Book:
  1. Fuchun Guo, Willy Susilo, and Yi Mu. Introduction to Security Reduction. Springer 2018. (Book ).
    Note: If you are not a millionaire, you can access the book free from Here .

Conference:
  1. Fuchun Guo, Rongmao Chen, Willy Susilo, Jianchang Lai, Guomin Yang and Yi Mu. Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample. The 37th International Cryptology Conference (CRYPTO 2017), Lecture Notes in Computer Science, 2017. (Paper)

  2. Fuchun Guo, Willy Susilo, Yi Mu, Rongmao Chen, Jianchang Lai and Guomin Yang. Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction. The 22nd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT 2016), Lecture Notes in Computer Science, 2016. (Paper)

  3. Fuchun Guo, Yi Mu, Willy Susilo, and Vijay Varadharajan, ``Membership Encryption and Its Applications," 18th Australasian Conference on Information Secuiryt and Privacy (ACISP 2013), Lecture Notes in Computer Science vol.7959, Springer Verlag, 2013, pp. 219-234. (PDF)

  4. Fuchun Guo, Yi Mu and Willy Susilo, ``Identity-Based Traitor Tracing with Short Private Key and Short Ciphertext," 17th European Symposium on Research in Computer Security (ESORICS 2012), Lecture Notes in Computer Science vol.7459, Springer Verlag, 2012, pp. 609-626. (PDF)

  5. Fuchun Guo, Yi Mu, and Zhide Chen, ``Efficient Batch Verification of Short Signatures for A Single-signer Setting Without Random Oracles," 3rd International Workshop on Security (IWSEC 2008), Lecture Notes in Computer Science vol.5312, Springer Verlag, 2008, pp.49-63. (Best Student Paper)

  6. Fuchun Guo, Yi Mu, and Zhide Chen, ``Identity-Based Online/Offline Encryption," 12th Financial Cryptography and Data Security (FC 2008), Lecture Notes in Computer Science vol.5143, Springer Verlag, 2008, pp.247-261. (PDF)

  7. Fuchun Guo, Yi Mu, Zhide Chen, and Li Xu, ``Multi-Identity Single-Key Decryption without Random Oracles," 3rd Information Security and Cryptology(Inscrypt 2007), Lecture Notes in Computer Science, vol.4990 Springer Verlag, 2008, pp.384-398.

  8. Fuchun Guo, Yi Mu, and Zhide Chen, ``Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key," 1st International Conference on Pairing-based Cryptography(Pairing 2007), Lecture Notes in Computer Science vol.4575, Springer Verlag,2007, pp.392-406.

    Journal:
  1. 郭福春. 一种可提高导师寿命的有效方案[J]. 卧村密码学报, 2019(5).

  2. 郭福春. 致我公钥密码研究生的一封信[J]. 卧村密码学报, 2019(1).

  3. 赵臻, 吴戈, 赖建昌, 蒋芃, 朱斌瑞, 穆怡, 苏西洛, 郭福春. 公钥密码方案构造及安全证明的知识 要点和方法论[J]. 密码学报, 2018. (Paper)