Hybrid model for estimating the shielding effectiveness of metallic enclosures with arbitrary apertures
Hu, Pu-Yu, Sun, Xiao-Ying, Chen, Jian
Published in IET science, measurement & technology (01.06.2020)
Published in IET science, measurement & technology (01.06.2020)
Get full text
Journal Article
Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions
Zhang, Feng-rong, Carlet, Claude, Hu, Yu-pu, Cao, Tian-jie
Published in Information sciences (01.11.2014)
Published in Information sciences (01.11.2014)
Get full text
Journal Article
Efficient identity-based signature over NTRU lattice
Xie, Jia, Hu, Yu-pu, Gao, Jun-tao, Gao, Wen
Published in Frontiers of information technology & electronic engineering (01.02.2016)
Published in Frontiers of information technology & electronic engineering (01.02.2016)
Get full text
Journal Article
Novel efficient identity-based signature on lattices
Chen, Jiang-shan, Hu, Yu-pu, Liang, Hong-mei, Gao, Wen
Published in Frontiers of information technology & electronic engineering (01.02.2021)
Published in Frontiers of information technology & electronic engineering (01.02.2021)
Get full text
Journal Article
Quantum security analysis of a lattice-based oblivious transfer protocol
Liu, Mo-meng, Krämer, Juliane, Hu, Yu-pu, Buchmann, Johannes
Published in Frontiers of information technology & electronic engineering (01.09.2017)
Published in Frontiers of information technology & electronic engineering (01.09.2017)
Get full text
Journal Article
IKE vulnerability discovery based on fuzzing
Yang, Huan, Zhang, Yuqing, Hu, Yu-pu, Liu, Qi-xu
Published in Security and communication networks (01.07.2013)
Published in Security and communication networks (01.07.2013)
Get full text
Journal Article
Verifiable symmetric polynomial-based key distribution schemes
Liu, Yan-xiao, Zhang, Yu-qing, Harn, Lein, Hu, Yu-pu
Published in Security and communication networks (01.08.2013)
Published in Security and communication networks (01.08.2013)
Get full text
Journal Article
CCA2 secure biometric identity based encryption with constant-size ciphertext
Yang, Yang, Hu, Yu-pu, Zhang, Le-you, Sun, Chun-hui
Published in Frontiers of information technology & electronic engineering (01.10.2011)
Published in Frontiers of information technology & electronic engineering (01.10.2011)
Get full text
Journal Article
Efficient Quantum Dialogue by Using the Two-Qutrit Entangled States Without Information Leakage
Wang, He, Zhang, Yu-Qing, Hu, Yu-Pu
Published in International journal of theoretical physics (01.06.2013)
Published in International journal of theoretical physics (01.06.2013)
Get full text
Journal Article
可复用 garbling 的注解
Yu-Pu, HU, Si-Yue, DONG, Bao-Cang, WANG, LIU, Jun, 胡予濮, 董思越, 王保仓, 刘君
Published in Journal of Cryptologic Research (01.01.2023)
Published in Journal of Cryptologic Research (01.01.2023)
Get full text
Journal Article
Identity-based strong designate verifier signature over lattices
WANG, Feng-he, HU, Yu-pu, WANG, Chun-xiao
Published in Journal of China universities of posts and telecommunications (01.12.2014)
Published in Journal of China universities of posts and telecommunications (01.12.2014)
Get full text
Journal Article
GVW15 谓词加密 (PE) 方案的 P/poly 有效性的一个注解
Yu-Pu, HU, Si-Yue, DONG, Bao-Cang, WANG, LIU, Jun, 胡予濮, 董思越, 王保仓, 刘君
Published in Journal of Cryptologic Research (01.12.2022)
Published in Journal of Cryptologic Research (01.12.2022)
Get full text
Journal Article
Agr17 函数加密 (FE) 方案的 P/poly 无效性
Yu-Pu, HU, LIU, Jun, Bao-Cang, WANG, Xing-Ting, DONG, Yan-Bin, PAN, 胡予濮, 刘君, 王保仓, 董星廷, 潘彦斌
Published in Journal of Cryptologic Research (01.12.2022)
Published in Journal of Cryptologic Research (01.12.2022)
Get full text
Journal Article