Y Zhou, B Yang, Z Xia, M Zhang, Y Mu - Theoretical Computer Science, 2020 - Elsevier
Abstract Alwen et al.(EUROCRYPT 2010) proposed the formal definition of identity-based hash proof system (IB-HPS). As an independent interest, they showed that a leakage …
Y Zhou, B Yang, Y Mu - Designs, Codes and Cryptography, 2019 - Springer
In modern computer systems, leakage of private information may cause catastrophic consequences, especially those are related to the secret keys in cryptographic mechanisms …
Y Zhao, K Liang, B Yang, L Chen - Security and …, 2019 - Wiley Online Library
In leakage resilient cryptography, there is a seemingly inherent restraint on the ability of the adversary that it cannot get access to the leakage oracle after the challenge. Recently, a …
B Qin - Security and Communication Networks, 2019 - Wiley Online Library
Lossy trapdoor functions (LTFs), introduced by Peiker and Waters in STOC'08, are functions that may be working in another injective mode or a lossy mode. Given such a function key, it …
F Wu - Heat and Mass Transfer, 2010 - www1bpt.bridgeport.edu
Curriculum Vitae Page 1 CV Junling (Joyce) Hu 1/9 Curriculum Vitae Junling (Joyce) Hu, Ph.D., Associate Professor Department of Mechanical Engineering University of Bridgeport …