What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yao Lu
Google Scholar
12
publications in security and cryptology related venues
Year
Venue
Title
2019
journals/joc
Small CRT-Exponent RSA Revisited.
Atsushi Takayasu
Yao Lu
Liqiang Peng
2018
conf/acisp
A Deterministic Algorithm for Computing Divisors in an Interval.
Liqiang Peng
Yao Lu
Noboru Kunihiro
Rui Zhang
Lei Hu
2018
conf/icics
Certifying Variant of RSA with Generalized Moduli.
Yao Lu
Noboru Kunihiro
Rui Zhang
Liqiang Peng
Hui Ma
2017
conf/eurocrypt
Small CRT-Exponent RSA Revisited.
Atsushi Takayasu
Yao Lu
Liqiang Peng
2016
conf/icisc
Improved Results on Cryptanalysis of Prime Power RSA.
Liqiang Peng
Lei Hu
Yao Lu
2015
conf/iwsec
Implicit Factorization of RSA Moduli Revisited (Short Paper).
Liqiang Peng
Lei Hu
Yao Lu
Zhangjie Huang
Jun Xu
2015
conf/asiacrypt
Solving Linear Equations Modulo Unknown Divisors: Revisited.
Yao Lu
Rui Zhang
Liqiang Peng
Dongdai Lin
2015
conf/sacrypt
Towards Optimal Bounds for Implicit Factorization Problem.
Yao Lu
Liqiang Peng
Rui Zhang
Lei Hu
Dongdai Lin
2014
conf/acns
New Partial Key Exposure Attacks on CRT-RSA with Large Public Exponents.
Yao Lu
Rui Zhang
Dongdai Lin
2013
conf/acisp
Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits.
Yao Lu
Rui Zhang
Dongdai Lin
2012
conf/icics
A New Variant of Time Memory Trade-Off on the Improvement of Thing and Ying's Attack.
Zhenqi Li
Yao Lu
Wenhao Wang
Bin Zhang
Dongdai Lin
2012
conf/icics
Applying Time-Memory-Data Trade-Off to Plaintext Recovery Attack.
Zhenqi Li
Bin Zhang
Yao Lu
Jing Zou
Dongdai Lin
Coauthors
Atsushi Takayasu
(2)
Bin Zhang
(2)
Dongdai Lin
(6)
Hui Ma
(1)
Jing Zou
(1)
Jun Xu
(1)
Lei Hu
(4)
Liqiang Peng
(8)
Noboru Kunihiro
(2)
Rui Zhang
(6)
Wenhao Wang
(1)
Yao Lu
(12)
Zhangjie Huang
(1)
Zhenqi Li
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to