Mitaka : A Simpler, Parallelizable, Maskable Variant of Falcon T Espitau, PA Fouque, F Gérard, M Rossi, A Takahashi, M Tibouchi, ... Annual International Conference on the Theory and Applications of …, 2022 | 67 | 2022 |
Second order statistical behavior of LLL and BKZ Y Yu, L Ducas Selected Areas in Cryptography–SAC 2017: 24th International Conference …, 2018 | 49 | 2018 |
Shorter hash-and-sign lattice-based signatures T Espitau, M Tibouchi, A Wallet, Y Yu Annual International Cryptology Conference, 245-275, 2022 | 43 | 2022 |
Provably secure NTRU instances over prime cyclotomic rings Y Yu, G Xu, X Wang IACR International Workshop on Public Key Cryptography, 409-434, 2017 | 31 | 2017 |
Learning strikes again: the case of the DRS signature scheme L Ducas, Y Yu Journal of Cryptology 34, 1-24, 2021 | 26 | 2021 |
Integral matrix gram root and lattice gaussian sampling without floats L Ducas, S Galbraith, T Prest, Y Yu Annual International Conference on the Theory and Applications of …, 2020 | 26 | 2020 |
BAT: Small and fast KEM over NTRU lattices PA Fouque, P Kirchner, T Pornin, Y Yu IACR Transactions on Cryptographic Hardware and Embedded Systems, 240-265, 2022 | 20 | 2022 |
Key recovery from gram–schmidt norm leakage in hash-and-sign signatures over NTRU lattices PA Fouque, P Kirchner, M Tibouchi, A Wallet, Y Yu Annual International Conference on the Theory and Applications of …, 2020 | 20 | 2020 |
Compact lattice gadget and its applications to hash-and-sign signatures Y Yu, H Jia, X Wang Annual International Cryptology Conference, 390-420, 2023 | 15 | 2023 |
Towards a simpler lattice gadget toolkit S Zhang, Y Yu IACR International Conference on Public-Key Cryptography, 498-520, 2022 | 15 | 2022 |
Improved power analysis attacks on falcon S Zhang, X Lin, Y Yu, W Wang Annual International Conference on the Theory and Applications of …, 2023 | 13 | 2023 |
Orthogonalized lattice enumeration for solving SVP Z Zheng, X Wang, G Xu, Y Yu Science China Information Sciences 61, 1-15, 2018 | 13 | 2018 |
Klepto for ring-LWE encryption D Xiao, Y Yu The Computer Journal 61 (8), 1228-1239, 2018 | 12 | 2018 |
Provably secure ntruencrypt over more general cyclotomic rings Y Yu, G Xu, X Wang Cryptology ePrint Archive, 2017 | 12 | 2017 |
Cryptanalysis of CompactLWE and Related Lightweight Public Key Encryption D Xiao, Y Yu Security and Communication Networks 2018 (1), 4957045, 2018 | 11 | 2018 |
Lattice-Based Cryptography: A Survey X Wang, G Xu, Y Yu Chinese Annals of Mathematics, Series B 44 (6), 945-960, 2023 | 10 | 2023 |
Latticebased cryptosystems in standardisation processes: A survey A Wang, D Xiao, Y Yu IET Information Security 17 (2), 227-243, 2023 | 7 | 2023 |
Compact Instruction Set Extensions for Kyber L Li, G Qin, Y Yu, W Wang IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2023 | 5 | 2023 |
Zalcon: an alternative FPA-free NTRU sampler for Falcon PA Fouque, F Gérard, M Rossi, Y Yu Proc. 3rd NIST PQC Workshop, 1-23, 2021 | 5 | 2021 |
Cryptanalysis of the Peregrine Lattice-Based Signature Scheme X Lin, M Suzuki, S Zhang, T Espitau, Y Yu, M Tibouchi, M Abe IACR International Conference on Public-Key Cryptography, 387-412, 2024 | 4 | 2024 |