• Publications
  • Influence
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
TLDR
We use mixed-integer linear programming (MILP) to prove security bounds against differential and linear cryptanalysis. Expand
  • 205
  • 12
  • PDF
AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware
TLDR
This paper conducts a systematic study on existing Android malware which is packed. Expand
  • 52
  • 11
  • PDF
Helper Data Algorithms for PUF-Based Key Generation: Overview and Analysis
TLDR
We provide an in-depth and comprehensive literature overview on helper data algorithms (HDAs) and expose new threats regarding helper data leakage and manipulation. Expand
  • 141
  • 10
  • PDF
A Survey on Lightweight Entity Authentication with Strong PUFs
TLDR
This work extends our prior CHES 2014 manuscript “Secure Lightweight Entity Authentication with Strong PUFs: Mission Impossible?” as follows. Expand
  • 94
  • 9
  • PDF
Phrase Search over Encrypted Data with Symmetric Encryption Scheme
TLDR
We study the case of searching over encrypted data from a remote server. Expand
  • 38
  • 9
Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications
TLDR
We derive new considerably tighter bounds for PUF-induced distributions that suffer from, e.g., bias or spatial correlations. Expand
  • 56
  • 7
  • PDF
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security
TLDR
We propose the most efficient blockchain ring confidential transaction protocol (RingCT3.0) for protecting the privacy of the sender’s identity, the recipient's identity and the confidentiality of the transaction amount. Expand
  • 24
  • 6
  • PDF
Fully CCA2 secure identity based broadcast encryption without random oracles
  • Yanli Ren, D. Gu
  • Mathematics, Computer Science
  • Inf. Process. Lett.
  • 1 May 2009
TLDR
We propose the first identity based broadcast encryption (IBBE) scheme that is IND-ID-CCA2 secure without random oracles. Expand
  • 43
  • 5
PBA: Prediction-Based Authentication for Vehicle-to-Vehicle Communications
TLDR
We propose an efficient broadcast authentication scheme called Prediction-Based Authentication (PBA) to not only defend against computation-based DoS attacks, but also resist packet losses caused by high mobility of vehicles. Expand
  • 48
  • 5
  • PDF
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers
  • F. Zhang, Shize Guo, +4 authors D. Gu
  • Computer Science
  • IEEE Transactions on Information Forensics and…
  • 1 May 2016
TLDR
A new generic framework is proposed to analyze and evaluate algebraic fault attacks on lightweight block ciphers. Expand
  • 40
  • 5
  • PDF