教师名录

郁昱 教授

主页: [点击这里]

办公室电话:

办公地点:SEIEE-3-537

电子邮件:yuyu@cs.sjtu.edu.cn

实验室: 格密码系统安全实验室

  • 研究兴趣
  • 教育背景
  • 工作经验
  • 教授课程
  • 论文发表
  • 项目资助
  • 获奖信息
  • 学术服务
pseudorandomness, leakage-resilient cryptography, etc.
1999-2003      Fudan University                     Department of Computer Science        Bachelor of Science
2003-2006      Nanyang Technological University     School of Computer Engineering         Doctor of Philosophy
2006-2008     T-Systems Singapore                ICT Security Laboratory        Cryptographic Analyst
2008-2011    Université catholique de Louvain  UCL Crypto Group               Post-doctoral Researcher 
2012-2013     Tsinghua University              IIIS (fomerly ITCS)             Tenure-Track Assistant Professor

2014-present

TCC 2015, CRYPTO 2015, EUROCRYPT 2016, CRYPTO 2016

ESORICS 2015, CHES 2015

check out my personal webpage at http://yuyu.hk

2010-2013


Yu Yu, Xiangxue Li, Jian Weng. "Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters", to appear in the 19th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2013), also available at eprint report 2013/270.


Fran?ois-Xavier Standaert, Olivier Pereira, Yu Yu, “Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions”, in the Proceedings of the 33rd International Cryptology Conference (CRYPTO 2013), pp. 335-352.

Yuanyuan Zhou, Yu Yu, Fran?ois-Xavier Standaert, Jean-Jacques Quisquater. "On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards", in the proceedings of the 17th Financial Cryptography and Data Security (FC 2013), pp. 230-238.

Yevgeniy Dodis, Yu Yu, “Overcoming Weak Expectactions”, In the proceedings of the 10th Theory of Cryptography Conference (TCC 2013), pp. 1-22.  invited submission to Journal of Cryptology.

Yu Yu,  Fran?ois-Xavier Standaert,  “Practical Leakage-Resilient Pseudo-Random Objects with Minimum Public Randomness”, In Proceedings of the Cryptographer’s Tracker at RSA Conference 2013 (CT-RSA 2013), pp.223-239. 

Yevgeniy Dodis, Yu Yu, “Overcoming Weak Expectactions”, To appear in Information Theory Workshop (ITW 2012), invited paper.

Yu Yu, “Two-Source Extractors for Leaky Sources”, in Proceedings of Information Theory Workshop (ITW 2012).

Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, Fran?ois-Xavier Standaert, Yu Yu, “Leftover Hash Lemma, Revisited”, In Proceedings of the 31st International Cryptology Conference (CRYPTO 2011), pp. 1-20, accepted to Journal of Cryptology (pending minor revisions), 

Yu Yu, Fran?ois-Xavier Standaert, Olivier Pereira,  “Practical Leakage-Resilient Pseudo-Random Generator”, In Proceedings of 17-th ACM Conference on Computer and Communications Security (CCS 2010), pp. 141-151, ACM Press, 2010.
I‘m serving as an observer and webmaster at the IACR (International Association for Cryptologic Research, 国际密码学会).

联系我们 webmaster@cs.sjtu.edu.cn

上海交通大学计算机科学与工程系版权所有 @ 2013