Yu Yu

1.5k total citations
47 papers, 361 citations indexed

About

Yu Yu is a scholar working on Artificial Intelligence, Computational Theory and Mathematics and Information Systems. According to data from OpenAlex, Yu Yu has authored 47 papers receiving a total of 361 indexed citations (citations by other indexed papers that have themselves been cited), including 34 papers in Artificial Intelligence, 9 papers in Computational Theory and Mathematics and 8 papers in Information Systems. Recurrent topics in Yu Yu's work include Cryptographic Implementations and Security (18 papers), Cryptography and Data Security (16 papers) and Coding theory and cryptography (10 papers). Yu Yu is often cited by papers focused on Cryptographic Implementations and Security (18 papers), Cryptography and Data Security (16 papers) and Coding theory and cryptography (10 papers). Yu Yu collaborates with scholars based in China, United States and Belgium. Yu Yu's co-authors include Xiangxue Li, François‐Xavier Standaert, Moti Yung, Olivier Pereira, Weijia Wang, Liujun Wang, Yonghua Yang, Qiang Zhang, Jian-Wei Pan and Shi-Biao Tang and has published in prestigious journals such as Optics Express, IEEE Access and Journal of Mathematical Analysis and Applications.

In The Last Decade

Yu Yu

42 papers receiving 340 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Yu Yu China 10 253 94 73 50 50 47 361
Yunsheng Bai United States 7 183 0.7× 48 0.5× 130 1.8× 36 0.7× 33 0.7× 20 329
Renaud Sirdey France 13 346 1.4× 119 1.3× 79 1.1× 106 2.1× 80 1.6× 56 583
Johannes Wolkerstorfer Austria 9 300 1.2× 128 1.4× 132 1.8× 107 2.1× 83 1.7× 18 428
Muhammad Kashif Pakistan 11 183 0.7× 133 1.4× 30 0.4× 49 1.0× 30 0.6× 34 341
Fuyou Miao China 9 196 0.8× 85 0.9× 98 1.3× 85 1.7× 6 0.1× 60 311
Wenbao Han China 10 226 0.9× 90 1.0× 39 0.5× 80 1.6× 12 0.2× 39 359
Henri Gilbert France 11 419 1.7× 205 2.2× 160 2.2× 206 4.1× 41 0.8× 29 615
Kurunandan Jain India 12 154 0.6× 74 0.8× 163 2.2× 138 2.8× 13 0.3× 41 437
Albrecht Petzoldt United States 6 183 0.7× 89 0.9× 60 0.8× 72 1.4× 7 0.1× 10 283
Yongwoo Lee South Korea 8 211 0.8× 64 0.7× 92 1.3× 111 2.2× 20 0.4× 21 374

Countries citing papers authored by Yu Yu

Since Specialization
Citations

This map shows the geographic impact of Yu Yu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Yu Yu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Yu Yu more than expected).

Fields of papers citing papers by Yu Yu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Yu Yu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Yu Yu. The network helps show where Yu Yu may publish in the future.

Co-authorship network of co-authors of Yu Yu

This figure shows the co-authorship network connecting the top 25 collaborators of Yu Yu. A scholar is included among the top collaborators of Yu Yu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Yu Yu. Yu Yu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Zhou, Yuanyuan, et al.. (2025). Rejected Signatures’ Challenges Pose New Challenges: Key Recovery of CRYSTALS-Dilithium via Side-Channel Attacks. IACR Transactions on Cryptographic Hardware and Embedded Systems. 2025(4). 817–847. 1 indexed citations
2.
Guo, Xiaojie, et al.. (2025). Labeled Private Set Intersection From Distributed Point Function. IEEE Transactions on Information Forensics and Security. 20. 2970–2983.
3.
Zhu, Weiwei, et al.. (2024). Stability analysis and enhancement of super-efficiency model based on space distance. INFOR Information Systems and Operational Research. 63(1). 178–198. 2 indexed citations
4.
Wang, Weijia, et al.. (2023). Efficient Private Circuits with Precomputation. IACR Transactions on Cryptographic Hardware and Embedded Systems. 286–309. 1 indexed citations
5.
Wang, Weijia, et al.. (2022). Side-Channel Masking with Common Shares. IACR Transactions on Cryptographic Hardware and Embedded Systems. 290–329. 4 indexed citations
6.
Wang, Liujun, Jiayong Wang, Yonghua Yang, et al.. (2021). Experimental authentication of quantum key distribution with post-quantum cryptography. npj Quantum Information. 7(1). 72 indexed citations
7.
Guo, Chun, François‐Xavier Standaert, Weijia Wang, Xiao Wang, & Yu Yu. (2021). Provable Security of SP Networks with Partial Non-Linear Layers. IACR Transactions on Symmetric Cryptology. 353–388. 2 indexed citations
8.
Yu, Yu. (2021). Preface to special topic on lattice-based cryptography. National Science Review. 8(9). nwab154–nwab154. 7 indexed citations
9.
Yu, Yu, et al.. (2018). Information Security and Cryptology. Lecture notes in computer science. 10 indexed citations
10.
Li, Changyu, Juanru Li, Hui Liu, et al.. (2018). Passwords in the Air. 1–11. 8 indexed citations
11.
Wang, Weijia, et al.. (2017). Ridge-Based DPA: Improvement of Differential Power Analysis For Nanoscale Chips. IEEE Transactions on Information Forensics and Security. 13(5). 1301–1316. 26 indexed citations
12.
Han, Gang, et al.. (2017). 1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity. Security and Communication Networks. 2017. 1–9. 2 indexed citations
13.
Yu, Yu. (2015). Directed spaces defined through T_0 spaces with specialization order. Journal of Sichuan University.
14.
Yu, Yu, Xiangxue Li, & Jian Weng. (2014). Pseudorandom generators from regular one-way functions: New constructions with improved parameters. Theoretical Computer Science. 569. 58–69. 1 indexed citations
15.
Li, Xiangxue, et al.. (2013). Balanced2p-variable rotation symmetric Boolean functions with optimal algebraic immunity, good nonlinearity, and good algebraic degree. Journal of Mathematical Analysis and Applications. 403(1). 63–71. 8 indexed citations
16.
Li, Xiangxue, Haifeng Qian, Jian Weng, & Yu Yu. (2012). Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Mathematical and Computer Modelling. 57(3-4). 503–511. 20 indexed citations
17.
Barak, Boaz, et al.. (2011). 残余ハッシュ補助定理(Leftover Hash Lemma)の再考. Lecture notes in computer science. 6841. 1–20. 2 indexed citations
18.
Standaert, François‐Xavier, Olivier Pereira, Yu Yu, et al.. (2010). Leakage Resilient Cryptography in Practice. DIAL (Catholic University of Leuven). 1 indexed citations
19.
Yu, Yu, et al.. (2009). Algorithm of the Text Copy Detection Based on Text Structure Tree. Shuju fenxi yu zhishi faxian. 50–55. 1 indexed citations
20.
Yu, Yu, Jussipekka Leiwo, & A.B. Premkumar. (2008). A Study on the Security of Privacy Homomorphism. International journal of network security. 6(1). 33–39. 1 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026