Search

Your search keyword '"Gu, Dawu"' showing total 662 results

Search Constraints

Start Over You searched for: Author "Gu, Dawu" Remove constraint Author: "Gu, Dawu"
662 results on '"Gu, Dawu"'

Search Results

1. Armored Core of PKI: Removing Signing Keys for CA via Efficient and Trusted Physical Certification

2. Teamwork Makes TEE Work: Open and Resilient Remote Attestation on Decentralized Trust

3. Abusing Processor Exception for General Binary Instrumentation on Bare-metal Embedded Devices

5. HODOR: Shrinking Attack Surface on Node.js via System Call Limitation

8. A Refined Hardness Estimation of LWE in Two-Step Mode

9. Efficient KZG-Based Univariate Sum-Check and Lookup Argument

10. FaBFT: Flexible Asynchronous BFT Protocol Using DAG

11. On the (In)Security of Manufacturer-Provided Remote Attestation Frameworks in Android

14. Polynomial IOPs for Memory Consistency Checks in Zero-Knowledge Virtual Machines

17. Fine-Grained Verifier NIZK and Its Applications

19. EKE Meets Tight Security in the Universally Composable Framework

21. Grape: Efficient Hybrid Consensus Protocol Using DAG

28. Towards a Multi-Chain Future of Proof-of-Space

29. A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison

30. BinMatch: A Semantics-based Hybrid Approach on Binary Code Clone Analysis

31. Privacy-Preserving Authenticated Key Exchange in the Standard Model

32. A Universally Composable Non-interactive Aggregate Cash System

33. Further Cryptanalysis of a Type of RSA Variants

34. DeChain: A Blockchain Framework Enhancing Decentralization via Sharding

35. UCC: Universal and Committee-based Cross-chain Framework

36. More Efficient Verifiable Functional Encryption

37. MixCT: Mixing Confidential Transactions from Homomorphic Commitment

38. Fuzzy Authenticated Key Exchange with Tight Security

42. Re-Check Your Certificates! Experiences and Lessons Learnt from Real-World HTTPS Certificate Deployments

43. Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-user Setting: Impossibility Result and Optimal Tightness

44. Fully Secure Lattice-Based ABE from Noisy Linear Functional Encryption

45. Authentication System Based on Fuzzy Extractors

46. Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting

Catalog

Books, media, physical & digital resources