Search dblp for Publications

export results for "Yusai Wu"

 download as .bib file

@inproceedings{DBLP:conf/tcc/YuWYCD23,
  author       = {Liqing Yu and
                  Yusai Wu and
                  Yu Yu and
                  Zhenfu Cao and
                  Xiaolei Dong},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Security Proofs for Key-Alternating Ciphers with Non-Independent Round
                  Permutations},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14369},
  pages        = {238--267},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48615-9\_9},
  doi          = {10.1007/978-3-031-48615-9\_9},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/YuWYCD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuWYCD23,
  author       = {Liqing Yu and
                  Yusai Wu and
                  Yu Yu and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Security Proofs for Key-Alternating Ciphers with Non-Independent Round
                  Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1355},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1355},
  timestamp    = {Thu, 08 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YuWYCD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WuYCD20,
  author       = {Yusai Wu and
                  Liqing Yu and
                  Zhenfu Cao and
                  Xiaolei Dong},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Tight Security Analysis of 3-Round Key-Alternating Cipher with a Single
                  Permutation},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12491},
  pages        = {662--693},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64837-4\_22},
  doi          = {10.1007/978-3-030-64837-4\_22},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/WuYCD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuYCD20,
  author       = {Yusai Wu and
                  Liqing Yu and
                  Zhenfu Cao and
                  Xiaolei Dong},
  title        = {Tight Security Analysis of 3-Round Key-Alternating Cipher with {A}
                  Single Permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1073},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1073},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuYCD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}