Weijia Wang, Yu Yu, Francois-Xavier Standaert, Dawu Gu, Sen Xu, Chi Zhang. "Ridge-based Profiled Differential Power Analysis", CT-RSA 2017, to appear.
Yu Yu, Jiang Zhang. "Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN",
Advances in Cryptology - CRYPTO 2016, 214-243.
Yu Yu, John Steinberger. "Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN",
Advances in Cryptology - EUROCRYPT 2016, pp. 154-183.
Junrong Liu, Yu Yu, Francois-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Xinjun Xie. "Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards",
in 20th European Symposium on Research in Computer Security - ESORICS 2015, pp. 468-480. This work was also presented at BlackHat US 2015, Presentation Slides
Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, Francois-Xavier Standaert, Dawu Gu, Sen Xu. "Evaluation and Improvement of Generic-Emulating DPA Attacks",
in Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems 2015 (CHES 2015), pp. 416-432.
Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. "(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond",
Advances in Cryptology - CRYPTO 2015.
Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. "The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions",
in Proceedings of the 12th Theory of Cryptography Conference (TCC 2015), pp. 7-35.
Yu Yu. "Pseudorandom Generators from Regular
One-way Functions: New Constructions with Improved Parameters",
Advances in Cryptology - ASIACRYPT 2013, pp. 261-279, eprint report
2013/270.
FranÃ§ois-Xavier Standaert, Olivier Pereira,
Yu Yu. "Leakage-Resilient Symmetric Cryptography Under Empirically
Verifiable Assumptions ", Advances in Cryptology - CRYPTO 2013, pp. 335-352.
Yuanyuan Zhou, Yu Yu, FranÃ§ois-Xavier
Standaert, Jean-Jacques Quisquater. "On the Need of Physical Security for
Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM
Cards", to appear in the 17th Financial Cryptography (FC 2013).
Yevgeniy Dodis, Yu Yu. "Overcoming Weak
Expectations", in the 10th Theory of Cryptography Conference (TCC 2013),
pp. 1-22.
Yu Yu, FranÃ§ois-Xavier Standaert.
"Practical Leakage-Resilient Pseudorandom Objects with Minimum Public
Randomness", in Proceedings of the Cryptographer's Track at RSA Conference
(CT-RSA 2013), pp.223-239.
Yevgeniy Dodis, Yu Yu. "Overcoming Weak
Expectations", Invited paper to Information Theory Workshop 2012.
Yu Yu, Xiangxue Li, Haifeng Qian.
"Two-Source Extractors for Leaky Sources", Information Theory Workshop
2012.
Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk,
Olivier Pereira, Krzysztof Pietrzak, FranÃ§ois-Xavier Standaert, Yu Yu.
"Leftover Hash Lemma, Revisited", Advances in Cryptology - CRYPTO 2011, pp. 1-20. Invited
(and accepted) to Journal of Cryptology.
Yu Yu, FranÃ§ois-Xavier Standaert,Olivier
Pereira, Moti Yung, "Practical Leakage-Resilient Pseudo-random Generators",
In Proceedings of 17th ACM Conference on Computer and Communications
Security (CCS 2010), pp. 161-171.
Technical Reports & Book Chapters & Preprints:
FranÃ§ois-Xavier Standaert, Olivier Pereira,
Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald.
"Leakage-Resilient Cryptography in Practice", Part II, pp. 105-139,
Springer Series of "Information Security and Cryptography", Springer,
2010.