个人简介
与联合国可持续发展目标相关的专业知识
2015 年,联合国成员国同意 17 项可持续发展目标 (SDG),以消除贫困、保护地球并确保全人类的繁荣。此人的工作有助于实现下列可持续发展目标:
-
可持续发展目标 11 可持续城市和社区
指纹
深入其中 Yu Yu 为活跃的研究主题。这些主题标签来自此人的成果。它们共同形成唯一的指纹。
- 1 相似简介
最近五年的合作关系和顶尖研究领域
最近的国家/地区级外部合作关系。点击圆点,以了解详细信息或
-
A Hybrid Algorithm for the Regular Syndrome Decoding Problem
Wang, T., Wang, A., Yang, K., Liu, H., Yu, Y., Zhang, J. & Wang, X., 2026, Advances in Cryptology - ASIACRYPT 2025 - 31st International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Hanaoka, G. & Yang, B.-Y. (编辑). Springer Science and Business Media Deutschland GmbH, 页码 466-497 32 页码 (Lecture Notes in Computer Science; 卷 16248 LNCS).科研成果: 书/报告/会议事项章节 › 会议稿件 › 同行评审
开放访问 -
Corrigendum to “On the equivalence of uniform key agreement and sequential composition insecurity” [Information and Computation 307 (2025) 105365]
Wu, Y., Yu, L. & Yu, Y., 1月 2026, 在: Information and Computation. 308, 105402.科研成果: 期刊稿件 › 评论/辩论
开放访问 -
GPV Preimage Sampling with Weak Smoothness and Its Applications to Lattice Signatures
Zhang, S., Jia, H., Ran, D., Yu, Y., Yu, Y. & Wang, X., 2026, Advances in Cryptology - ASIACRYPT 2025 - 31st International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Hanaoka, G. & Yang, B.-Y. (编辑). Springer Science and Business Media Deutschland GmbH, 页码 233-264 32 页码 (Lecture Notes in Computer Science; 卷 16247 LNCS).科研成果: 书/报告/会议事项章节 › 会议稿件 › 同行评审
开放访问 -
PQMagic: Towards Secure and Efficient Post Quantum Cryptography Implementations
He, Y., Hao, X., Li, J. & Yu, Y., 2026, Applied Cryptography and Network Security Workshops - ACNS 2025 Satellite Workshops: AIHWS, AIoTS, QSHC, SCI, PrivCrypt, SPIQE, SiMLA, and CIMSS 2025, Revised Selected Papers. Manulis, M. (编辑). Springer Science and Business Media Deutschland GmbH, 页码 152-172 21 页码 (Lecture Notes in Computer Science; 卷 15654 LNCS).科研成果: 书/报告/会议事项章节 › 会议稿件 › 同行评审
-
Actively Secure Half-Gates with Minimum Overhead under Duplex Networks
Cui, H., Wang, X., Yang, K. & Yu, Y., 4月 2025, 在: Journal of Cryptology. 38, 2, 19.科研成果: 期刊稿件 › 文章 › 同行评审
开放访问