Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
- Nicky Mouha, Q. Wang, D. Gu, B. Preneel
- Mathematics, Computer Science
- Inscrypt
- 30 November 2011
TLDR
AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware
- W. Yang, Yuanyuan Zhang, +4 authors D. Gu
- Computer Science
- RAID
- 2 November 2015
TLDR
Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis
- J. Delvaux, D. Gu, D. Schellekens, I. Verbauwhede
- Engineering, Computer Science
- IEEE Transactions on Computer-Aided Design of…
- 2015
TLDR
A Survey on Lightweight Entity Authentication with Strong PUFs
- J. Delvaux, R. Peeters, D. Gu, I. Verbauwhede
- Computer Science
- ACM Comput. Surv.
- 12 October 2015
TLDR
Phrase Search over Encrypted Data with Symmetric Encryption Scheme
- Yinqi Tang, D. Gu, Ning Ding, H. Lu
- Computer Science
- 32nd International Conference on Distributed…
- 18 June 2012
TLDR
Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications
- J. Delvaux, D. Gu, I. Verbauwhede, M. Hiller, M. Yu
- Computer Science
- CHES
- 17 August 2016
TLDR
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security
- T. Yuen, Shi-feng Sun, +4 authors D. Gu
- Computer Science
- IACR Cryptol. ePrint Arch.
- 10 February 2020
TLDR
Fully CCA2 secure identity based broadcast encryption without random oracles
TLDR
PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications
- Chen Lyu, D. Gu, Yunze Zeng, P. Mohapatra
- Computer Science
- IEEE Transactions on Dependable and Secure…
- 2016
TLDR
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers
- F. Zhang, Shize Guo, +4 authors D. Gu
- Computer Science
- IEEE Transactions on Information Forensics and…
- 1 May 2016
TLDR