default search action
Xiaoyun Wang 0001
Person information
- affiliation: Shandong University, Key Laboratory of Cryptologic Technology and Information Security, China
- affiliation: Tsinghua University, Institute for Advanced Study, Beijing, China
Other persons with the same name
- Xiaoyun Wang — disambiguation page
- Xiaoyun Wang 0002 — Doshisha University, Kyoto, Japan
- Xiaoyun Wang 0003 — University of Toronto, Canada
- Xiaoyun Wang 0004 — Florida State University, Tallahassee, FL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j44]Xiaoyun Wang, Zixiang Han, Jing Jin, Rongyan Xi, Yajuan Wang, Lincong Han, Liang Ma, Mengting Lou, Xin Gui, Qixing Wang, Guangyi Liu:
Multistatic Integrated Sensing and Communication System Based on Macro-Micro Cooperation. Sensors 24(8): 2498 (2024) - [j43]Shihe Ma, Tairong Huang, Anyu Wang, Qixian Zhou, Xiaoyun Wang:
Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 592-616 (2024) - [c71]Tairong Huang, Shihe Ma, Anyu Wang, Xiaoyun Wang:
Approximate Methods for the Computation of Step Functions in Homomorphic Encryption. ACISP (1) 2024: 217-237 - [c70]Xiaoyang Dong, Boxin Zhao, Lingyue Qin, Qingliang Hou, Shun Zhang, Xiaoyun Wang:
Generic MitM Attack Frameworks on Sponge Constructions. CRYPTO (4) 2024: 3-37 - [c69]Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang:
Accelerating BGV Bootstrapping for Large p Using Null Polynomials over $\mathbb {Z}_{p^e}$. EUROCRYPT (2) 2024: 403-432 - [c68]Sisi Duan, Haibin Zhang, Xiao Sui, Baohan Huang, Changchun Mu, Gang Di, Xiaoyun Wang:
Dashing and Star: Byzantine Fault Tolerance with Weak Certificates. EuroSys 2024: 250-264 - [c67]Xiaoyun Wang, Lincong Han, Rongyan Xi, Liang Ma, Mengting Lou, Jing Jin, Qixing Wang, Guangyi Liu, Jiangzhou Wang:
Multipath-Exploited Bistatic Sensing with LoS Blockage in MIMO-OFDM Systems for 6G. ICC Workshops 2024: 1529-1534 - [c66]Tianshuo Cong, Delong Ran, Zesen Liu, Xinlei He, Jinyuan Liu, Yichen Gong, Qi Li, Anyu Wang, Xiaoyun Wang:
Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging. LAMPS@CCS 2024: 69-76 - [i91]Tianshuo Cong, Delong Ran, Zesen Liu, Xinlei He, Jinyuan Liu, Yichen Gong, Qi Li, Anyu Wang, Xiaoyun Wang:
Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging. CoRR abs/2404.05188 (2024) - [i90]Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, Xiaoyun Wang:
Hard-Label Cryptanalytic Extraction of Neural Network Models. CoRR abs/2409.11646 (2024) - [i89]Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang:
Accelerating BGV Bootstrapping for Large p Using Null Polynomials Over ℤpe. IACR Cryptol. ePrint Arch. 2024: 115 (2024) - [i88]Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang:
Faster BGV Bootstrapping for Power-of-Two Cyclotomics through Homomorphic NTT. IACR Cryptol. ePrint Arch. 2024: 164 (2024) - [i87]Tairong Huang, Shihe Ma, Anyu Wang, Xiaoyun Wang:
Approximate Methods for the Computation of Step Functions in Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2024: 171 (2024) - [i86]Xiaoyang Dong, Boxin Zhao, Lingyue Qin, Qingliang Hou, Shun Zhang, Xiaoyun Wang:
Generic MitM Attack Frameworks on Sponge Constructions. IACR Cryptol. ePrint Arch. 2024: 604 (2024) - [i85]Anyu Wang, Zhongxiang Zheng, Chunhuan Zhao, Zhiyuan Qiu, Guang Zeng, Xiaoyun Wang:
Scloud+: a Lightweight LWE-based KEM without Ring/Module Structure. IACR Cryptol. ePrint Arch. 2024: 1306 (2024) - [i84]Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, Xiaoyun Wang:
Hard-Label Cryptanalytic Extraction of Neural Network Models. IACR Cryptol. ePrint Arch. 2024: 1403 (2024) - 2023
- [j42]Qingyuan Yu, Xiaoyang Dong, Lingyue Qin, Yongze Kang, Keting Jia, Xiaoyun Wang, Guoyan Zhang:
Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(4): 1-31 (2023) - [c65]Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Yang Yu, Xiaoyun Wang:
Exploiting the Symmetry of $\mathbb {Z}^n$: Randomization and the Automorphism Problem. ASIACRYPT (4) 2023: 167-200 - [c64]Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, Xiaoyun Wang:
Automated Meet-in-the-Middle Attack Goes to Feistel. ASIACRYPT (3) 2023: 370-404 - [c63]Jiarui Wang, Xiaoyun Wang, Chun-Ming Lai, Shyhtsun Felix Wu:
Online Social Community Sub-Location Classification. ASONAM 2023: 276-280 - [c62]Tianrui Wang, Anyu Wang, Xiaoyun Wang:
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks. CRYPTO (3) 2023: 70-100 - [c61]Yang Yu, Huiwen Jia, Xiaoyun Wang:
Compact Lattice Gadget and Its Applications to Hash-and-Sign Signatures. CRYPTO (5) 2023: 390-420 - [c60]Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang:
Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing. EUROCRYPT (4) 2023: 158-188 - [i83]Yang Yu, Huiwen Jia, Xiaoyun Wang:
Compact Lattice Gadget and Its Applications to Hash-and-Sign Signatures. CoRR abs/2305.12481 (2023) - [i82]Yichen Gong, Delong Ran, Jinyuan Liu, Conglei Wang, Tianshuo Cong, Anyu Wang, Sisi Duan, Xiaoyun Wang:
FigStep: Jailbreaking Large Vision-language Models via Typographic Visual Prompts. CoRR abs/2311.05608 (2023) - [i81]Lingyue Qin, Boxin Zhao, Jialiang Hua, Xiaoyang Dong, Xiaoyun Wang:
Weak-Diffusion Structure: Meet-in-the-Middle Attacks on Sponge-based Hashing Revisited. IACR Cryptol. ePrint Arch. 2023: 518 (2023) - [i80]Shihe Ma, Tairong Huang, Anyu Wang, Xiaoyun Wang:
Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation. IACR Cryptol. ePrint Arch. 2023: 645 (2023) - [i79]Tianrui Wang, Anyu Wang, Xiaoyun Wang:
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks. IACR Cryptol. ePrint Arch. 2023: 659 (2023) - [i78]Yang Yu, Huiwen Jia, Xiaoyun Wang:
Compact Lattice Gadget and Its Applications to Hash-and-Sign Signatures. IACR Cryptol. ePrint Arch. 2023: 729 (2023) - [i77]Qingliang Hou, Xiaoyang Dong, Lingyue Qin, Guoyan Zhang, Xiaoyun Wang:
Automated Meet-in-the-Middle Attack Goes to Feistel. IACR Cryptol. ePrint Arch. 2023: 1359 (2023) - [i76]Kaijie Jiang, Anyu Wang, Hengyi Luo, Guoxiao Liu, Yang Yu, Xiaoyun Wang:
Exploiting the Symmetry of ℤn: Randomization and the Automorphism Problem. IACR Cryptol. ePrint Arch. 2023: 1735 (2023) - 2022
- [j41]Xiaoyun Wang, Fei Wang, Hengyang Guo, Bo Liu:
Impact of Errors in Environmental Correction on Gravity Field Recovery Using Interferometric Radar Altimeter Observations. Remote. Sens. 14(24): 6299 (2022) - [j40]Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang:
Improved MITM Cryptanalysis on Streebog. IACR Trans. Symmetric Cryptol. 2022(2): 63-91 (2022) - [c59]Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang:
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. ASIACRYPT (1) 2022: 287-317 - [c58]Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang:
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks. EUROCRYPT (3) 2022: 3-33 - [c57]Brad Rees, Xiaoyun Wang, Joe Eaton, Onur Yilmaz, Rick Ratzel, Dominique LaSalle:
Accelerated GNN Training with DGL and RAPIDS cuGraph in a Fraud Detection Workflow. KDD 2022: 4820-4821 - [i75]Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang:
Improved MITM Cryptanalysis on Streebog. IACR Cryptol. ePrint Arch. 2022: 568 (2022) - [i74]Sisi Duan, Haibin Zhang, Xiao Sui, Baohan Huang, Changchun Mu, Gang Di, Xiaoyun Wang:
Byzantine Fault Tolerance from Weak Certificates. IACR Cryptol. ePrint Arch. 2022: 625 (2022) - [i73]Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang:
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. IACR Cryptol. ePrint Arch. 2022: 789 (2022) - [i72]Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang:
Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing. IACR Cryptol. ePrint Arch. 2022: 1714 (2022) - 2021
- [j39]Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu, Chunhuan Zhao:
Error estimation of practical convolution discrete Gaussian sampling with rejection sampling. Sci. China Inf. Sci. 64(3) (2021) - [j38]Ke Xu, Xiaoyun Wang, Xinyang Liu, Changfeng Cao, Huolin Li, Haiyong Peng, Dong Wang:
A dedicated hardware accelerator for real-time acceleration of YOLOv2. J. Real Time Image Process. 18(3): 481-492 (2021) - [j37]Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu:
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny. IACR Trans. Symmetric Cryptol. 2021(2): 249-291 (2021) - [c56]Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu:
Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials. ASIACRYPT (1) 2021: 241-271 - [c55]Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu:
Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks. CRYPTO (3) 2021: 278-308 - [c54]Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. EUROCRYPT (1) 2021: 771-804 - [c53]Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang:
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems. ICISC 2021: 195-216 - [i71]Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu:
Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks. IACR Cryptol. ePrint Arch. 2021: 427 (2021) - [i70]Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu:
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny. IACR Cryptol. ePrint Arch. 2021: 656 (2021) - [i69]Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang:
Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems. IACR Cryptol. ePrint Arch. 2021: 732 (2021) - [i68]Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang:
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks. IACR Cryptol. ePrint Arch. 2021: 856 (2021) - [i67]Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu:
Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials. IACR Cryptol. ePrint Arch. 2021: 1119 (2021) - 2020
- [j36]Xiaoyang Dong, Bingyou Dong, Xiaoyun Wang:
Quantum attacks on some feistel block ciphers. Des. Codes Cryptogr. 88(6): 1179-1203 (2020) - [j35]Congming Wei, Jiazhe Chen, An Wang, Beibei Wang, Hongsong Shi, Xiaoyun Wang:
x-only coordinate: with application to secp256k1 " >Chosen base-point side-channel attack on Montgomery ladder with x-only coordinate: with application to secp256k1. IET Inf. Secur. 14(5): 483-492 (2020) - [c52]Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu:
Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories. ASIACRYPT (2) 2020: 727-757 - [i66]Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. IACR Cryptol. ePrint Arch. 2020: 467 (2020) - [i65]Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu:
Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories. IACR Cryptol. ePrint Arch. 2020: 1030 (2020)
2010 – 2019
- 2019
- [j34]Xiaoyang Dong, Zheng Li, Xiaoyun Wang:
Quantum cryptanalysis on some generalized Feistel schemes. Sci. China Inf. Sci. 62(2): 22501:1-22501:12 (2019) - [j33]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256. Sci. China Inf. Sci. 62(3): 32102:1-32102:12 (2019) - [j32]Yanbing Wu, Haining Fan, Xiaoyun Wang, Guangnan Zou:
A regulated digital currency. Sci. China Inf. Sci. 62(3): 32109:1-32109:12 (2019) - [j31]Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, Xiaoyun Wang:
MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes. Des. Codes Cryptogr. 87(6): 1271-1296 (2019) - [j30]Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao:
New Distinguisher on Reduced-Round Keccak Sponge Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 242-250 (2019) - [j29]Rui Zhang, Shenghong He, Xinghua Yang, Xiaoyun Wang, Kai Li, Qiyun Huang, Zhuliang Yu, Xichun Zhang, Dan Tang, Yuanqing Li:
An EOG-Based Human-Machine Interface to Control a Smart Home Environment for Patients With Severe Spinal Cord Injuries. IEEE Trans. Biomed. Eng. 66(1): 89-100 (2019) - [j28]Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier:
New Conditional Cube Attack on Keccak Keyed Modes. IACR Trans. Symmetric Cryptol. 2019(2): 94-124 (2019) - [c51]Ke Xu, Xiaoyun Wang, Dong Wang:
A Scalable OpenCL-Based FPGA Accelerator for YOLOv2. FCCM 2019: 317 - [i64]Xiaoyun Wang, Xuanqing Liu, Cho-Jui Hsieh:
GraphDefense: Towards Robust Graph Convolutional Networks. CoRR abs/1911.04429 (2019) - [i63]Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier:
New Conditional Cube Attack on Keccak Keyed Modes. IACR Cryptol. ePrint Arch. 2019: 392 (2019) - [i62]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash. IACR Cryptol. ePrint Arch. 2019: 1115 (2019) - [i61]Chunhuan Zhao, Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu:
Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications. IACR Cryptol. ePrint Arch. 2019: 1231 (2019) - 2018
- [j27]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Impossible differential attack on Simpira v2. Sci. China Inf. Sci. 61(3): 032106:1-032106:13 (2018) - [j26]Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu, Yang Yu:
Orthogonalized lattice enumeration for solving SVP. Sci. China Inf. Sci. 61(3): 32115:1-32115:15 (2018) - [j25]Yaoling Ding, Xiaoyun Wang, Ning Wang, Wei Wang:
Improved automatic search of impossible differentials for camellia with FL/FL -1 layers. Sci. China Inf. Sci. 61(3): 038103:1-038103:3 (2018) - [j24]Ning Wang, Xiaoyun Wang, Keting Jia, Jingyuan Zhao:
Differential attacks on reduced SIMON versions with dynamic key-guessing techniques. Sci. China Inf. Sci. 61(9): 098103:1-098103:3 (2018) - [j23]Xiaoyang Dong, Xiaoyun Wang:
Quantum key-recovery attack on Feistel structures. Sci. China Inf. Sci. 61(10): 102501:1-102501:7 (2018) - [j22]Wenquan Bi, Zheng Li, Xiaoyang Dong, Lu Li, Xiaoyun Wang:
Conditional cube attack on round-reduced River Keyak. Des. Codes Cryptogr. 86(6): 1295-1310 (2018) - [j21]Zhihui Chu, Huaifeng Chen, Xiaoyun Wang, Lu Li, Xiaoyang Dong, Yaoling Ding, Yonglin Hao:
Improved integral attacks without full codebook. IET Inf. Secur. 12(6): 513-520 (2018) - [j20]Zhihui Chu, Huaifeng Chen, Xiaoyun Wang, Xiaoyang Dong, Lu Li:
Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques. Secur. Commun. Networks 2018: 5160237:1-5160237:11 (2018) - [j19]Dan Li, Jiazhe Chen, An Wang, Xiaoyun Wang:
Analysis of Software Implemented Low Entropy Masking Schemes. Secur. Commun. Networks 2018: 7206835:1-7206835:8 (2018) - [c50]Ke Xu, Xiaoyun Wang, Shihang Fu, Dong Wang:
A Scalable FPGA Accelerator for Convolutional Neural Networks. ACA 2018: 3-14 - [c49]Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier:
A Key-Recovery Attack on 855-round Trivium. CRYPTO (2) 2018: 160-184 - [c48]Xiaoyun Wang, Chun-Ming Lai, Yu-Cheng Lin, Cho-Jui Hsieh, Shyhtsun Felix Wu, Hasan Cam:
Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on Graphs. MILCOM 2018: 1-9 - [i60]Xiaoyun Wang, Chun-Ming Lai, Yunfeng Hong, Cho-Jui Hsieh, Shyhtsun Felix Wu:
Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on Graphs. CoRR abs/1801.09838 (2018) - [i59]Chun-Ming Lai, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, Shyhtsun Felix Wu, Patrick D. McDaniel, Hasan Cam:
Attacking Strategies and Temporal Analysis Involving Facebook Discussion Groups. CoRR abs/1802.04500 (2018) - [i58]Xiaoyun Wang, Joe Eaton, Cho-Jui Hsieh, Shyhtsun Felix Wu:
Attack Graph Convolutional Networks by Adding Fake Nodes. CoRR abs/1810.10751 (2018) - [i57]Chun-Ming Lai, Xiaoyun Wang, Jon William Chapman, Yu-Cheng Lin, Yu-Chang Ho, Shyhtsun Felix Wu, Patrick D. McDaniel, Hasan Cam:
More or Less? Predict the Social Influence of Malicious URLs on Social Media. CoRR abs/1812.02978 (2018) - [i56]Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, Xiaoyun Wang:
MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes. IACR Cryptol. ePrint Arch. 2018: 75 (2018) - [i55]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC. IACR Cryptol. ePrint Arch. 2018: 142 (2018) - [i54]Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier:
A Key-recovery Attack on 855-round Trivium. IACR Cryptol. ePrint Arch. 2018: 198 (2018) - [i53]Xiaoyang Dong, Bingyou Dong, Xiaoyun Wang:
Quantum Attacks on Some Feistel Block Ciphers. IACR Cryptol. ePrint Arch. 2018: 504 (2018) - [i52]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256. IACR Cryptol. ePrint Arch. 2018: 680 (2018) - [i51]Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier, Yonglin Hao, Boxin Zhao:
A Refinement of "A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018. IACR Cryptol. ePrint Arch. 2018: 999 (2018) - 2017
- [j18]Guangyi Liu, Xueying Hou, Jing Jin, Fei Wang, Qixing Wang, Yue Hao, Yuhong Huang, Xiaoyun Wang, Xiao Xiao, Ailin Deng:
3-D-MIMO With Massive Antennas Paves the Way to 5G Enhanced Mobile Broadband: From System Design to Field Trials. IEEE J. Sel. Areas Commun. 35(6): 1222-1233 (2017) - [j17]Zheng Li, Xiaoyang Dong, Xiaoyun Wang:
Conditional Cube Attack on Round-Reduced ASCON. IACR Trans. Symmetric Cryptol. 2017(1): 175-202 (2017) - [j16]Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin:
Cube-like Attack on Round-Reduced Initialization of Ketje Sr. IACR Trans. Symmetric Cryptol. 2017(1): 259-280 (2017) - [c47]Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang:
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method. ASIACRYPT (1) 2017: 99-127 - [c46]Chun-Ming Lai, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, Shyhtsun Felix Wu, Patrick D. McDaniel, Hasan Cam:
Attacking strategies and temporal analysis involving Facebook discussion groups. CNSM 2017: 1-9 - [c45]Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao:
Conditional Cube Attack on Reduced-Round Keccak Sponge Function. EUROCRYPT (2) 2017: 259-288 - [c44]Yang Yu, Guangwu Xu, Xiaoyun Wang:
Provably Secure NTRU Instances over Prime Cyclotomic Rings. Public Key Cryptography (1) 2017: 409-434 - [i50]Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin:
Cube-like Attack on Round-Reduced Initialization of Ketje Sr. IACR Cryptol. ePrint Arch. 2017: 159 (2017) - [i49]Zheng Li, Xiaoyang Dong, Xiaoyun Wang:
Conditional Cube Attack on Round-Reduced ASCON. IACR Cryptol. ePrint Arch. 2017: 160 (2017) - [i48]Yang Yu, Guangwu Xu, Xiaoyun Wang:
Provably Secure NTRUEncrypt over More General Cyclotomic Rings. IACR Cryptol. ePrint Arch. 2017: 304 (2017) - [i47]Ximing Fu, Xiaoyun Wang, Jiazhe Chen:
Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently. IACR Cryptol. ePrint Arch. 2017: 412 (2017) - [i46]Zhongxiang Zheng, Chunhuan Zhao, Haining Fan, Xiaoyun Wang:
A Key Backup Scheme Based on Bitcoin. IACR Cryptol. ePrint Arch. 2017: 704 (2017) - [i45]Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang:
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method. IACR Cryptol. ePrint Arch. 2017: 804 (2017) - [i44]Wenquan Bi, Zheng Li, Xiaoyang Dong, Lu Li, Xiaoyun Wang:
Conditional Cube Attack on Round-Reduced River Keyak. IACR Cryptol. ePrint Arch. 2017: 1012 (2017) - [i43]Xiaoyang Dong, Xiaoyun Wang:
Quantum Key-recovery Attack on Feistel Structures. IACR Cryptol. ePrint Arch. 2017: 1199 (2017) - [i42]Xiaoyang Dong, Zheng Li, Xiaoyun Wang:
Quantum Cryptanalysis on Some Generalized Feistel Schemes. IACR Cryptol. ePrint Arch. 2017: 1249 (2017) - 2016
- [j15]Xiaoyang Dong, Xiaoyun Wang:
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes. IACR Trans. Symmetric Cryptol. 2016(1): 13-32 (2016) - [c43]Lingyue Qin, Huaifeng Chen, Xiaoyun Wang:
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques. ACISP (2) 2016: 409-424 - [c42]Jingguo Bi, Jiayang Liu, Xiaoyun Wang:
Cryptanalysis of a Homomorphic Encryption Scheme Over Integers. Inscrypt 2016: 243-252 - [c41]Huaifeng Chen, Xiaoyun Wang:
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques. FSE 2016: 428-449 - [c40]Zhan Chen, Huaifeng Chen, Xiaoyun Wang:
Cryptanalysis of Midori128 Using Impossible Differential Techniques. ISPEC 2016: 1-12 - [i41]Xiaoyang Dong, Xiaoyun Wang:
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes. IACR Cryptol. ePrint Arch. 2016: 509 (2016) - [i40]Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao:
Conditional Cube Attack on Reduced-Round Keccak Sponge Function. IACR Cryptol. ePrint Arch. 2016: 790 (2016) - [i39]Zhongxiang Zheng, Xiaoyun Wang, Yang Yu:
Orthogonalized Lattice Enumeration for Solving SVP. IACR Cryptol. ePrint Arch. 2016: 950 (2016) - [i38]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Impossible Differential Attack on Simpira v2. IACR Cryptol. ePrint Arch. 2016: 1161 (2016) - 2015
- [j14]Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang:
Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256. IET Inf. Secur. 9(3): 167-178 (2015) - [c39]Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Attacks on Reduced-Round Camellia-128/192/256. CT-RSA 2015: 59-83 - [c38]Wei Wei, Mingjie Liu, Xiaoyun Wang:
Finding Shortest Lattice Vectors in the Presence of Gaps. CT-RSA 2015: 239-257 - [c37]Leibo Li, Keting Jia, Xiaoyun Wang, Xiaoyang Dong:
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia. FSE 2015: 48-70 - [c36]Dan Ding, Guizhen Zhu, Xiaoyun Wang:
A Genetic Algorithm for Searching the Shortest Lattice Vector of SVP Challenge. GECCO 2015: 823-830 - [c35]Ning Wang, Xiaoyun Wang, Keting Jia:
Improved Impossible Differential Attack on Reduced-Round LBlock. ICISC 2015: 136-152 - [i37]Zhan Chen, Ning Wang, Xiaoyun Wang:
Impossible Differential Cryptanalysis of Reduced Round SIMON. IACR Cryptol. ePrint Arch. 2015: 286 (2015) - [i36]Huaifeng Chen, Xiaoyun Wang:
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques. IACR Cryptol. ePrint Arch. 2015: 666 (2015) - [i35]Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Attacks on Reduced-Round Camellia-128/192/256. IACR Cryptol. ePrint Arch. 2015: 896 (2015) - 2014
- [j13]Xiaoyun Wang, Lijuan Wei, Juan Zhang:
Dynamical analysis and perturbation solution of an SEIR epidemic model. Appl. Math. Comput. 232: 479-486 (2014) - [j12]Wei Wei, Chengliang Tian, Xiaoyun Wang:
New transference theorems on lattices possessing n∈-unique shortest vectors. Discret. Math. 315-316: 144-155 (2014) - [j11]Mingjie Liu, Xiaoyun Wang, Guangwu Xu, Xuexin Zheng:
A note on BDD problems with λ2-gap. Inf. Process. Lett. 114(1-2): 9-12 (2014) - [j10]Zongyue Wang, Hongbo Yu, Xiaoyun Wang:
Cryptanalysis of GOST R hash function. Inf. Process. Lett. 114(12): 655-662 (2014) - [c34]Jian Liu, Bo Liu, Guangning Nie, Bowei Wang, Xuan Feng, Xiaoyun Wang:
Regional homogeneity change in female depressive patients after abdominal acupuncture treatment. BIBM 2014: 100-107 - [c33]Jian Liu, Xiaoyu Li, Yuchuan Zhang, Jingjing Dun, Xiaoyun Wang:
A study on monoamine neurotransmitters in ovariectomized female rats with different Chinese herbs treatment. BIBM 2014: 108-111 - [c32]Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Single-Key Attacks on 9-Round AES-192/256. FSE 2014: 127-146 - [i34]Ning Wang, Xiaoyun Wang, Keting Jia, Jingyuan Zhao:
Improved Differential Attacks on Reduced SIMON Versions. IACR Cryptol. ePrint Arch. 2014: 448 (2014) - [i33]Dan Ding, Guizhen Zhu, Xiaoyun Wang:
A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge. IACR Cryptol. ePrint Arch. 2014: 489 (2014) - [i32]Jingyuan Zhao, Xiaoyun Wang, Meiqin Wang, Xiaoyang Dong:
Differential Analysis on Block Cipher PRIDE. IACR Cryptol. ePrint Arch. 2014: 525 (2014) - 2013
- [j9]Xiaoyun Wang, Li Wang, Yunjin Wu:
Novel results for a class of singular perturbed slow-fast system. Appl. Math. Comput. 225: 795-806 (2013) - [j8]An Wang, Man Chen, Zongyue Wang, Xiaoyun Wang:
Fault Rate Analysis: Breaking Masked AES Hardware Implementations Efficiently. IEEE Trans. Circuits Syst. II Express Briefs 60-II(8): 517-521 (2013) - [c31]Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang:
Improved Boomerang Attacks on SM3. ACISP 2013: 251-266 - [c30]Hongbo Yu, Jiazhe Chen, Xiaoyun Wang:
Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256. FSE 2013: 263-283 - [i31]Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE. IACR Cryptol. ePrint Arch. 2013: 573 (2013) - [i30]Zongyue Wang, Hongbo Yu, Xiaoyun Wang:
Cryptanalysis of GOST R Hash Function. IACR Cryptol. ePrint Arch. 2013: 584 (2013) - [i29]Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang:
Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256. IACR Cryptol. ePrint Arch. 2013: 852 (2013) - 2012
- [j7]Puwen Wei, Xiaoyun Wang, Yuliang Zheng:
Public key encryption without random oracle made truly practical. Comput. Electr. Eng. 38(4): 975-985 (2012) - [c29]Puwen Wei, Yuliang Zheng, Xiaoyun Wang:
Public Key Encryption for the Forgetful. Cryptography and Security 2012: 185-206 - [c28]Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen, Wei Li:
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia. FSE 2012: 90-109 - [c27]Jingguo Bi, Mingjie Liu, Xiaoyun Wang:
Cryptanalysis of a homomorphic encryption scheme from ISIT 2008. ISIT 2012: 2152-2156 - [c26]Keting Jia, Leibo Li, Christian Rechberger, Jiazhe Chen, Xiaoyun Wang:
Improved Cryptanalysis of the Block Cipher KASUMI. Selected Areas in Cryptography 2012: 222-233 - [c25]Hongbo Yu, Jiazhe Chen, Xiaoyun Wang:
The Boomerang Attacks on the Round-Reduced Skein-512. Selected Areas in Cryptography 2012: 287-303 - [e2]Xiaoyun Wang, Kazue Sako:
Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Lecture Notes in Computer Science 7658, Springer 2012, ISBN 978-3-642-34960-7 [contents] - [i28]Hongbo Yu, Jiazhe Chen, Xiaoyun Wang:
The Boomerang Attacks on the Round-Reduced Skein-512. IACR Cryptol. ePrint Arch. 2012: 238 (2012) - [i27]Wei Wei, Chengliang Tian, Xiaoyun Wang:
New Transference Theorems on Lattices Possessing nε-unique Shortest Vectors. IACR Cryptol. ePrint Arch. 2012: 293 (2012) - 2011
- [c24]Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang:
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. ACISP 2011: 16-33 - [c23]Hongbo Yu, Xiaoyun Wang:
Cryptanalysis of the Compression Function of SIMD. ACISP 2011: 157-171 - [c22]Xiaoyun Wang, Mingjie Liu, Chengliang Tian, Jingguo Bi:
Improved Nguyen-Vidick heuristic sieve algorithm for shortest vector problem. AsiaCCS 2011: 1-9 - [c21]Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang:
Practical Attack on the Full MMB Block Cipher. Selected Areas in Cryptography 2011: 185-199 - [e1]Dongdai Lin, Gene Tsudik, Xiaoyun Wang:
Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings. Lecture Notes in Computer Science 7092, Springer 2011, ISBN 978-3-642-25512-0 [contents] - [i26]Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang:
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. IACR Cryptol. ePrint Arch. 2011: 17 (2011) - [i25]Mingjie Liu, Xiaoyun Wang, Guangwu Xu, Xuexin Zheng:
Shortest Lattice Vectors in the Presence of Gaps. IACR Cryptol. ePrint Arch. 2011: 139 (2011) - [i24]Hongbo Yu, Jiazhe Chen, Keting Jia, Xiaoyun Wang:
Near-Collision Attack on the Step-Reduced Compression Function of Skein-256. IACR Cryptol. ePrint Arch. 2011: 148 (2011) - [i23]Puwen Wei, Yuliang Zheng, Xiaoyun Wang:
Public Key Encryption for the Forgetful. IACR Cryptol. ePrint Arch. 2011: 197 (2011) - [i22]Mingqiang Wang, Xiaoyun Wang, Tao Zhan:
Attack Cryptosystems Based on HCDLP. IACR Cryptol. ePrint Arch. 2011: 253 (2011) - [i21]Mingqiang Wang, Xiaoyun Wang, Tao Zhan:
The Fault Attack ECDLP Revisited. IACR Cryptol. ePrint Arch. 2011: 283 (2011) - [i20]Keting Jia, Hongbo Yu, Xiaoyun Wang:
A Meet-in-the-Middle Attack on the Full KASUMI. IACR Cryptol. ePrint Arch. 2011: 466 (2011) - [i19]Leibo Li, Jiazhe Chen, Xiaoyun Wang:
Multiplied Conditional Impossible Differential Attack on Reduced-Round Camellia. IACR Cryptol. ePrint Arch. 2011: 524 (2011) - 2010
- [j6]Meiqin Wang, Xiaoyun Wang, Lucas Chi Kwong Hui:
Differential-algebraic cryptanalysis of reduced-round of Serpent-256. Sci. China Inf. Sci. 53(3): 546-556 (2010) - [j5]Lidong Han, Xiaoyun Wang, Guangwu Xu:
On an attack on RSA with small CRT-exponents. Sci. China Inf. Sci. 53(8): 1511-1518 (2010) - [j4]Meiqin Wang, Xiaoyun Wang, Kam-Pui Chow, Lucas Chi Kwong Hui:
New Differential Cryptanalytic Results for Reduced-Round CAST-128. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(12): 2744-2754 (2010) - [c20]Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang:
Pseudo-Cryptanalysis of Luffa. Inscrypt 2010: 187-198 - [i18]Mingqiang Wang, Xiaoyun Wang, Tao Zhan, Yuliang Zheng:
Skew-Frobenius map on twisted Edwards curve. IACR Cryptol. ePrint Arch. 2010: 5 (2010) - [i17]Keting Jia, Jiazhe Chen, Meiqin Wang, Xiaoyun Wang:
Practical-time Attack on the Full MMB Block Cipher. IACR Cryptol. ePrint Arch. 2010: 211 (2010) - [i16]Hongbo Yu, Xiaoyun Wang:
Cryptanalysis of the Compression Function of SIMD. IACR Cryptol. ePrint Arch. 2010: 304 (2010) - [i15]Xiaoyun Wang, Mingjie Liu, Chengliang Tian, Jingguo Bi:
Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem. IACR Cryptol. ePrint Arch. 2010: 647 (2010)
2000 – 2009
- 2009
- [c19]Hongbo Yu, Xiaoyun Wang:
Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256. ACISP 2009: 185-201 - [c18]Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu:
Distinguishing and Second-Preimage Attacks on CBC-Like MACs. CANS 2009: 349-361 - [c17]Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiaoyun Wang:
New Birthday Attacks on Some MACs Based on Block Ciphers. CRYPTO 2009: 209-230 - [c16]Xiaoyun Wang, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan:
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. EUROCRYPT 2009: 121-133 - [c15]Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang:
New Distinguishing Attack on MAC Using Secret-Prefix Method. FSE 2009: 363-374 - [c14]Puwen Wei, Xiaoyun Wang, Yuliang Zheng:
Public Key Encryption without Random Oracle Made Truly Practical. ICICS 2009: 107-120 - [c13]Hongbo Yu, Xiaoyun Wang:
Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL. ISPEC 2009: 285-297 - [i14]Wei Wang, Xiaoyun Wang, Guangwu Xu:
Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES. IACR Cryptol. ePrint Arch. 2009: 5 (2009) - [i13]Haina Zhang, Xiaoyun Wang:
Cryptanalysis of Stream Cipher Grain Family. IACR Cryptol. ePrint Arch. 2009: 109 (2009) - [i12]Haina Zhang, Xiaoyun Wang:
On the Security of Stream Cipher CryptMT v3. IACR Cryptol. ePrint Arch. 2009: 110 (2009) - [i11]Hongbo Yu, Xiaoyun Wang:
Near-Collision Attack on the Compression Function of Dynamic SHA2. IACR Cryptol. ePrint Arch. 2009: 179 (2009) - [i10]Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang:
Pseudo-Cryptanalysis of Luffa. IACR Cryptol. ePrint Arch. 2009: 224 (2009) - [i9]Meiqin Wang, Xiaoyun Wang, Keting Jia, Wei Wang:
New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256. IACR Cryptol. ePrint Arch. 2009: 484 (2009) - 2008
- [j3]Haina Zhang, Lin Li, Xiaoyun Wang:
Fast correlation attack on stream cipher ABC v3. Sci. China Ser. F Inf. Sci. 51(7): 936-947 (2008) - [c12]Meiqin Wang, Xiaoyun Wang, Changhui Hu:
New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256. Selected Areas in Cryptography 2008: 429-441 - [i8]Zheng Yuan, Keting Jia, Wei Wang, Xiaoyun Wang:
Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC. IACR Cryptol. ePrint Arch. 2008: 516 (2008) - [i7]Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu:
Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs. IACR Cryptol. ePrint Arch. 2008: 542 (2008) - 2007
- [c11]Xiaoyun Wang:
Some Mathematical Problems in Cryptanalysis. ASCM 2007: 322 - [c10]Hongbo Yu, Xiaoyun Wang:
Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. ICISC 2007: 206-226 - [c9]Haina Zhang, Xiaoyun Wang:
Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4. ICISC 2007: 227-238 - [i6]Hongbo Yu, Xiaoyun Wang:
MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. IACR Cryptol. ePrint Arch. 2007: 85 (2007) - [i5]Wei Wang, Xiaoyun Wang:
Improved Impossible Differential Cryptanalysis of CLEFIA. IACR Cryptol. ePrint Arch. 2007: 466 (2007) - 2006
- [j2]Dengguo Feng, Xiaoyun Wang:
Progress and Prospect of Some Fundamental Research on Information Security in China. J. Comput. Sci. Technol. 21(5): 740-755 (2006) - [c8]Hongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park:
Cryptanalysis of the Full HAVAL with 4 and 5 Passes. FSE 2006: 89-110 - [i4]Haina Zhang, Shaohui Wang, Xiaoyun Wang:
The Probability Advantages of Two Linear Expressions in Symmetric Ciphers. IACR Cryptol. ePrint Arch. 2006: 242 (2006) - 2005
- [j1]Xiaoyun Wang, Dengguo Feng, Xiuyuan Yu:
An attack on hash function HAVAL-128. Sci. China Ser. F Inf. Sci. 48(5): 545-556 (2005) - [c7]Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang:
The Second-Preimage Attack on MD4. CANS 2005: 1-12 - [c6]Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin:
Efficient Collision Search Attacks on SHA-0. CRYPTO 2005: 1-16 - [c5]Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu:
Finding Collisions in the Full SHA-1. CRYPTO 2005: 17-36 - [c4]Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu:
Cryptanalysis of the Hash Functions MD4 and RIPEMD. EUROCRYPT 2005: 1-18 - [c3]Xiaoyun Wang, Hongbo Yu:
How to Break MD5 and Other Hash Functions. EUROCRYPT 2005: 19-35 - [c2]Xiaoyun Wang, Kefei Chen:
An efficient proxy signature scheme in home network DRM. ICETE 2005: 191-196 - [i3]Arjen K. Lenstra, Xiaoyun Wang, Benne de Weger:
Colliding X.509 Certificates. IACR Cryptol. ePrint Arch. 2005: 67 (2005) - 2004
- [i2]Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen:
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1. IACR Cryptol. ePrint Arch. 2004: 50 (2004) - [i1]Xiaoyun Wang, Dengguo Feng, Xuejia Lai, Hongbo Yu:
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. IACR Cryptol. ePrint Arch. 2004: 199 (2004) - 2000
- [c1]Xiaoyun Wang, Lucas Chi Kwong Hui, Kam-Pui Chow, Wai Wan Tsang, C. F. Chong, H. W. Chan:
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms. Public Key Cryptography 2000: 167-177
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-22 19:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint