


Остановите войну!
for scientists:


default search action
Xiaoyun Wang 0001
Person information

- affiliation: Shandong University, Key Laboratory of Cryptologic Technology and Information Security, China
- affiliation: Tsinghua University, Institute for Advanced Study, Beijing, China
Other persons with the same name
- Xiaoyun Wang — disambiguation page
- Xiaoyun Wang 0002 — Doshisha University, Kyoto, Japan
- Xiaoyun Wang 0003 — University of Toronto, Canada
- Xiaoyun Wang 0004
— Florida State University, Tallahassee, FL, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c60]Lingyue Qin
, Jialiang Hua
, Xiaoyang Dong
, Hailun Yan
, Xiaoyun Wang
:
Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing. EUROCRYPT (4) 2023: 158-188 - [i75]Lingyue Qin, Boxin Zhao, Jialiang Hua, Xiaoyang Dong, Xiaoyun Wang:
Weak-Diffusion Structure: Meet-in-the-Middle Attacks on Sponge-based Hashing Revisited. IACR Cryptol. ePrint Arch. 2023: 518 (2023) - 2022
- [j41]Xiaoyun Wang, Fei Wang, Hengyang Guo, Bo Liu:
Impact of Errors in Environmental Correction on Gravity Field Recovery Using Interferometric Radar Altimeter Observations. Remote. Sens. 14(24): 6299 (2022) - [j40]Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang:
Improved MITM Cryptanalysis on Streebog. IACR Trans. Symmetric Cryptol. 2022(2): 63-91 (2022) - [c59]Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang:
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. ASIACRYPT (1) 2022: 287-317 - [c58]Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang:
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks. EUROCRYPT (3) 2022: 3-33 - [c57]Brad Rees, Xiaoyun Wang, Joe Eaton, Onur Yilmaz, Rick Ratzel, Dominque LaSalle:
Accelerated GNN Training with DGL and RAPIDS cuGraph in a Fraud Detection Workflow. KDD 2022: 4820-4821 - [i74]Jialiang Hua, Xiaoyang Dong, Siwei Sun, Zhiyu Zhang, Lei Hu, Xiaoyun Wang:
Improved MITM Cryptanalysis on Streebog. IACR Cryptol. ePrint Arch. 2022: 568 (2022) - [i73]Lingyue Qin, Xiaoyang Dong, Anyu Wang, Jialiang Hua, Xiaoyun Wang:
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256. IACR Cryptol. ePrint Arch. 2022: 789 (2022) - [i72]Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang:
Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing. IACR Cryptol. ePrint Arch. 2022: 1714 (2022) - 2021
- [j39]Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu, Chunhuan Zhao:
Error estimation of practical convolution discrete Gaussian sampling with rejection sampling. Sci. China Inf. Sci. 64(3) (2021) - [j38]Ke Xu
, Xiaoyun Wang, Xinyang Liu, Changfeng Cao, Huolin Li, Haiyong Peng, Dong Wang
:
A dedicated hardware accelerator for real-time acceleration of YOLOv2. J. Real Time Image Process. 18(3): 481-492 (2021) - [j37]Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu:
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny. IACR Trans. Symmetric Cryptol. 2021(2): 249-291 (2021) - [c56]Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu:
Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials. ASIACRYPT (1) 2021: 241-271 - [c55]Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu:
Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks. CRYPTO (3) 2021: 278-308 - [c54]Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. EUROCRYPT (1) 2021: 771-804 - [c53]Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang:
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems. ICISC 2021: 195-216 - [i71]Xiaoyang Dong, Jialiang Hua, Siwei Sun, Zheng Li, Xiaoyun Wang, Lei Hu:
Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks. IACR Cryptol. ePrint Arch. 2021: 427 (2021) - [i70]Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu:
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny. IACR Cryptol. ePrint Arch. 2021: 656 (2021) - [i69]Congming Wei, Chenhao Wu, Ximing Fu, Xiaoyang Dong, Kai He, Jue Hong, Xiaoyun Wang:
Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems. IACR Cryptol. ePrint Arch. 2021: 732 (2021) - [i68]Xiaoyang Dong, Lingyue Qin, Siwei Sun, Xiaoyun Wang:
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks. IACR Cryptol. ePrint Arch. 2021: 856 (2021) - [i67]Xiaoyang Dong, Zhiyu Zhang, Siwei Sun, Congming Wei, Xiaoyun Wang, Lei Hu:
Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials. IACR Cryptol. ePrint Arch. 2021: 1119 (2021) - 2020
- [j36]Xiaoyang Dong
, Bingyou Dong, Xiaoyun Wang:
Quantum attacks on some feistel block ciphers. Des. Codes Cryptogr. 88(6): 1179-1203 (2020) - [j35]Congming Wei
, Jiazhe Chen, An Wang, Beibei Wang, Hongsong Shi, Xiaoyun Wang:
x-only coordinate: with application to secp256k1 " >Chosen base-point side-channel attack on Montgomery ladder with x-only coordinate: with application to secp256k1. IET Inf. Secur. 14(5): 483-492 (2020) - [c52]Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu:
Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories. ASIACRYPT (2) 2020: 727-757 - [i66]Zhenzhen Bao, Xiaoyang Dong, Jian Guo, Zheng Li, Danping Shi, Siwei Sun, Xiaoyun Wang:
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing. IACR Cryptol. ePrint Arch. 2020: 467 (2020) - [i65]Xiaoyang Dong, Siwei Sun, Danping Shi, Fei Gao, Xiaoyun Wang, Lei Hu:
Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories. IACR Cryptol. ePrint Arch. 2020: 1030 (2020)
2010 – 2019
- 2019
- [j34]Xiaoyang Dong, Zheng Li, Xiaoyun Wang:
Quantum cryptanalysis on some generalized Feistel schemes. Sci. China Inf. Sci. 62(2): 22501:1-22501:12 (2019) - [j33]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256. Sci. China Inf. Sci. 62(3): 32102:1-32102:12 (2019) - [j32]Yanbing Wu, Haining Fan, Xiaoyun Wang, Guangnan Zou:
A regulated digital currency. Sci. China Inf. Sci. 62(3): 32109:1-32109:12 (2019) - [j31]Wenquan Bi, Xiaoyang Dong
, Zheng Li, Rui Zong, Xiaoyun Wang:
MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes. Des. Codes Cryptogr. 87(6): 1271-1296 (2019) - [j30]Senyang Huang
, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao:
New Distinguisher on Reduced-Round Keccak Sponge Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 242-250 (2019) - [j29]Rui Zhang, Shenghong He, Xinghua Yang, Xiaoyun Wang, Kai Li, Qiyun Huang
, Zhuliang Yu
, Xichun Zhang, Dan Tang, Yuanqing Li
:
An EOG-Based Human-Machine Interface to Control a Smart Home Environment for Patients With Severe Spinal Cord Injuries. IEEE Trans. Biomed. Eng. 66(1): 89-100 (2019) - [j28]Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier:
New Conditional Cube Attack on Keccak Keyed Modes. IACR Trans. Symmetric Cryptol. 2019(2): 94-124 (2019) - [c51]Ke Xu
, Xiaoyun Wang, Dong Wang:
A Scalable OpenCL-Based FPGA Accelerator for YOLOv2. FCCM 2019: 317 - [i64]Xiaoyun Wang, Xuanqing Liu, Cho-Jui Hsieh:
GraphDefense: Towards Robust Graph Convolutional Networks. CoRR abs/1911.04429 (2019) - [i63]Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang, Willi Meier:
New Conditional Cube Attack on Keccak Keyed Modes. IACR Cryptol. ePrint Arch. 2019: 392 (2019) - [i62]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash. IACR Cryptol. ePrint Arch. 2019: 1115 (2019) - [i61]Chunhuan Zhao, Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu:
Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications. IACR Cryptol. ePrint Arch. 2019: 1231 (2019) - 2018
- [j27]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Impossible differential attack on Simpira v2. Sci. China Inf. Sci. 61(3): 032106:1-032106:13 (2018) - [j26]Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu, Yang Yu
:
Orthogonalized lattice enumeration for solving SVP. Sci. China Inf. Sci. 61(3): 32115:1-32115:15 (2018) - [j25]Yaoling Ding, Xiaoyun Wang, Ning Wang, Wei Wang:
Improved automatic search of impossible differentials for camellia with FL/FL -1 layers. Sci. China Inf. Sci. 61(3): 038103:1-038103:3 (2018) - [j24]Ning Wang, Xiaoyun Wang, Keting Jia, Jingyuan Zhao:
Differential attacks on reduced SIMON versions with dynamic key-guessing techniques. Sci. China Inf. Sci. 61(9): 098103:1-098103:3 (2018) - [j23]Xiaoyang Dong, Xiaoyun Wang:
Quantum key-recovery attack on Feistel structures. Sci. China Inf. Sci. 61(10): 102501:1-102501:7 (2018) - [j22]Wenquan Bi, Zheng Li, Xiaoyang Dong
, Lu Li, Xiaoyun Wang:
Conditional cube attack on round-reduced River Keyak. Des. Codes Cryptogr. 86(6): 1295-1310 (2018) - [j21]Zhihui Chu, Huaifeng Chen, Xiaoyun Wang, Lu Li, Xiaoyang Dong, Yaoling Ding, Yonglin Hao:
Improved integral attacks without full codebook. IET Inf. Secur. 12(6): 513-520 (2018) - [j20]Zhihui Chu
, Huaifeng Chen
, Xiaoyun Wang
, Xiaoyang Dong
, Lu Li
:
Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques. Secur. Commun. Networks 2018: 5160237:1-5160237:11 (2018) - [j19]Dan Li, Jiazhe Chen, An Wang, Xiaoyun Wang:
Analysis of Software Implemented Low Entropy Masking Schemes. Secur. Commun. Networks 2018: 7206835:1-7206835:8 (2018) - [c50]Ke Xu
, Xiaoyun Wang, Shihang Fu, Dong Wang:
A Scalable FPGA Accelerator for Convolutional Neural Networks. ACA 2018: 3-14 - [c49]Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier:
A Key-Recovery Attack on 855-round Trivium. CRYPTO (2) 2018: 160-184 - [c48]Xiaoyun Wang, Chun-Ming Lai
, Yu-Cheng Lin, Cho-Jui Hsieh, Shyhtsun Felix Wu, Hasan Cam:
Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on Graphs. MILCOM 2018: 1-9 - [i60]Xiaoyun Wang, Chun-Ming Lai, Yunfeng Hong, Cho-Jui Hsieh, Shyhtsun Felix Wu:
Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on Graphs. CoRR abs/1801.09838 (2018) - [i59]Chun-Ming Lai, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, Shyhtsun Felix Wu, Patrick D. McDaniel, Hasan Cam:
Attacking Strategies and Temporal Analysis Involving Facebook Discussion Groups. CoRR abs/1802.04500 (2018) - [i58]Xiaoyun Wang, Joe Eaton, Cho-Jui Hsieh, Shyhtsun Felix Wu:
Attack Graph Convolutional Networks by Adding Fake Nodes. CoRR abs/1810.10751 (2018) - [i57]Chun-Ming Lai, Xiaoyun Wang, Jon William Chapman, Yu-Cheng Lin, Yu-Chang Ho, Shyhtsun Felix Wu, Patrick D. McDaniel, Hasan Cam:
More or Less? Predict the Social Influence of Malicious URLs on Social Media. CoRR abs/1812.02978 (2018) - [i56]Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, Xiaoyun Wang:
MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes. IACR Cryptol. ePrint Arch. 2018: 75 (2018) - [i55]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC. IACR Cryptol. ePrint Arch. 2018: 142 (2018) - [i54]Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier:
A Key-recovery Attack on 855-round Trivium. IACR Cryptol. ePrint Arch. 2018: 198 (2018) - [i53]Xiaoyang Dong, Bingyou Dong, Xiaoyun Wang:
Quantum Attacks on Some Feistel Block Ciphers. IACR Cryptol. ePrint Arch. 2018: 504 (2018) - [i52]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256. IACR Cryptol. ePrint Arch. 2018: 680 (2018) - [i51]Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier, Yonglin Hao, Boxin Zhao:
A Refinement of "A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018. IACR Cryptol. ePrint Arch. 2018: 999 (2018) - 2017
- [j18]Guangyi Liu, Xueying Hou
, Jing Jin, Fei Wang, Qixing Wang, Yue Hao, Yuhong Huang, Xiaoyun Wang, Xiao Xiao, Ailin Deng:
3-D-MIMO With Massive Antennas Paves the Way to 5G Enhanced Mobile Broadband: From System Design to Field Trials. IEEE J. Sel. Areas Commun. 35(6): 1222-1233 (2017) - [j17]Zheng Li, Xiaoyang Dong, Xiaoyun Wang:
Conditional Cube Attack on Round-Reduced ASCON. IACR Trans. Symmetric Cryptol. 2017(1): 175-202 (2017) - [j16]Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin:
Cube-like Attack on Round-Reduced Initialization of Ketje Sr. IACR Trans. Symmetric Cryptol. 2017(1): 259-280 (2017) - [c47]Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang:
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method. ASIACRYPT (1) 2017: 99-127 - [c46]Chun-Ming Lai
, Xiaoyun Wang, Yunfeng Hong, Yu-Cheng Lin, Shyhtsun Felix Wu, Patrick D. McDaniel, Hasan Cam:
Attacking strategies and temporal analysis involving Facebook discussion groups. CNSM 2017: 1-9 - [c45]Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao:
Conditional Cube Attack on Reduced-Round Keccak Sponge Function. EUROCRYPT (2) 2017: 259-288 - [c44]Yang Yu
, Guangwu Xu, Xiaoyun Wang:
Provably Secure NTRU Instances over Prime Cyclotomic Rings. Public Key Cryptography (1) 2017: 409-434 - [i50]Xiaoyang Dong, Zheng Li, Xiaoyun Wang, Ling Qin:
Cube-like Attack on Round-Reduced Initialization of Ketje Sr. IACR Cryptol. ePrint Arch. 2017: 159 (2017) - [i49]Zheng Li, Xiaoyang Dong, Xiaoyun Wang:
Conditional Cube Attack on Round-Reduced ASCON. IACR Cryptol. ePrint Arch. 2017: 160 (2017) - [i48]Yang Yu, Guangwu Xu, Xiaoyun Wang:
Provably Secure NTRUEncrypt over More General Cyclotomic Rings. IACR Cryptol. ePrint Arch. 2017: 304 (2017) - [i47]Ximing Fu, Xiaoyun Wang, Jiazhe Chen:
Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently. IACR Cryptol. ePrint Arch. 2017: 412 (2017) - [i46]Zhongxiang Zheng, Chunhuan Zhao, Haining Fan, Xiaoyun Wang:
A Key Backup Scheme Based on Bitcoin. IACR Cryptol. ePrint Arch. 2017: 704 (2017) - [i45]Zheng Li, Wenquan Bi, Xiaoyang Dong, Xiaoyun Wang:
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method. IACR Cryptol. ePrint Arch. 2017: 804 (2017) - [i44]Wenquan Bi, Zheng Li, Xiaoyang Dong, Lu Li, Xiaoyun Wang:
Conditional Cube Attack on Round-Reduced River Keyak. IACR Cryptol. ePrint Arch. 2017: 1012 (2017) - [i43]Xiaoyang Dong, Xiaoyun Wang:
Quantum Key-recovery Attack on Feistel Structures. IACR Cryptol. ePrint Arch. 2017: 1199 (2017) - [i42]Xiaoyang Dong, Zheng Li, Xiaoyun Wang:
Quantum Cryptanalysis on Some Generalized Feistel Schemes. IACR Cryptol. ePrint Arch. 2017: 1249 (2017) - 2016
- [j15]Xiaoyang Dong, Xiaoyun Wang:
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes. IACR Trans. Symmetric Cryptol. 2016(1): 13-32 (2016) - [c43]Lingyue Qin, Huaifeng Chen, Xiaoyun Wang:
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques. ACISP (2) 2016: 409-424 - [c42]Jingguo Bi, Jiayang Liu, Xiaoyun Wang:
Cryptanalysis of a Homomorphic Encryption Scheme Over Integers. Inscrypt 2016: 243-252 - [c41]Huaifeng Chen, Xiaoyun Wang:
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques. FSE 2016: 428-449 - [c40]Zhan Chen, Huaifeng Chen, Xiaoyun Wang:
Cryptanalysis of Midori128 Using Impossible Differential Techniques. ISPEC 2016: 1-12 - [i41]Xiaoyang Dong, Xiaoyun Wang:
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes. IACR Cryptol. ePrint Arch. 2016: 509 (2016) - [i40]Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao:
Conditional Cube Attack on Reduced-Round Keccak Sponge Function. IACR Cryptol. ePrint Arch. 2016: 790 (2016) - [i39]Zhongxiang Zheng, Xiaoyun Wang, Yang Yu:
Orthogonalized Lattice Enumeration for Solving SVP. IACR Cryptol. ePrint Arch. 2016: 950 (2016) - [i38]Rui Zong, Xiaoyang Dong, Xiaoyun Wang:
Impossible Differential Attack on Simpira v2. IACR Cryptol. ePrint Arch. 2016: 1161 (2016) - 2015
- [j14]Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang:
Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256. IET Inf. Secur. 9(3): 167-178 (2015) - [c39]Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Attacks on Reduced-Round Camellia-128/192/256. CT-RSA 2015: 59-83 - [c38]Wei Wei, Mingjie Liu, Xiaoyun Wang:
Finding Shortest Lattice Vectors in the Presence of Gaps. CT-RSA 2015: 239-257 - [c37]Leibo Li, Keting Jia, Xiaoyun Wang, Xiaoyang Dong:
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia. FSE 2015: 48-70 - [c36]Dan Ding, Guizhen Zhu, Xiaoyun Wang:
A Genetic Algorithm for Searching the Shortest Lattice Vector of SVP Challenge. GECCO 2015: 823-830 - [c35]Ning Wang, Xiaoyun Wang, Keting Jia:
Improved Impossible Differential Attack on Reduced-Round LBlock. ICISC 2015: 136-152 - [i37]Zhan Chen, Ning Wang, Xiaoyun Wang:
Impossible Differential Cryptanalysis of Reduced Round SIMON. IACR Cryptol. ePrint Arch. 2015: 286 (2015) - [i36]Huaifeng Chen, Xiaoyun Wang:
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques. IACR Cryptol. ePrint Arch. 2015: 666 (2015) - [i35]Xiaoyang Dong, Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Attacks on Reduced-Round Camellia-128/192/256. IACR Cryptol. ePrint Arch. 2015: 896 (2015) - 2014
- [j13]Xiaoyun Wang, Lijuan Wei, Juan Zhang:
Dynamical analysis and perturbation solution of an SEIR epidemic model. Appl. Math. Comput. 232: 479-486 (2014) - [j12]Wei Wei, Chengliang Tian, Xiaoyun Wang:
New transference theorems on lattices possessing n∈-unique shortest vectors. Discret. Math. 315-316: 144-155 (2014) - [j11]Mingjie Liu, Xiaoyun Wang, Guangwu Xu, Xuexin Zheng:
A note on BDD problems with λ2-gap. Inf. Process. Lett. 114(1-2): 9-12 (2014) - [j10]Zongyue Wang, Hongbo Yu, Xiaoyun Wang:
Cryptanalysis of GOST R hash function. Inf. Process. Lett. 114(12): 655-662 (2014) - [c34]Jian Liu, Bo Liu, Guangning Nie, Bowei Wang, Xuan Feng, Xiaoyun Wang:
Regional homogeneity change in female depressive patients after abdominal acupuncture treatment. BIBM 2014: 100-107 - [c33]Jian Liu, Xiaoyu Li, Yuchuan Zhang, Jingjing Dun, Xiaoyun Wang:
A study on monoamine neurotransmitters in ovariectomized female rats with different Chinese herbs treatment. BIBM 2014: 108-111 - [c32]Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Single-Key Attacks on 9-Round AES-192/256. FSE 2014: 127-146 - [i34]Ning Wang, Xiaoyun Wang, Keting Jia, Jingyuan Zhao:
Improved Differential Attacks on Reduced SIMON Versions. IACR Cryptol. ePrint Arch. 2014: 448 (2014) - [i33]Dan Ding, Guizhen Zhu, Xiaoyun Wang:
A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge. IACR Cryptol. ePrint Arch. 2014: 489 (2014) - [i32]Jingyuan Zhao, Xiaoyun Wang, Meiqin Wang, Xiaoyang Dong:
Differential Analysis on Block Cipher PRIDE. IACR Cryptol. ePrint Arch. 2014: 525 (2014) - 2013
- [j9]Xiaoyun Wang, Li Wang, Yunjin Wu:
Novel results for a class of singular perturbed slow-fast system. Appl. Math. Comput. 225: 795-806 (2013) - [j8]An Wang, Man Chen, Zongyue Wang, Xiaoyun Wang:
Fault Rate Analysis: Breaking Masked AES Hardware Implementations Efficiently. IEEE Trans. Circuits Syst. II Express Briefs 60-II(8): 517-521 (2013) - [c31]Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang:
Improved Boomerang Attacks on SM3. ACISP 2013: 251-266 - [c30]Hongbo Yu, Jiazhe Chen, Xiaoyun Wang:
Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256. FSE 2013: 263-283 - [i31]Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE. IACR Cryptol. ePrint Arch. 2013: 573 (2013) - [i30]Zongyue Wang, Hongbo Yu, Xiaoyun Wang:
Cryptanalysis of GOST R Hash Function. IACR Cryptol. ePrint Arch. 2013: 584 (2013) - [i29]Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang:
Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256. IACR Cryptol. ePrint Arch. 2013: 852 (2013) - 2012
- [j7]Puwen Wei, Xiaoyun Wang, Yuliang Zheng
:
Public key encryption without random oracle made truly practical. Comput. Electr. Eng. 38(4): 975-985 (2012) - [c29]Puwen Wei, Yuliang Zheng
, Xiaoyun Wang:
Public Key Encryption for the Forgetful. Cryptography and Security 2012: 185-206 - [c28]Ya Liu, Leibo Li, Dawu Gu, Xiaoyun Wang, Zhiqiang Liu, Jiazhe Chen, Wei Li:
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia. FSE 2012: 90-109 - [c27]Jingguo Bi, Mingjie Liu, Xiaoyun Wang:
Cryptanalysis of a homomorphic encryption scheme from ISIT 2008. ISIT 2012: 2152-2156 - [c26]Keting Jia, Leibo Li, Christian Rechberger, Jiazhe Chen, Xiaoyun Wang:
Improved Cryptanalysis of the Block Cipher KASUMI. Selected Areas in Cryptography 2012: 222-233 - [c25]Hongbo Yu, Jiazhe Chen, Xiaoyun Wang:
The Boomerang Attacks on the Round-Reduced Skein-512. Selected Areas in Cryptography 2012: 287-303 - [e2]Xiaoyun Wang, Kazue Sako:
Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Lecture Notes in Computer Science 7658, Springer 2012, ISBN 978-3-642-34960-7 [contents] - [i28]Hongbo Yu, Jiazhe Chen, Xiaoyun Wang:
The Boomerang Attacks on the Round-Reduced Skein-512. IACR Cryptol. ePrint Arch. 2012: 238 (2012) - [i27]Wei Wei, Chengliang Tian, Xiaoyun Wang:
New Transference Theorems on Lattices Possessing nε-unique Shortest Vectors. IACR Cryptol. ePrint Arch. 2012: 293 (2012) - 2011
- [c24]Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang:
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. ACISP 2011: 16-33 - [c23]Hongbo Yu, Xiaoyun Wang:
Cryptanalysis of the Compression Function of SIMD. ACISP 2011: 157-171 - [c22]