semantics-based Hybrid Approach on Binary Code Clone Analysis. CoRR abs/1808.06216 (2018) - [i19]Lin Lyu, Shengli Liu, Shuai Han, Dawu Gu:
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions. IACR Cryptol. ePrint Arch. 2018: 30 (2018) - [i18]Yaobin Shen, Lei Wang, Dawu Gu:
ISO/IEC 9797-1 Revisited: Beyond Birthday Bound. IACR Cryptol. ePrint Arch. 2018: 468 (2018) - 2017
- [j51]Baodong Qin, Shengli Liu, Shifeng Sun, Robert H. Deng, Dawu Gu:
Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman. Inf. Sci. 406: 1-11 (2017) - [j50]Wei Li, Zhiyong Gao, Dawu Gu, Chenyu Ge, Linfeng Liao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:
Security Analysis of the Whirlpool Hash Function in the Cloud of Things. KSII Trans. Internet Inf. Syst. 11(1): 536-551 (2017) - [j49]Shifeng Sun, Dawu Gu, Udaya Parampalli, Yu Yu, Baodong Qin:
Public key encryption resilient to leakage and tampering attacks. J. Comput. Syst. Sci. 89: 142-156 (2017) - [j48]Junliang Shu, Yuanyuan Zhang, Juanru Li, Bodong Li, Dawu Gu:
Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems. ACM Trans. Embed. Comput. Syst. 16(2): 61:1-61:22 (2017) - [c109]Xiao Zhang, Shengli Liu, Dawu Gu:
Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption. ACISP (1) 2017: 453-468 - [c108]Ning Ding, Yanli Ren, Dawu Gu:
PAC Learning Depth-3 $\textrm{AC}^0$ Circuits of Bounded Top Fanin. ALT 2017: 667-680 - [c107]Qi Zhang, Juanru Li, Yuanyuan Zhang, Hui Wang, Dawu Gu:
Oh-Pwn-VPN! Security Analysis of OpenVPN-Based Android Apps. CANS 2017: 373-389 - [c106]Sihang Pu, Yu Yu, Weijia Wang, Zheng Guo, Junrong Liu, Dawu Gu, Lingyun Wang, Jie Gan:
Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA? CARDIS 2017: 232-247 - [c105]Hui Liu, Changyu Li, Xuancheng Jin, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Smart Solution, Poor Protection: An Empirical Study of Security and Privacy Issues in Developing and Deploying Smart Home Devices. IoT S&P@CCS 2017: 13-18 - [c104]Sihang Pu, Zheng Guo, Junrong Liu, Dawu Gu, Yingxuan Yang, Xiaoke Tang, Jie Gan:
Boolean Matrix Masking for SM4 Block Cipher Algorithm. CIS 2017: 238-242 - [c103]Kaiyu Zhang, Sen Xu, Dawu Gu, Haihua Gu, Junrong Liu, Zheng Guo, Ruitong Liu, Liang Liu, Xiaobo Hu:
Practical Partial-Nonce-Exposure Attack on ECC Algorithm. CIS 2017: 248-252 - [c102]Sen Xu, Haihua Gu, Lingyun Wang, Zheng Guo, Junrong Liu, Xiangjun Lu, Dawu Gu:
Efficient and Constant Time Modular Inversions Over Prime Fields. CIS 2017: 524-528 - [c101]Wenlin Meng, Wenfeng Zhu, Chi Zhang, Junrong Liu, Zheng Guo, Dawu Gu, Wei Fan, Haifeng Zhang, Yidong Yuan:
An Implementation of Trojan Side-Channel with a Masking Scheme. CIS 2017: 566-569 - [c100]Qing Wang, Juanru Li, Yuanyuan Zhang, Hui Wang, Yikun Hu, Bodong Li, Dawu Gu:
NativeSpeaker: Identifying Crypto Misuses in Android Native Code Libraries. Inscrypt 2017: 301-320 - [c99]Xiangmin Li, Ning Ding, Haining Lu, Dawu Gu, Shanshan Wang, Beibei Xu, Yuan Yuan, Siyun Yan:
A Modified Fuzzy Fingerprint Vault Based on Pair-Polar Minutiae Structures. Inscrypt 2017: 482-499 - [c98]Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu:
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. CRYPTO (2) 2017: 404-427 - [c97]Weijia Wang, Yu Yu, François-Xavier Standaert, Dawu Gu, Sen Xu, Chi Zhang:
Ridge-Based Profiled Differential Power Analysis. CT-RSA 2017: 347-362 - [c96]Zhenghao Hu, Yuanyuan Zhang, Hui Wang, Juanru Li, Wenbo Yang, Dawu Gu:
MIRAGE: Randomizing large chunk allocation via dynamic binary instrumentation. DSC 2017: 98-106 - [c95]Xuewen Zhang, Yuanyuan Zhang, Juanru Li, Yikun Hu, Huayi Li, Dawu Gu:
Embroidery: Patching Vulnerable Binary Code of Fragmentized Android Devices. ICSME 2017: 47-57 - [c94]Haijiang Xie, Yuanyuan Zhang, Juanru Li, Dawu Gu:
Nightingale: Translating Embedded VM Code in x86 Binary Executables. ISC 2017: 387-404 - [c93]Yikun Hu, Yuanyuan Zhang, Juanru Li, Dawu Gu:
Binary code clone detection across architectures and compiling configurations. ICPC 2017: 88-98 - [c92]Wenbo Yang, Yuanyuan Zhang, Juanru Li, Hui Liu, Qing Wang, Yueheng Zhang, Dawu Gu:
Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps. NDSS 2017 - [c91]Ning Ding, Yanli Ren, Dawu Gu:
Learning AC0 Under k-Dependent Distributions. TAMC 2017: 187-200 - [c90]Siqi Zhao, Xuhua Ding, Wen Xu, Dawu Gu:
Seeing Through The Same Lens: Introspecting Guest Address Space At Native Speed. USENIX Security Symposium 2017: 799-813 - [i17]Zhenzhen Bao, Lei Wang, Jian Guo, Dawu Gu:
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. IACR Cryptol. ePrint Arch. 2017: 534 (2017) - [i16]Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and Efficient Scheme in Zerocash. IACR Cryptol. ePrint Arch. 2017: 684 (2017) - [i15]Shifeng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Dawu Gu:
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. IACR Cryptol. ePrint Arch. 2017: 921 (2017) - 2016
- [j47]Yanli Ren, Ning Ding, Tian-Yin Wang, Haining Lu, Dawu Gu:
New algorithms for verifiable outsourcing of bilinear pairings. Sci. China Inf. Sci. 59(9): 99103 (2016) - [j46]Shifeng Sun, Joseph K. Liu, Yu Yu, Baodong Qin, Dawu Gu:
RKA-Secure Public Key Encryptions Against Efficiently Invertible Functions. Comput. J. 59(11): 1637-1658 (2016) - [j45]Yanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu:
Identity-Based Encryption with Verifiable Outsourced Revocation. Comput. J. 59(11): 1659-1668 (2016) - [j44]Zhiqiang Liu, Bing Sun, Qingju Wang, Kerem Varici, Dawu Gu:
Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys. IET Inf. Secur. 10(2): 95-103 (2016) - [j43]Shifeng Sun, Shuai Han, Dawu Gu, Shengli Liu:
Public key cryptosystems secure against memory leakage attacks. IET Inf. Secur. 10(6): 403-412 (2016) - [j42]Ya Liu, Anren Yang, Zhiqiang Liu, Wei Li, Qingju Wang, Liang Song, Dawu Gu:
Improved impossible differential attack on reduced version of Camellia with FL/FL -1 functions. IET Inf. Secur. 10(6): 425-432 (2016) - [j41]Chen Lyu, Shifeng Sun, Yuanyuan Zhang, Amit Pande, Haining Lu, Dawu Gu:
Privacy-preserving data sharing scheme over cloud for social applications. J. Netw. Comput. Appl. 74: 44-55 (2016) - [j40]Shifeng Sun, Dawu Gu, Shengli Liu:
Efficient chosen ciphertext secure identity-based encryption against key leakage attacks. Secur. Commun. Networks 9(11): 1417-1434 (2016) - [j39]Chen Lyu, Dawu Gu, Yunze Zeng, Prasant Mohapatra:
PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications. IEEE Trans. Dependable Secur. Comput. 13(1): 71-83 (2016) - [j38]Wei Li, Wenwen Zhang, Dawu Gu, Yanqin Cao, Zhi Tao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:
Impossible Differential Fault Analysis on the LED Lightweight Cryptosystem in the Vehicular Ad-Hoc Networks. IEEE Trans. Dependable Secur. Comput. 13(1): 84-92 (2016) - [j37]Fan Zhang, Shize Guo, Xinjie Zhao, Tao Wang, Jian Yang, François-Xavier Standaert, Dawu Gu:
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers. IEEE Trans. Inf. Forensics Secur. 11(5): 1039-1054 (2016) - [c89]Shifeng Sun, Udaya Parampalli, Tsz Hon Yuen, Yu Yu, Dawu Gu:
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions. ACISP (2) 2016: 134-150 - [c88]Hui Wang, Yuanyuan Zhang, Juanru Li, Dawu Gu:
The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication. ACSAC 2016: 167-176 - [c87]Hui Liu, Yuanyuan Zhang, Juanru Li, Hui Wang, Dawu Gu:
Open Sesame! Web Authentication Cracking via Mobile App Analysis. APWeb (2) 2016: 483-487 - [c86]Lei Wang, Jian Guo, Guoyan Zhang, Jingyuan Zhao, Dawu Gu:
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers. ASIACRYPT (1) 2016: 455-483 - [c85]Weijia Wang, François-Xavier Standaert, Yu Yu, Sihang Pu, Junrong Liu, Zheng Guo, Dawu Gu:
Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages. CARDIS 2016: 174-191 - [c84]Yanli Ren, Ning Ding, Xinpeng Zhang, Haining Lu, Dawu Gu:
Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability. AsiaCCS 2016: 293-303 - [c83]Shifeng Sun, Dawu Gu, Joseph K. Liu, Udaya Parampalli, Tsz Hon Yuen:
Efficient Construction of Completely Non-Malleable CCA Secure Public Key Encryption. AsiaCCS 2016: 901-906 - [c82]Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day (Mandel) Yu:
Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications. CHES 2016: 412-431 - [c81]Ning Ding, Yanli Ren, Dawu Gu:
Four-Round Zero-Knowledge Arguments of Knowledge with Strict Polynomial-Time Simulation from Differing-Input Obfuscation for Circuits. COCOON 2016: 281-292 - [c80]Yesheng Zhi, Yuanyuan Zhang, Juanru Li, Dawu Gu:
Security Testing of Software on Embedded Devices Using x86 Platform. CollaborateCom 2016: 497-504 - [c79]Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede:
Upper bounds on the min-entropy of RO Sum, Arbiter, Feed-Forward Arbiter, and S-ArbRO PUFs. AsianHOST 2016: 1-6 - [c78]Nan Yao, Yu Yu, Xiangxue Li, Dawu Gu:
On the Robustness of Learning Parity with Noise. ICICS 2016: 99-106 - [c77]Muqing Liu, Yuanyuan Zhang, Juanru Li, Junliang Shu, Dawu Gu:
Security Analysis of Vendor Customized Code in Firmware of Embedded Device. SecureComm 2016: 722-739 - [c76]Tianyi Xie, Yuanyuan Zhang, Juanru Li, Hui Liu, Dawu Gu:
New Exploit Methods against Ptmalloc of GLIBC. Trustcom/BigDataSE/ISPA 2016: 646-653 - [c75]Yikun Hu, Yuanyuan Zhang, Juanru Li, Dawu Gu:
Cross-Architecture Binary Semantics Understanding via Similar Code Comparison. SANER 2016: 57-67 - [i14]Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu:
Evaluation and Improvement of Generic-Emulating DPA Attacks. IACR Cryptol. ePrint Arch. 2016: 294 (2016) - [i13]Lei Wang, Jian Guo, Guoyan Zhang, Jingyuan Zhao, Dawu Gu:
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers. IACR Cryptol. ePrint Arch. 2016: 876 (2016) - 2015
- [j36]Shifeng Sun, Dawu Gu, Zhengan Huang:
Fully Secure Wicked Identity-Based Encryption Against Key Leakage Attacks. Comput. J. 58(10): 2520-2536 (2015) - [j35]Chen Lyu, Dawu Gu, Xiaomei Zhang, Shifeng Sun, Yuanyuan Zhang, Amit Pande:
SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs. Comput. Commun. 59: 37-51 (2015) - [j34]Haihua Gu, Dawu Gu, WenLu Xie, Ray C. C. Cheung:
Efficient Pairing Computation on Huff Curves. Cryptologia 39(3): 270-275 (2015) - [j33]Jeroen Delvaux, Roel Peeters, Dawu Gu, Ingrid Verbauwhede:
A Survey on Lightweight Entity Authentication with Strong PUFs. ACM Comput. Surv. 48(2): 26:1-26:42 (2015) - [j32]Qingju Wang, Zhiqiang Liu, Deniz Toz, Kerem Varici, Dawu Gu:
Related-key rectangle cryptanalysis of Rijndael-160 and Rijndael-192. IET Inf. Secur. 9(5): 266-276 (2015) - [j31]Shifeng Sun, Chen Lyu, Dawu Gu, Yuanyuan Zhang, Yanli Ren:
Towards Efficient, Secure, and Fine-Grained Access Control System in MSNs with Flexible Revocations. Int. J. Distributed Sens. Networks 11: 857405:1-857405:15 (2015) - [j30]Wei Li, Wenwen Zhang, Dawu Gu, Zhi Tao, Zhihong Zhou, Ya Liu, Zhiqiang Liu:
Security Analysis of the Lightweight Cryptosystem TWINE in the Internet of Things. KSII Trans. Internet Inf. Syst. 9(2): 793-810 (2015) - [j29]Zhiqiang Liu, Ya Liu, Qingju Wang, Dawu Gu, Wei Li:
Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers. Secur. Commun. Networks 8(4): 672-681 (2015) - [j28]Jeroen Delvaux, Dawu Gu, Dries Schellekens, Ingrid Verbauwhede:
Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(6): 889-902 (2015) - [c74]Hui Wang, Yuanyuan Zhang, Juanru Li, Hui Liu, Wenbo Yang, Bodong Li, Dawu Gu:
Vulnerability Assessment of OAuth Implementations in Android Applications. ACSAC 2015: 61-70 - [c73]Wen Xu, Juanru Li, Junliang Shu, Wenbo Yang, Tianyi Xie, Yuanyuan Zhang, Dawu Gu:
From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel. CCS 2015: 414-425 - [c72]Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu:
Evaluation and Improvement of Generic-Emulating DPA Attacks. CHES 2015: 416-432 - [c71]Bodong Li, Yuanyuan Zhang, Chen Lyu, Juanru Li, Dawu Gu:
SSG: Sensor Security Guard for Android Smartphones. CollaborateCom 2015: 221-233 - [c70]Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng:
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond. CRYPTO (2) 2015: 209-229 - [c69]Junrong Liu, Yu Yu, François-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Xinjun Xie:
Small Tweaks Do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards. ESORICS (1) 2015: 468-480 - [c68]Chen Lyu, Amit Pande, Xinlei Wang, Jindan Zhu, Dawu Gu, Prasant Mohapatra:
CLIP: Continuous Location Integrity and Provenance for Mobile Phones. MASS 2015: 172-180 - [c67]Wenbo Yang, Yuanyuan Zhang, Juanru Li, Junliang Shu, Bodong Li, Wenjun Hu, Dawu Gu:
AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware. RAID 2015: 359-381 - [c66]Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng:
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions. TCC (1) 2015: 7-35 - [i12]Jeroen Delvaux, Dawu Gu, Ingrid Verbauwhede, Matthias Hiller, Meng-Day (Mandel) Yu:
Secure Sketch Metamorphosis: Tight Unified Bounds. IACR Cryptol. ePrint Arch. 2015: 854 (2015) - 2014
- [c65]Juanru Li, Yuanyuan Zhang, Wenbo Yang, Junliang Shu, Dawu Gu:
DIAS: Automated Online Analysis for Android Applications. CIT 2014: 307-314 - [c64]Wenbo Yang, Juanru Li, Yuanyuan Zhang, Yong Li, Junliang Shu, Dawu Gu:
APKLancet: tumor payload diagnosis and purification for android applications. AsiaCCS 2014: 483-494 - [c63]Jeroen Delvaux, Dawu Gu, Dries Schellekens, Ingrid Verbauwhede:
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible? CHES 2014: 451-475 - [c62]Zhong Zeng, Dawu Gu, Junrong Liu, Zheng Guo:
An Improved Side-Channel Attack Based on Support Vector Machine. CIS 2014: 676-680 - [c61]Junliang Shu, Juanru Li, Yuanyuan Zhang, Dawu Gu:
Android App Protection via Interpretation Obfuscation. DASC 2014: 63-68 - [c60]Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Jerry Shi, Chujiao Ma, Dawu Gu:
Algebraic Fault Analysis on GOST for Key Recovery and Reverse Engineering. FDTC 2014: 29-39 - [c59]Hui Liu, Yuanyuan Zhang, Hui Wang, Wenbo Yang, Juanru Li, Dawu Gu:
TagDroid: Hybrid SSL Certificate Verification in Android. ICICS 2014: 120-131 - [c58]Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu:
Proofs of Retrievability Based on MRD Codes. ISPEC 2014: 330-345 - [c57]Yong Li, Yuanyuan Zhang, Juanru Li, Dawu Gu:
iCryptoTracer: Dynamic Analysis on Misuse of Cryptography Functions in iOS Applications. NSS 2014: 349-362 - [i11]Yu Yu, Dawu Gu, Xiangxue Li:
The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions. Electron. Colloquium Comput. Complex. TR14 (2014) - [i10]Yu Yu, Dawu Gu, Xiangxue Li:
The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions. IACR Cryptol. ePrint Arch. 2014: 392 (2014) - [i9]Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng:
(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions. IACR Cryptol. ePrint Arch. 2014: 393 (2014) - [i8]Jeroen Delvaux, Dawu Gu, Roel Peeters, Ingrid Verbauwhede:
Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible II. IACR Cryptol. ePrint Arch. 2014: 977 (2014) - 2013
- [j27]Bo Qu, Dawu Gu, Zheng Guo, Junrong Liu:
Differential power analysis of stream ciphers with LFSRs. Comput. Math. Appl. 65(9): 1291-1299 (2013) - [j26]Chen Lyu, Dawu Gu, Yuanyuan Zhang, Tingting Lin, Xiaomei Zhang:
Towards Efficient and Secure Geographic Routing Protocol for Hostile Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j25]Wei Li, Zhi Tao, Dawu Gu, Yi Wang, Zhiqiang Liu, Ya Liu:
Differential Fault Analysis on the MD5 Compression Function. J. Comput. 8(11): 2888-2894 (2013) - [j24]Ya Liu, Dawu Gu, Bailan Li, Bo Qu:
Legitimate-reader-only attack on MIFARE Classic. Math. Comput. Model. 58(1-2): 219-226 (2013) - [c56]Shutong Wang, Dawu Gu, Junrong Liu, Zheng Guo, Weijia Wang, Sigang Bao:
A Power Analysis on SMS4 Using the Chosen Plaintext Method. CIS 2013: 748-752 - [c55]Ruoxu Zhao, Dawu Gu, Juanru Li, Yuanyuan Zhang:
Automatic Detection and Analysis of Encrypted Messages in Malware. Inscrypt 2013: 101-117 - [c54]Yulong Tian, Dawu Gu, Haihua Gu:
Efficient Implementation of Tate Pairing with Montgomery Ladder Method. INCoS 2013: 398-402 - [c53]Shifeng Sun, Dawu Gu, Shengli Liu:
Efficient Leakage-Resilient Identity-Based Encryption with CCA Security. Pairing 2013: 149-167 - [c52]Chen Lyu, Dawu Gu, Xiaomei Zhang, Shifeng Sun, Yinqi Tang:
Efficient, fast and scalable authentication for VANETs. WCNC 2013: 1768-1773 - [i7]Shuai Han, Shengli Liu, Kefei Chen, Dawu Gu:
Proofs of Data Possession and Retrievability Based on MRD Codes. IACR Cryptol. ePrint Arch. 2013: 789 (2013) - 2012
- [j23]Wei Li, Dawu Gu, Xiaoling Xia, Chen Zhao, Zhiqiang Liu, Ya Liu, Qingju Wang:
Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network. Int. J. Comput. Intell. Syst. 5(5): 896-904 (2012) - [j22]Jianjie Zhao, Dawu Gu:
Provably secure three-party password-based authenticated key exchange protocol. Inf. Sci. 184(1): 310-323 (2012) - [j21]Wei Li, Dawu Gu, Xiaoling Xia, Ya Liu, Zhiqiang Liu:
Fault Detection on the Software Implementation of CLEFIA Lightweight Cipher. J. Networks 7(8): 1288-1294 (2012) - [j20]Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li:
Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256. J. Syst. Softw. 85(11): 2451-2458 (2012) - [j19]Jianjie Zhao, Dawu Gu, Yali Li, Wei Cheng:
On weaknesses of the HDCP authentication and key exchange protocol and its repair. Math. Comput. Model. 55(1-2): 19-25 (2012) - [j18]Jianjie Zhao, Dawu Gu, Lei Zhang:
Security analysis and enhancement for three-party password-based authenticated key exchange protocol. Secur. Commun. Networks 5(3): 273-278 (2012) - [c51]Bin Long, Dawu Gu, Ning Ding, Haining Lu:
On Improving the Performance of Public Key Encryption with Keyword Search. CDC 2012: 143-147 - [c50]Zhiqiang Liu, Dawu Gu, Ya Liu, Wei Li:
Linear Fault Analysis of Block Ciphers. ACNS 2012: 241-256 - [c49]Kan Yuan, Dawu Gu, Zheng Guo, Sigang Bao:
A Highly Efficient Correlation Power Analysis on PRINT Cipher. CIS 2012: 442-446 - [c48]Sheng Li, Dawu Gu, Zhouqian Ma, Zhiqiang Liu:
Fault Analysis of the Piccolo Block Cipher. CIS 2012: 482-486 - [c47]Zhouqian Ma, Dawu Gu:
Improved Differential Fault Analysis of SOSEMANUK. CIS 2012: 487-491 - [c46]Haining Lu, Dawu Gu, Chongying Jin, Yinqi Tang:
Reducing extra storage in searchable symmetric encryption scheme. CloudCom 2012: 255-262 - [c45]Dawu Gu, Juanru Li, Sheng Li, Zhouqian Ma, Zheng Guo, Junrong Liu:
Differential Fault Analysis on Lightweight Blockciphers with Statistical Cryptanalysis Techniques. FDTC 2012: 27-33 - [c44]Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen, Wei Li:
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia. FSE 2012: 90-109 - [c43]Yinqi Tang, Dawu Gu, Ning Ding, Haining Lu:
Phrase Search over Encrypted Data with Symmetric Encryption Scheme. ICDCS Workshops 2012: 471-480 - [c42]Juanru Li, Dawu Gu, Yuhao Luo:
Android Malware Forensics: Reconstruction of Malicious Events. ICDCS Workshops 2012: 552-558 - [c41]Ning Ding, Dawu Gu:
On Constant-Round Precise Zero-Knowledge. ICICS 2012: 178-190 - [c40]Ruoxu Zhao, Dawu Gu, Juanru Li, Hui Liu:
Detecting Encryption Functions via Process Emulation and IL-Based Program Analysis. ICICS 2012: 252-263 - [c39]Qingju Wang, Dawu Gu, Vincent Rijmen, Ya Liu, Jiazhe Chen, Andrey Bogdanov:
Improved Impossible Differential Attacks on Large-Block Rijndael. ICISC 2012: 126-140 - [c38]Xiaohui Li, Dawu Gu, Yanli Ren, Ning Ding, Kan Yuan:
Efficient Ciphertext-Policy Attribute Based Encryption with Hidden Policy. IDCS 2012: 146-159 - [c37]Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li:
Impossible Differential Attacks on Reduced-Round LBlock. ISPEC 2012: 97-108 - [i6]Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li:
Improved Impossible Differential Attack on Reduced Version of Camellia-192/256. IACR Cryptol. ePrint Arch. 2012: 594 (2012) - 2011
- [j17]Wei Li, Xiaoling Xia, Dawu Gu, Zhiqiang Liu, Juanru Li, Ya Liu:
A New Differential Fault Attack on SPN Structure, with Application to AES Cipher. J. Comput. 6(2): 216-223 (2011) - [c36]Ning Ding, Dawu Gu:
A Note on (Im)Possibilities of Obfuscating Programs of Zero-Knowledge Proofs of Knowledge. CANS 2011: 292-311 - [c35]Feifei Liu, Dawu Gu, Haining Lu:
An improved dynamic provable data possession model. CCIS 2011: 290-295 - [c34]Jianjie Zhao, Dawu Gu, M. Choudary Gorantla:
Stronger security model of group key agreement. AsiaCCS 2011: 435-440 - [c33]Nicky Mouha, Qingju Wang, Dawu Gu, Bart Preneel:
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming. Inscrypt 2011: 57-76 - [c32]Zhiqiang Liu, Dawu Gu, Ya Liu, Juanru Li, Wei Li:
Linear Cryptanalysis of ARIA Block Cipher. ICICS 2011: 242-254 - [c31]Wei Li, Dawu Gu, Zhiqiang Liu, Ya Liu, Xiaohu Huang:
Fault Detection of the MacGuffin Cipher against Differential Fault Attack. INTRUST 2011: 102-112 - [c30]Ning Ding, Dawu Gu:
A General and Efficient Obfuscation for Programs with Tamper-Proof Hardware. ISPEC 2011: 401-416 - [c29]Ruoxu Zhao, Dawu Gu, Juanru Li, Ran Yu:
Detection and Analysis of Cryptographic Data Inside Software. ISC 2011: 182-196 - [c28]Ning Ding, Dawu Gu:
Precise Time and Space Simulatable Zero-Knowledge. ProvSec 2011: 16-33 - [c27]Ning Ding, Dawu Gu:
A Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-Encryption. TAMC 2011: 377-389 - [e1]Xuejia Lai, Dawu Gu, Bo Jin, Yongquan Wang, Hui Li:
Forensics in Telecommunications, Information, and Multimedia - Third International ICST Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 56, Springer 2011, ISBN 978-3-642-23601-3 [contents] - [i5]Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li, Ying Man:
Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256. IACR Cryptol. ePrint Arch. 2011: 671 (2011) - 2010
- [j16]Ning Ding, Dawu Gu:
Precise bounded-concurrent zero-knowledge proofs for NP. Sci. China Inf. Sci. 53(9): 1738-1752 (2010) - [j15]Jianjie Zhao, Dawu Gu, Yali Li:
An efficient fault-tolerant group key agreement protocol. Comput. Commun. 33(7): 890-895 (2010) - [j14]Yanli Ren, Dawu Gu, Shuozhong Wang, Xinpeng Zhang:
Hierarchical Identity-Based Proxy Re-Encryption without Random Oracles. Int. J. Found. Comput. Sci. 21(6): 1049-1063 (2010) - [j13]Yanli Ren, Dawu Gu, Shuozhong Wang, Xinpeng Zhang:
New Fuzzy Identity-Based Encryption in the Standard Model. Informatica 21(3): 393-407 (2010) - [j12]Yanli Ren, Dawu Gu:
CCA2 secure (hierarchical) identity-based parallel key-insulated encryption without random oracles. J. Syst. Softw. 83(1): 153-162 (2010) - [j11]Wei Li, Dawu Gu, Juanru Li, Zhiqiang Liu, Ya Liu:
Differential fault analysis on Camellia. J. Syst. Softw. 83(5): 844-851 (2010) - [j10]Jianjie Zhao, Dawu Gu:
Provably secure authenticated key exchange protocol under the CDH assumption. J. Syst. Softw. 83(11): 2297-2304 (2010) - [c26]Junrong Liu, Dawu Gu, Zheng Guo:
Correlation Power Analysis Against Stream Cipher MICKEY v2. CIS 2010: 320-324 - [c25]Ning Ding, Dawu Gu:
On Obfuscating Programs with Tamper-proof Hardware. Inscrypt 2010: 487-502 - [c24]Yong Wang, Dawu Gu, Jianping Xu, Mi Wen, Liwen Deng:
RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow. e-Forensics 2010: 99-109 - [c23]Juanru Li, Dawu Gu, Chaoguo Deng, Yuhao Luo:
Digital Forensic Analysis on Runtime Instruction Flow. e-Forensics 2010: 168-178 - [c22]Ning Ding, Dawu Gu, Zhiqiang Liu:
Disguisable Symmetric Encryption Schemes for an Anti-forensics Purpose. e-Forensics 2010: 241-255 - [c21]Haihua Gu, Dawu Gu, WenLu Xie:
Efficient Pairing Computation on Elliptic Curves in Hessian Form. ICISC 2010: 169-176 - [c20]Yong Wang, Dawu Gu, Mi Wen, Haming Li, Jianping Xu:
Classification of Malicious Software Behaviour Detection with Hybrid Set Based Feed Forward Neural Network. ISNN (2) 2010: 556-565 - [c19]Yong Wang, Dawu Gu, Mi Wen, Jianping Xu, Haming Li:
Denial of Service Detection with Hybrid Fuzzy Set Based Feed Forward Neural Network. ISNN (2) 2010: 576-585 - [i4]Jianjie Zhao, Dawu Gu, M. Choudary Gorantla:
Stronger Security Model of Group Key Agreement. IACR Cryptol. ePrint Arch. 2010: 494 (2010)
2000 – 2009
- 2009
- [j9]Haihua Gu, Dawu Gu:
Speeding Up the Double-Base Recoding Algorithm of Scalar Multiplication. Cryptologia 33(4): 315-320 (2009) - [j8]Yuanyuan Zhang, Dawu Gu, Fangyong Hou, Mengqi Zeng, Tao Cheng:
Architecture Support for Memory Confidentiality and Integrity in Embedded Systems. Int. J. Distributed Sens. Networks 5(1): 96 (2009) - [j7]Yanli Ren, Dawu Gu:
Fully CCA2 secure identity based broadcast encryption without random oracles. Inf. Process. Lett. 109(11): 527-533 (2009) - [j6]Wei Li, Dawu Gu, Yi Wang:
Differential fault analysis on the contracting UFN structure, with application to SMS4 and MacGuffin. J. Syst. Softw. 82(2): 346-354 (2009) - [c18]Zhiqiang Liu, Dawu Gu, Jing Zhang, Wei Li:
Differential-Multiple Linear Cryptanalysis. Inscrypt 2009: 35-49 - [c17]Yong Wang, Dawu Gu, Wei Li, Hongjiao Li, Jing Li:
Network Intrusion Detection with Workflow Feature Definition Using BP Neural Network. ISNN (1) 2009: 60-67 - [c16]Fangyong Hou, Dawu Gu, Nong Xiao, Fang Liu, Hongjun He:
Performance and Consistency Improvements of Hash Tree Based Disk Storage Protection. NAS 2009: 51-56 - [c15]Mengqi Zeng, Dawu Gu, Fangyong Hou, Yuanyuan Zhang, Tao Cheng:
Design and Implementation of Self-securing Disk. NAS 2009: 405-412 - [c14]Wei Li, Dawu Gu, Yong Wang, Juanru Li, Zhiqiang Liu:
An Extension of Differential Fault Analysis on AES. NSS 2009: 443-446 - [i3]Zhiqiang Liu, Dawu Gu, Jing Zhang:
Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher. IACR Cryptol. ePrint Arch. 2009: 256 (2009) - [i2]Ning Ding, Dawu Gu:
Precise Time and Space Simulatable Zero-Knowledge. IACR Cryptol. ePrint Arch. 2009: 429 (2009) - [i1]Ning Ding, Dawu Gu, Bart Preneel:
Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds. IACR Cryptol. ePrint Arch. 2009: 448 (2009) - 2008
- [j5]Yuanyuan Zhang, Dawu Gu, Juanru Li:
Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks. Comput. Commun. 31(13): 2959-2971 (2008) - [j4]Yanli Ren, Dawu Gu:
Efficient Hierarchical Identity Based Encryption Scheme in the Standard Model. Informatica (Slovenia) 32(2): 207-211 (2008) - [j3]Wei Li, Dawu Gu, Juanru Li:
Differential fault analysis on the ARIA algorithm. Inf. Sci. 178(19): 3727-3737 (2008) - [c13]Fangyong Hou, Dawu Gu, Nong Xiao, Yuhua Tang:
Data privacy and integrity appropriate for disk protection. CIT 2008: 414-419 - [c12]Yuanyuan Zhang, Dawu Gu, Bart Preneel:
Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks. EUC (1) 2008: 272-279 - [c11]Mengqi Zeng, Fangyong Hou, Dawu Gu, Yuanyuan Zhang, NingNan Song:
Efficient Authenticated Encryption for Hybrid Hard Drives Based on GCM. HPCC 2008: 964-970 - [c10]Bing Duan, Yinqian Zhang, Dawu Gu:
An Easy-to-Deploy Penetration Testing Platform. ICYCS 2008: 2314-2318 - [c9]Yanli Ren, Dawu Gu:
Secure Hierarchical Identity Based Encryption Scheme in the Standard Model. INDOCRYPT 2008: 104-115 - [c8]Fangyong Hou, Dawu Gu, Nong Xiao, Zhiping Cai:
Efficient disk encryption and verification through trusted nonce. ISCC 2008: 304-309 - [c7]Fangyong Hou, Dawu Gu, Nong Xiao, Yuhua Tang:
Secure Remote Storage through Authenticated Encryption. NAS 2008: 3-9 - 2007
- [c6]Ning Ding, Dawu Gu:
A Discrete-Logarithm Based Non-interactive Non-malleable Commitment Scheme with an Online Knowledge Extractor. Inscrypt 2007: 153-166 - [c5]Wei Li, Dawu Gu:
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security. ProvSec 2007: 178-187 - 2006
- [j2]Jun Zhang, Yu Zhou, Fanyuan Ma, Dawu Gu, Yingcai Bai:
An extension of secure group communication using key graph. Inf. Sci. 176(20): 3060-3078 (2006) - 2005
- [c4]Jun Zhang, Fanyuan Ma, Dawu Gu, Yingcai Bai:
An Efficient Group Key Management Scheme: Link Tree Protocol. PDCAT 2005: 381-385 - 2004
- [c3]Ming Li, Dawu Gu, Yong Wang, Yingcai Bai:
Research on authenticated key agreement in group settings. InfoSecu 2004: 1-4 - [c2]Hailong Wen, Dawu Gu:
Authenticated group key agreement with admission control. InfoSecu 2004: 13-17 - 2002
- [c1]Weidong Qiu, Kefei Chen, Dawu Gu:
A New Offline Privacy Protecting E-cash System with Revokable Anonymity. ISC 2002: 177-190 - 2001
- [j1]Dawu Gu, Wang Yi:
On the Techniques of Enhancing the Security of Block Ciphers. ACM SIGOPS Oper. Syst. Rev. 35(4): 94-96 (2001)
Coauthor Index
aka: Hai-Ning Lu
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint