Xiaoyun Wang

From MaRDI portal
(Redirected from Person:402351)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Heterogeneous and homogeneous extreme multistability in a dual-memristor FHN circuit considering magnetic and electric field effects
Chinese Journal of Physics (Taipei)
2026-04-02Paper
Generic MitM attack frameworks on sponge constructions
 
2024-12-13Paper
Accelerating BGV bootstrapping for large \(p\) using null polynomials over \(\mathbb{Z}_{p^e} \)
 
2024-11-12Paper
Exploiting the symmetry of \(\mathbb{Z}^n\): randomization and the automorphism problem
 
2024-09-13Paper
Automated meet-in-the-middle attack goes to Feistel
 
2024-08-30Paper
Compact lattice gadget and its applications to hash-and-sign signatures
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Exploring decryption failures of BIKE: new class of weak keys and key recovery attacks
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
Lattice-based cryptography: a survey
Chinese Annals of Mathematics. Series B
2024-01-04Paper
Meet-in-the-middle preimage attacks on sponge-based hashing
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials
Lecture Notes in Computer Science
2023-05-12Paper
Preimage attacks on 4-round Keccak by solving multivariate quadratic systems
 
2022-12-07Paper
On an attack on RSA with small CRT-exponents
Science China Information Sciences
2022-10-28Paper
Differential-algebraic cryptanalysis of reduced-round of Serpent-256
Science China Information Sciences
2022-10-28Paper
Key guessing strategies for linear key-schedule algorithms in rectangle attacks
 
2022-08-30Paper
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks
 
2022-04-22Paper
Computational aspects of lattices and their cryptographic applications
SCIENTIA SINICA Mathematica
2022-03-21Paper
Automatic search of meet-in-the-middle preimage attacks on AES-like hashing
 
2021-12-08Paper
Quantum attacks on some Feistel block ciphers
Designs, Codes and Cryptography
2020-05-21Paper
MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes
Designs, Codes and Cryptography
2019-05-24Paper
A key-recovery attack on 855-round Trivium
 
2018-09-26Paper
Conditional cube attack on round-reduced River Keyak
Designs, Codes and Cryptography
2018-05-24Paper
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques
Fast Software Encryption
2018-05-09Paper
Improved conditional cube attacks on Keccak keyed modes with MILP method
 
2018-04-06Paper
Conditional cube attack on reduced-round Keccak sponge function
Lecture Notes in Computer Science
2017-06-13Paper
Provably secure NTRU instances over prime cyclotomic rings
Lecture Notes in Computer Science
2017-06-13Paper
Cryptanalysis of a homomorphic encryption scheme over integers
Information Security and Cryptology
2017-05-05Paper
Linear hull attack on round-reduced Simeck with dynamic key-guessing techniques
Information Security and Privacy
2016-09-02Paper
Improved impossible differential attack on reduced-round LBlock
Information Security and Cryptology - ICISC 2015
2016-05-19Paper
Finding shortest lattice vectors in the presence of gaps
Lecture Notes in Computer Science
2016-03-02Paper
Improved attacks on reduced-round Camellia-128/192/256
Lecture Notes in Computer Science
2016-03-02Paper
The boomerang attacks on the round-reduced Skein-512
Selected Areas in Cryptography
2015-12-04Paper
Improved cryptanalysis of the block cipher KASUMI
Selected Areas in Cryptography
2015-12-04Paper
Mathematical foundations of public key cryptography
 
2015-10-07Paper
Partial-collision attack on the round-reduced compression function of Skein-256
Fast Software Encryption
2015-09-18Paper
Improved single-key attacks on 9-round AES-192/256
Fast Software Encryption
2015-09-18Paper
Meet-in-the-middle technique for truncated differential and its applications to CLEFIA and camellia
Fast Software Encryption
2015-09-18Paper
A note on BDD problems with \(\lambda_2\)-gap
Information Processing Letters
2015-06-25Paper
Cryptanalysis of GOST R hash function
Information Processing Letters
2014-08-28Paper
Fast correlation attack on stream cipher ABC v3
Science in China. Series F
2014-07-21Paper
Improved boomerang attacks on SM3
Information Security and Privacy
2013-06-28Paper
New observations on impossible differential cryptanalysis of reduced-round Camellia
Fast Software Encryption
2013-01-08Paper
Public key encryption without random oracle made truly practical
Computers and Electrical Engineering
2012-10-19Paper
On the equivalent keys in multivariate cryptosystems
Tsinghua Science and Technology
2012-10-05Paper
Practical attack on the full MMB block cipher
Selected Areas in Cryptography
2012-06-08Paper
Public key encryption for the forgetful
Cryptography and Security: From Theory to Applications
2012-06-08Paper
On the correlation of pseudorandom binary sequences using additive characters
Publicationes Mathematicae Debrecen
2011-12-20Paper
Pseudo-cryptanalysis of Luffa
Information Security and Cryptology
2011-07-29Paper
New impossible differential attacks of reduced-round Camellia-192 and Camellia-256
Information Security and Privacy
2011-07-07Paper
Cryptanalysis of the Compression Function of SIMD
Information Security and Privacy
2011-07-07Paper
Certificateless encryption scheme secure in standard model
Tsinghua Science and Technology
2010-11-05Paper
On the correlation of pseudorandom binary sequences with composite moduli
 
2009-12-28Paper
Large families of elliptic curve pseudorandom binary sequences
Acta Arithmetica
2009-12-08Paper
New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256
Selected Areas in Cryptography
2009-11-03Paper
New Birthday Attacks on Some MACs Based on Block Ciphers
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
New Distinguishing Attack on MAC Using Secret-Prefix Method
Fast Software Encryption
2009-08-11Paper
Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256
Information Security and Privacy
2009-06-25Paper
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Cryptanalysis of the Full HAVAL with 4 and 5 Passes
Fast Software Encryption
2009-04-02Paper
Cryptanalysis of the Hash Functions MD4 and RIPEMD
Lecture Notes in Computer Science
2008-05-06Paper
How to Break MD5 and Other Hash Functions
Lecture Notes in Computer Science
2008-05-06Paper
Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4
Lecture Notes in Computer Science
2008-05-06Paper
Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
Lecture Notes in Computer Science
2008-05-06Paper
Finding Collisions in the Full SHA-1
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
Efficient Collision Search Attacks on SHA-0
Advances in Cryptology – CRYPTO 2005
2008-03-17Paper
An attack on hash function HAVAL-128
Science in China. Series F
2007-02-20Paper
Cryptology and Network Security
Lecture Notes in Computer Science
2006-11-14Paper
scientific article; zbMATH DE number 1440056 (Why is no real title available?)
 
2001-10-03Paper
scientific article; zbMATH DE number 123847 (Why is no real title available?)
 
1993-02-18Paper


Research outcomes over time


This page was built for person: Xiaoyun Wang