Name
Affiliation
Papers
DAWU GU
Dept. of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China
261
Collaborators
Citations 
PageRank 
422
644
103.50
Referers 
Referees 
References 
1648
3087
2448
Search Limit
1001000
Title
Citations
PageRank
Year
The Ideal Functionalities for Private Set Union, Revisited.00.342022
SIMulation: Demystifying (Insecure) Cellular Network based One-Tap Authentication Services00.342022
Shuffle-based Private Set Union: Faster and More Secure.00.342022
KingFisher: Unveiling Insecurely Used Credentials in IoT-to-Mobile Communications00.342022
<inline-formula><tex-math notation="LaTeX">${\sf PBT}$</tex-math><alternatives><mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"><mml:mi mathvariant="sans-serif">PBT</mml:mi></mml:math><inline-graphic xlink:href="jia-ieq1-2998682.gif" xmlns:xlink="http://www.w3.org/1999/xlink"/></alternatives></inline-formula>: A New Privacy-Preserving Payment Protocol for Blockchain Transactions00.342022
Ciphertext-Only Fault Analysis Of Gift Lightweight Cryptosystem00.342022
Improved Pump and Jump BKZ by Sharp Simulator.00.342022
Tightly Secure Chameleon Hash Functions in the Multi-User Setting and Their Applications.00.342022
AL-PA: cross-device profiled side-channel attack using adversarial learning00.342022
Annotating, Tracking, and Protecting Cryptographic Secrets with CryptoMPK00.342022
Privacy-preserving statistical analysis over multi-dimensional aggregated data in edge computing-based smart grid systems00.342022
A Semantics-Based Hybrid Approach on Binary Code Similarity Comparison00.342021
Improved Guess And Determine Attack On The Masha Stream Cipher00.342021
A real-time related key attack on the WG-16 stream cipher for securing 4G-LTE networks00.342021
Revisiting The Security Of Dbhts Macs: Beyond-Birthday-Bound In The Multi-User Setting00.342021
Binary Classification-Based Side-Channel Analysis00.342021
Attention - Based Non-Profiled Side-Channel Attack00.342021
Statistical Fault Analysis Of The Simeck Lightweight Cipher In The Ubiquitous Sensor Networks00.342021
Re-Check Your Certificates! Experiences and Lessons Learnt from Real-World HTTPS Certificate Deployments.00.342021
Key Encapsulation Mechanism with Tight Enhanced Security in the Multi-user Setting - Impossibility Result and Optimal Tightness.00.342021
Understanding the security of app-in-the-middle IoT00.342020
Ciphertext-only fault analysis on the Midori lightweight cryptosystem00.342020
Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications.00.342020
Improved Meet-In-The-Middle Attacks On Reduced-Round Deoxys-Bc-25600.342020
Reusable Fuzzy Extractor Based On The Lpn Assumption00.342020
Dual System in Lattice: Fully Secure ABE from LWE Assumption.00.342020
Public-Key Puncturable Encryption: Modular and Compact Constructions.20.362020
Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC00.342019
Generic Constructions of Robustly Reusable Fuzzy Extractor.00.342019
Structure-preserving public-key encryption with leakage-resilient CCA security.00.342019
Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks00.342019
Ciphertext Policy Attribute-Based Encryption For Circuits From Lwe Assumption00.342019
APPCOMMUNE: Automated Third-Party Libraries De-duplicating and Updating for Android Apps20.362019
Nlp-Eye: Detecting Memory Corruptions Via Semantic-Aware Memory Operation Function Identification00.342019
New Analysis of Reduced-Version of Piccolo in the Single-Key Scenario.00.342019
A Practical Dynamic Enhanced BFT Protocol.00.342019
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System.00.342019
Pseudo random oracle of Merkle-Damgård hash functions revisited00.342019
Towards A Multi-Chain Future Of Proof-Of-Space00.342019
Improved impossible differential cryptanalysis of large-block Rijndael00.342019
Similar operation template attack on RSA-CRT as a case study.10.402018
Z-Channel: Scalable and Efficient Scheme in Zerocash.10.352018
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness.00.342018
Tightly Secure Encryption Schemes against Related-Key Attacks.00.342018
Passwords in the Air: Harvesting Wi-Fi Credentials from SmartCfg Provisioning.20.382018
ISO/IEC 9797-1 Revisited: Beyond Birthday Bound.00.342018
Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips.30.402018
Improved meet-in-the-middle attacks on reduced-round Piccolo.00.342018
An Empirical Study of SDK Credential Misuse in iOS Apps20.372018
Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps.30.492017
  • 1
  • 2