删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

上海交通大学计算机科学与工程系导师教师师资介绍简介-郁昱教授

本站小编 Free考研考试/2021-01-02

郁昱 教授
主页:[点击这里]
办公室电话:
办公地点:SEIEE-3-537
电子邮件:yuyu@cs.sjtu.edu.cn
实验室: 格密码系统安全实验室


研究兴趣
教育背景
工作经验
教授课程
论文发表
项目资助
获奖信息
学术服务


pseudorandomness, leakage-resilient cryptography, etc.
1999-2003Fudan University Department of Computer ScienceBachelor of Science
2003-2006Nanyang Technological University School of Computer Engineering Doctor of Philosophy
2006-2008 T-Systems SingaporeICT Security LaboratoryCryptographic Analyst
2008-2011 Université catholique de LouvainUCL Crypto Group Post-doctoral Researcher
2012-2013 Tsinghua UniversityIIIS (fomerly ITCS) Tenure-Track Assistant Professor


2014-present
TCC 2015,CRYPTO 2015, EUROCRYPT 2016, CRYPTO 2016
ESORICS 2015, CHES 2015
check out my personal webpage at http://yuyu.hk
2010-2013
Yu Yu, Xiangxue Li, Jian Weng. "Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters", to appear in the 19th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2013), also available at eprint report 2013/270.

Fran?ois-Xavier Standaert, Olivier Pereira, Yu Yu, “Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions”, in the Proceedings of the 33rd International Cryptology Conference (CRYPTO 2013), pp. 335-352.
Yuanyuan Zhou, Yu Yu, Fran?ois-Xavier Standaert, Jean-Jacques Quisquater. "On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards", in the proceedings of the 17th Financial Cryptography and Data Security (FC 2013), pp. 230-238.
Yevgeniy Dodis, Yu Yu, “Overcoming Weak Expectactions”, In the proceedings of the 10th Theory of Cryptography Conference (TCC 2013), pp. 1-22.invited submission to Journal of Cryptology.
Yu Yu,Fran?ois-Xavier Standaert,“Practical Leakage-Resilient Pseudo-Random Objects with Minimum Public Randomness”, In Proceedings of the Cryptographer’s Tracker at RSA Conference 2013 (CT-RSA 2013), pp.223-239.
Yevgeniy Dodis, Yu Yu, “Overcoming Weak Expectactions”, To appear in Information Theory Workshop (ITW 2012), invited paper.
Yu Yu, “Two-Source Extractors for Leaky Sources”, in Proceedings of Information Theory Workshop (ITW 2012).
Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, Fran?ois-Xavier Standaert, Yu Yu, “Leftover Hash Lemma, Revisited”, In Proceedings of the 31st International Cryptology Conference (CRYPTO 2011), pp. 1-20, accepted to Journal of Cryptology (pending minor revisions),
Yu Yu, Fran?ois-Xavier Standaert, Olivier Pereira,“Practical Leakage-Resilient Pseudo-Random Generator”, In Proceedings of 17-th ACM Conference on Computer and Communications Security (CCS 2010), pp. 141-151, ACM Press, 2010.


I‘m serving as an observer and webmaster at the IACR (International Association for Cryptologic Research,国际密码学会).





相关话题/计算机科学 上海交通大学