|
- Name:郁昱
- Title:Research Professor
- Office:SEIEE-3-537
- Office Phone:34206661
- Email:yu@tsinghua.edu.cn
- Website:http://yuyu.hk
|
Research Field
Cryptography, in particular, pseudoerandomness, information-theoretic security, postquantum cryptography
Education
1999-2013 Fudan University, Bachelor of Science
2003-2006 Nanyang Technological University, PhD
Work experience
2006-2008 T-Systems, Research Scientist
2008-2010 UCL Crypto Group, Postdoctoral Researcher
2011-2011 East China Normal University, Associate Professor
2012-2014 Tsinghua University, Assistant Profesor (Tenure-Track)
2014-Present Shanghai Jiao Tong University, Research Professor
Research
Awards and Honors
2016 Young Cheung Kong Scholarship by the Ministry of Education
Teaching
Publications
Weijia Wang, Yu Yu, Francois-Xavier Standaert, Dawu Gu, Sen Xu, Chi Zhang. "Ridge-based Profiled Differential Power Analysis", CT-RSA 2017, to appear.
Yu Yu, Jiang Zhang. "Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN", Advances in Cryptology - CRYPTO 2016, 214-243.
Yu Yu, John Steinberger. "Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN", Advances in Cryptology - EUROCRYPT 2016, pp. 154-183.
Junrong Liu, Yu Yu, Francois-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Xinjun Xie. "Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards", in 20th European Symposium on Research in Computer Security - ESORICS 2015, pp. 468-480.
Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, Francois-Xavier Standaert, Dawu Gu, Sen Xu. "Evaluation and Improvement of Generic-Emulating DPA Attacks", in Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems 2015 (CHES 2015), pp. 416-432.
Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. "(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond", Advances in Cryptology - CRYPTO 2015.
Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. "The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions", in Proceedings of the 12th Theory of Cryptography Conference (TCC 2015), pp. 7-35.
Yu Yu. "Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters", Advances in Cryptology - ASIACRYPT 2013, pp. 261-279, eprint report 2013/270.
François-Xavier Standaert, Olivier Pereira, Yu Yu. "Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions ", Advances in Cryptology - CRYPTO 2013, pp. 335-352.
Yuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater. "On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards", to appear in the 17th Financial Cryptography (FC 2013).
Yevgeniy Dodis, Yu Yu. "Overcoming Weak Expectations", in the 10th Theory of Cryptography Conference (TCC 2013), pp. 1-22.
Yu Yu, François-Xavier Standaert. "Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness", in Proceedings of the Cryptographer's Track at RSA Conference (CT-RSA 2013), pp.223-239.
Yevgeniy Dodis, Yu Yu. "Overcoming Weak Expectations", Invited paper to Information Theory Workshop 2012.
Yu Yu, Xiangxue Li, Haifeng Qian. "Two-Source Extractors for Leaky Sources", Information Theory Workshop 2012.
Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu. "Leftover Hash Lemma, Revisited", Advances in Cryptology - CRYPTO 2011, pp. 1-20. Invited (and accepted) to Journal of Cryptology.
Yu Yu, François-Xavier Standaert,Olivier Pereira, Moti Yung, "Practical Leakage-Resilient Pseudo-random Generators", In Proceedings of 17th ACM Conference on Computer and Communications Security (CCS 2010), pp. 161-171.
Others