The Department of Computer Science and Engineering
Shanghai Jiao Tong University
Shanghai, China
Email: yuyu(at)yuyu.hk, yyuu(at)sjtu.edu.cn, yu(at)tsinghua.edu.cn
Research Interests
Cryptography in general
Side-channel attacks and countermeasures (leakage-resilient cryptography)
Post-Quantum Cryptography
Multi-Party Computation
Academic/Industrial Experience
2020 - Present: PI at Shanghai Qizhi Institute (founded by Andrew Yao)
2014 - Present: Shanghai Jiaotong University
2012-2013: Tsinghua University
2010-2011: Associate Professor, East China Normal University
Webmaster of the International Association for Cryptologic Research: www.iacr.org
Selected Research Papers (2010-Present)
Miscellaneous & Preprints:
Carsten Baum, Hongrui Cui, Ivan Damgard, Kevin Esvelt, Mingyu Gao, Dana Gretton, Omer Paneth, Ron Rivest, Vinod Vaikuntanathan, Daniel Wichs, Andrew Yao, Yu Yu. "Cryptographic Aspects of DNA Screening", DNA Screening Technical Note
Raphael Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven Galbraith, Jian Guo, Lucas Hui, Kwangjo Kim, Xuejia Lai, Dong Hong Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk,Huaxiong Wang, Hank Wolfe, Duncan Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou. "Advances in Security Research in the Asiacrypt Region", Communications of the ACM, Vol. 63, No. 4
Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang. "Improved Lattice-based CCA2-Secure PKE in the Standard Model", Cryptology ePrint Archive 2019/149
Theory/Cryptography:
Hongrui Cui, Xiao Wang, Kang Yang, Yu Yu. "Actively Secure Half-Gates with Minimum Overhead under Duplex Networks", Journal of Cryptology 2025 (to appear)
Bohan Wang, Juelin Zhang, Yu Yu, Weijia Wang. "Tighter Security Notions for a Modular Approach to Private Circuits", Advances in Cryptology - EUROCRYPT 2025
Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu. "BitGC: Garbled Circuits with 1 Bit per Gate", Advances in Cryptology - EUROCRYPT 2025, ePrint/2024/1988
Carsten Baum, Jens Berlips, Walther Chen, Ivan Damgard, Kevin M. Esvelt, Leonard Foner, Dana Gretton, Martin Kysel, Ronald L. Rivest, Lawrence Roy, Francesca Sage-Ling, Adi Shamir, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Daniel Wichs, Stephen Wooster, Andrew Yao, Yu Yu. "Efficient Maliciously Secure Oblivious Exponentiations", Communications in Cryptology (to appear) 2024, ePrint/2024/1613
Dung Bui, Haotian Chu, Geoffroy Couteau, Xiao Wang, Chenkai Weng, Kang Yang, Yu Yu. "An Efficient ZK Compiler from SIMD Circuits to General Circuits", Journal of Cryptology (to appear) 2024
Wenhao Zhang, Xiaojie Guo, Kang Yang, Ruiyu Zhu, Yu Yu, Xiao Wang. "Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage", IEEE Symposium on Security & Privacy 2024
Hanlin Liu, Xiao Wang, Kang Yang, Yu Yu. "The Hardness of LPN over Any Integer Ring and Field for PCG Applications", Advances in Cryptology - EUROCRYPT 2024, ePrint/2022/712
Xiang Xie, Kang Yang, Xiao Wang, Yu Yu. "Lightweight Authentication of Web Data via Garble-Then-Prove", USENIX Security 2024, ePrint/2023/964.
Fengrun Liu, Xiang Xie, Yu Yu. "Scalable Multi-Party Computation Protocols for Machine Learning in the Honest-Majority Setting", USENIX Security 2024.
Kaiyi Zhang, Qingju Wang, Yu Yu, Chun Guo, Hongrui Cui. "Algebraic Attacks on Round-Reduced RAIN and Full AIM-III", Advances in Cryptology - ASIACRYPT 2023, ePrint/2023/1397
Liqing Yu, Yusai Wu, Yu Yu, Zhenfu Cao, Xiaolei Dong. "Security Proofs for Key-Alternating Ciphers with Non-Independent Round Permutations", in the 20th Theory of Cryptography Conference (TCC 2023), ePrint/2023/1355
Kaiyi Zhang, Hongrui Cui, Yu Yu. "Revisiting the Constant-sum Winternitz One-time Signature with Applications to SPHINCS+ and XMSS", Advances in Cryptology - CRYPTO 2023, ePrint/2023/850
Hongrui Cui, Xiao Wang, Kang Yang, Yu Yu. "Actively Secure Half-Gates with Minimum Overhead under Duplex Networks", Advances in Cryptology - EUROCRYPT 2023, ePrint/2023/278
Lijing Zhou, Ziyu Wang, Hongrui Cui, Qingrui Song, Yu Yu. "Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning", IEEE Symposium on Security & Privacy 2023
Hanlin Liu, Yu Yu. "A Non-heuristic Approach to Time-space Tradeoffs and Optimizations for BKW",Advances in Cryptology - ASIACRYPT 2022, ePrint/2021/1343
Yuanyuan Zhou, Joop van de Pol, Yu Yu, Francois-Xavier Standaert, "A Third is All You Need: EPKE attack on CRT with Exponent Blinding", Advances in Cryptology - ASIACRYPT 2022, to appear, ePrint/2022/1163
Li Yao, Yilei Chen, Yu Yu. "Cryptanalysis of Candidate Obfuscators for Affine Determinant Programs", Advances in Cryptology - EUROCRYPT 2022, ePrint/2021/1684
Yu Yu, Jiang Zhang. "Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN", Advances in Cryptology - CRYPTO 2021, ePrint/2020/870
Hanlin Liu, Yu Yu, Shuoyao Zhao, Jiang Zhang, Wenling Liu, Zhenkai Hu. "Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact",Advances in Cryptology - CRYPTO 2021, ePrint/2020/161
Davide Bellizia, Clement Hoffmann, Dina Kamel, Hanlin Liu, Pierrick Meaux, Francois-Xavier Standaert, Yu Yu. "Learning Parity with Physical Noise: Imperfections, Reductions and FPGA Prototype",
in the Workshop on Cryptographic Hardware and Embedded Systems 2021 (CHES 2021), TCHES 2021, issue 3.
Liujun Wang, Kai-Yi Zhang, Jia-Yong Wang, Jie Cheng, Yong-Hua Yang, Shi-Biao Tang, Di Yan, Yan-Lin Tang, Zhen Liu,
Yu Yu, Qiang Zhang, Jian-Wei Pan. "Experimental Authentication of Quantum Key Distribution with Post-quantum Cryptography", npj Quantum Information.
Hongrui Cui, Kaiyi Zhang, Yu Chen, Zhen Liu,
Yu Yu. "MPC-in-Multi-Heads: a Multi-Prover Zero-Knowledge Proof System (or: How to Jointly Prove Any NP Statements in ZK)",
in 26th European Symposium on Research in Computer Security - ESORICS 2021.
Weijia Wang, Chun Guo, Francois-Xavier Standaert,
Yu Yu, Gaetan Cassiers. "Packed Multiplication: How to Amortize the Cost of Side-channel Masking?",
Advances in Cryptology - ASIACRYPT 2020, Accepted.
Wenling Liu, Zhen Liu, Khoa Nguyen,
Guomin Yang, Yu Yu. "A Lattice-Based Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key",
in 25th European Symposium on Research in Computer Security - ESORICS 2020.
Rui Wen, Yu Yu, Xiang Xie, Yang Zhang, "LEAF: A Faster Secure Search Algorithm via Localization,Extraction, and Reconstruction",
In Proceedings of 27th ACM Conference on Computer and Communications
Security (CCS 2020).
Chun Guo, Jonathan Katz, Xiao Wang, Chenkai Weng, Yu Yu. "Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting)",Advances in Cryptology - CRYPTO 2020.ePrint/2019/1168
Jiang Zhang, Yu Yu, Shuqin Fan, Zhenfeng Zhang, Kang Yang. "Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes", the IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2020), ePrint/2019/510.
Chun Guo, Francois-Xavier Standaert, Weijia Wang, Yu Yu. "Efficient Side-Channel Secure Message Authentication with Better Bounds", the IACR Transactions on Symmetric Cryptology (ToSC/FSE 2020),ePrint/2019/1424.
Chun Guo, Jonathan Katz, Xiao Wang, Yu Yu. "Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers",IEEE Symposium on Security & Privacy (Oakland) 2020, ePrint/2019/074
Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li. "Collision Resistant Hashing from Sub-exponential Learning Parity with Noise", Advances in Cryptology - ASIACRYPT 2019, ePrint/2017/1260
Shuoyao Zhao, Yu Yu, Jiang Zhang, Hanlin Liu. "Valiant's Universal Circuits Revisited: an Overall Improvement and a Lower Bound", Advances in Cryptology - ASIACRYPT 2019, ePrint/2018/943
Jiang Zhang, Yu Yu. "Two-Round PAKE from Approximate SPH and Instantiations from Lattices", Advances in Cryptology - ASIACRYPT 2017, pp.37-67.
Yu Yu, Jiang Zhang. "Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN",
Advances in Cryptology - CRYPTO 2016, pp.214-243.
Yu Yu, John Steinberger. "Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN",
Advances in Cryptology - EUROCRYPT 2016, pp. 154-183.
Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. "(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond",
Advances in Cryptology - CRYPTO 2015.
Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. "The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions",
in Proceedings of the 12th Theory of Cryptography Conference (TCC 2015), pp. 7-35.
Yu Yu. "Pseudorandom Generators from Regular
One-way Functions: New Constructions with Improved Parameters",
Advances in Cryptology - ASIACRYPT 2013, pp. 261-279, eprint report
2013/270.
Francois-Xavier Standaert, Olivier Pereira,
Yu Yu. "Leakage-Resilient Symmetric Cryptography Under Empirically
Verifiable Assumptions ", Advances in Cryptology - CRYPTO 2013, pp. 335-352.
Yevgeniy Dodis, Yu Yu. "Overcoming Weak
Expectations", in the 10th Theory of Cryptography Conference (TCC 2013),
pp. 1-22.
Yu Yu, Francois-Xavier Standaert.
"Practical Leakage-Resilient Pseudorandom Objects with Minimum Public
Randomness", in Proceedings of the Cryptographer's Track at RSA Conference
(CT-RSA 2013), pp.223-239.
Yevgeniy Dodis, Yu Yu. "Overcoming Weak
Expectations", Invited paper to Information Theory Workshop 2012.
Yu Yu, Xiangxue Li, Haifeng Qian.
"Two-Source Extractors for Leaky Sources", Information Theory Workshop
2012.
Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk,
Olivier Pereira, Krzysztof Pietrzak, Francois-Xavier Standaert, Yu Yu.
"Leftover Hash Lemma, Revisited", Advances in Cryptology - CRYPTO 2011, pp. 1-20. Invited
to Journal of Cryptology.
Yu Yu, Francois-Xavier Standaert,Olivier
Pereira, Moti Yung, "Practical Leakage-Resilient Pseudo-random Generators",
In Proceedings of 17th ACM Conference on Computer and Communications
Security (CCS 2010), pp. 161-171.
Francois-Xavier Standaert, Olivier Pereira,
Yu Yu, Jean-Jacques Quisquater, Moti Yung, Elisabeth Oswald.
"Leakage-Resilient Cryptography in Practice", Part II, pp. 105-139,
Springer Series of "Information Security and Cryptography", Springer,
2010.
Weijia Wang, Fanjie Ji, Juelin Zhang, Yu Yu. "Efficient Private Circuits with Precomputation",
in the Workshop on Cryptographic Hardware and Embedded Systems 2023 (CHES 2023), TCHES 2023.
Weijia Wang, Chun Guo, Yu Yu, Fanjie Ji, Yang Su. "Side-Channel Masking with Common Shares",
in the Workshop on Cryptographic Hardware and Embedded Systems 2022 (CHES 2022), TCHES 2022.
Weijia Wang, Yu Yu, Francois-Xavier Standaert. "Provable Order Amplification for Code-based Masking: How to Avoid Non-linear Leakages due to Masked Operations", IEEE Transactions on Information Forensics and Security, 14(11):3069-3082(2019).
Changyu Li, Quanpu Cai, Juanru Li, Hui Liu, Yuanyuan Zhang, Dawu Gu, Yu Yu. "Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning", 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2018), also presented at Defcon China 2018
Weijia Wang, Yu Yu, Francois-Xavier Standaert, Junrong Liu, Zheng Guo, Dawu Gu. "Ridge-based DPA: Improvement of Differential Power Analysis For Nanoscale Chips", IEEE Transactions on Information Forensics and Security, 13(5): 1301-1316 (2018).
Sihang Pu, Yu Yu, Weijia Wang, Junrong Liu, Zheng Guo, Dawu Gu. "Trace Augmentation: What Can Be Done Even Before Preprocessing in a Profiled SCA?", 16th International Conference on Smart Card Research and Advanced Applications (CARDIS 2017), 2017
Weijia Wang, Yu Yu, Francois-Xavier Standaert, Dawu Gu, Sen Xu, Chi Zhang. "Ridge-based Profiled Differential Power Analysis", CT-RSA 2017, pp.347-362.
Weijia Wang, Francois-Xavier Standaert, Yu Yu, Sihang Pu, Junrong Liu, Zheng Guo, Dawu Gu. "Inner Product Masking for Bitslice Ciphers and Security Order Amplification for Linear Leakages", 15th International Conference on Smart Card Research and Advanced Applications (CARDIS 2016), pp.174-191, 2016
Junrong Liu, Yu Yu, Francois-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Xinjun Xie. "Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards",
in 20th European Symposium on Research in Computer Security - ESORICS 2015, pp. 468-480. This work was also presented at BlackHat US 2015, Slides
Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, Francois-Xavier Standaert, Dawu Gu, Sen Xu. "Evaluation and Improvement of Generic-Emulating DPA Attacks",
in Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems 2015 (CHES 2015), pp. 416-432.
Yuanyuan Zhou, Yu Yu, François-Xavier
Standaert, Jean-Jacques Quisquater. "On the Need of Physical Security for
Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM
Cards", to appear in the 17th Financial Cryptography (FC 2013).