Computer Science & Engineering

  • Name:郁昱
  • Title:Research Professor
  • Office:SEIEE-3-537
  • Office Phone:34206661
  • Email:yu@tsinghua.edu.cn
  • Website:http://yuyu.hk

Research Field

Cryptography, in particular, pseudoerandomness, information-theoretic security, postquantum cryptography

Education

1999-2013 Fudan University, Bachelor of Science
2003-2006 Nanyang Technological University, PhD

Work experience

2006-2008 T-Systems, Research Scientist
2008-2010 UCL Crypto Group, Postdoctoral Researcher
2011-2011 East China Normal University, Associate Professor
2012-2014 Tsinghua University, Assistant Profesor (Tenure-Track)
2014-Present Shanghai Jiao Tong University, Research Professor

Research

Awards and Honors

2016 Young Cheung Kong Scholarship by the Ministry of Education

Teaching

Publications

Weijia Wang, Yu Yu, Francois-Xavier Standaert, Dawu Gu, Sen Xu, Chi Zhang. "Ridge-based Profiled Differential Power Analysis", CT-RSA 2017, to appear.

Yu Yu, Jiang Zhang. "Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN", Advances in Cryptology - CRYPTO 2016, 214-243.

Yu Yu, John Steinberger. "Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN", Advances in Cryptology - EUROCRYPT 2016, pp. 154-183.

Junrong Liu, Yu Yu, Francois-Xavier Standaert, Zheng Guo, Dawu Gu, Wei Sun, Yijie Ge, Xinjun Xie. "Small Tweaks do Not Help: Differential Power Analysis of MILENAGE Implementations in 3G/4G USIM Cards", in 20th European Symposium on Research in Computer Security - ESORICS 2015, pp. 468-480.

Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, Francois-Xavier Standaert, Dawu Gu, Sen Xu. "Evaluation and Improvement of Generic-Emulating DPA Attacks", in Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems 2015 (CHES 2015), pp. 416-432.

Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. "(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond", Advances in Cryptology - CRYPTO 2015.

Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng. "The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions", in Proceedings of the 12th Theory of Cryptography Conference (TCC 2015), pp. 7-35.

Yu Yu. "Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters", Advances in Cryptology - ASIACRYPT 2013, pp. 261-279, eprint report 2013/270.

François-Xavier Standaert, Olivier Pereira, Yu Yu. "Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions ", Advances in Cryptology - CRYPTO 2013, pp. 335-352.

Yuanyuan Zhou, Yu Yu, François-Xavier Standaert, Jean-Jacques Quisquater. "On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards", to appear in the 17th Financial Cryptography (FC 2013).

Yevgeniy Dodis, Yu Yu. "Overcoming Weak Expectations", in the 10th Theory of Cryptography Conference (TCC 2013), pp. 1-22.

Yu Yu, François-Xavier Standaert. "Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness", in Proceedings of the Cryptographer's Track at RSA Conference (CT-RSA 2013), pp.223-239.

Yevgeniy Dodis, Yu Yu. "Overcoming Weak Expectations", Invited paper to Information Theory Workshop 2012.

Yu Yu, Xiangxue Li, Haifeng Qian. "Two-Source Extractors for Leaky Sources", Information Theory Workshop 2012.

Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu. "Leftover Hash Lemma, Revisited", Advances in Cryptology - CRYPTO 2011, pp. 1-20. Invited (and accepted) to Journal of Cryptology.

Yu Yu, François-Xavier Standaert,Olivier Pereira, Moti Yung, "Practical Leakage-Resilient Pseudo-random Generators", In Proceedings of 17th ACM Conference on Computer and Communications Security (CCS 2010), pp. 161-171.

Others