The following pages link to Xiaoyun Wang (Q402351):
Displaying 50 items.
- Cryptanalysis of GOST R hash function (Q402352) (← links)
- Public key encryption without random oracle made truly practical (Q714193) (← links)
- An attack on hash function HAVAL-128 (Q866177) (← links)
- Conditional cube attack on round-reduced River Keyak (Q1752548) (← links)
- A key-recovery attack on 855-round Trivium (Q1784086) (← links)
- Automatic search of meet-in-the-middle preimage attacks on AES-like hashing (Q2056714) (← links)
- Preimage attacks on 4-round Keccak by solving multivariate quadratic systems (Q2104437) (← links)
- Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks (Q2129000) (← links)
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks (Q2170076) (← links)
- Quantum attacks on some Feistel block ciphers (Q2182081) (← links)
- Fast correlation attack on stream cipher ABC v3 (Q2250730) (← links)
- A note on BDD problems with \(\lambda_2\)-gap (Q2350585) (← links)
- Improved conditional cube attacks on Keccak keyed modes with MILP method (Q2412869) (← links)
- MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes (Q2416936) (← links)
- Improved Attacks on Reduced-Round Camellia-128/192/256 (Q2790031) (← links)
- Finding Shortest Lattice Vectors in the Presence of Gaps (Q2790044) (← links)
- Improved Impossible Differential Attack on Reduced-Round LBlock (Q2806767) (← links)
- Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques (Q2817827) (← links)
- Public Key Encryption for the Forgetful (Q2889762) (← links)
- Practical Attack on the Full MMB Block Cipher (Q2889870) (← links)
- On the equivalent keys in multivariate cryptosystems (Q2917180) (← links)
- Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256 (Q2946882) (← links)
- Improved Single-Key Attacks on 9-Round AES-192/256 (Q2946906) (← links)
- Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia (Q2946934) (← links)
- Mathematical Foundations of Public Key Cryptography (Q2949160) (← links)
- Cryptanalysis of a Homomorphic Encryption Scheme Over Integers (Q2980858) (← links)
- New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256 (Q3012973) (← links)
- Cryptanalysis of the Compression Function of SIMD (Q3012985) (← links)
- Pseudo-Cryptanalysis of Luffa (Q3019925) (← links)
- Certificateless encryption scheme secure in standard model (Q3054274) (← links)
- On the correlation of pseudorandom binary sequences using additive characters (Q3106351) (← links)
- New Birthday Attacks on Some MACs Based on Block Ciphers (Q3183566) (← links)
- New Distinguishing Attack on MAC Using Secret-Prefix Method (Q3391582) (← links)
- Improved Cryptanalysis of the Block Cipher KASUMI (Q3455501) (← links)
- The Boomerang Attacks on the Round-Reduced Skein-512 (Q3455506) (← links)
- Cryptanalysis of the Full HAVAL with 4 and 5 Passes (Q3618646) (← links)
- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC (Q3627431) (← links)
- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 (Q3634493) (← links)
- New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256 (Q3644220) (← links)
- Large families of elliptic curve pseudorandom binary sequences (Q3651113) (← links)
- (Q3653719) (← links)
- (Q4025542) (← links)
- Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques (Q4639492) (← links)
- New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia (Q4899698) (← links)
- (Q4950043) (← links)
- Differential-algebraic cryptanalysis of reduced-round of Serpent-256 (Q5046384) (← links)
- On an attack on RSA with small CRT-exponents (Q5046436) (← links)
- Computational aspects of lattices and their cryptographic applications (Q5064138) (← links)
- Improved Boomerang Attacks on SM3 (Q5300949) (← links)
- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL (Q5385522) (← links)