当前位置: 首页 >> ENGLISH >> Academic staff >> 正文

Publications:

  1. Xiaoyun Wang, Mingjie Liu, Chengliang Tian and Jingguo Bi, Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem, AISACCS 2011.
  2. Lidong Han, Xiaoyun Wang, Gusangwu Xu,On an Attack on RSA with Small CRT-Exponents,Science China Information Sciences,vol.53, No.8, 1511-1518.
  3. Meiqin Wang, Xiaoyun Wang, Lucas C.K. Hui, Differential-algebraic cryptanalysis of reduced-round of Serpent-256, Science China Information Sciences, vol.53, No.3, 546-556.
  4. Meiqin Wang, Xiaoyun Wang, Chow K.P, Hui Lucas C.K, New Differential Cryptanalytic Results for Reduced-Round CAST-128, Journal of IEICE,Vol.E93-A,No.12
  5. Keting Jia, Yvo Desmedt, Lidong Han, Xiaoyun Wang, Pseudo-Cryptanalysis of Luffa, Inscrypt 2010, LNCS.
  6. Mingqiang Wang, Xiaoyun Wang, Tao Zhan, Yuliang Zheng, Skew-Frobenius map on twisted Edwards curve, ICIC-Letter.
  7. Xiaoyun Wang, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan, Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC, Advances in Cryptology-Eurocrypt 2009, LNCS 5479, 2009, pp. 121-133.
  8. Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang, New Distinguishing Attack on MAC using Secret-Prefix Method, FSE 2009, LNCS 5665, 2009, pp363-374.
  9. Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiaoyun Wang, New Birthday Attacks on Some MACs Based on Block Ciphers, Advances in Cryptology-Crypto 2009, LNCS 5677, 2009, pp. 209-230.
  10. Puwen Wei, Xiaoyun Wang, Yuliang Zheng: Public Key Encryption without Random Oracle Made Truly Practical. ICICS 2009, LNCS 5927, pp. 107-120
  11. Hongbo Yu, Xiaoyun Wang, Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-pass HAVAL, ISPEC 2009, LNCS 5451, 2009, pp. 285-297.
  12. Hongbo Yu, Xiaoyun Wang, Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256, ACISP 2009, LNCS 5594, 2009, pp. 185-201.
  13. Keting Jia, Xiaoyun Wang, Zheng Yuan, Guangwu Xu.: Distinguishing and Second-Preimage Attacks on CBC-Like MACs. In: J.A. Garay, A. Miyaji, and A. Otsuka (Eds.) CANS 2009, LNCS 5888, pp. 349–361, Springer, Heidelberg(2009).
  14. Haina Zhang, Lin Li, Xiaoyun Wang: Fast correlation attack on stream cipher ABC v3. Science in China Series F: Information Sciences 51(7): 936-947 (2008)
  15. Mingqiang Wang, Xiaoyun Wang, Guangwu Xu, Lidong Han, Fast Scalar Multiplication on a Family of Supersingular Curves over , Inscrypt 2008.
  16. Meiqin Wang, Xiaoyun Wang, Changhui Hu, Near Linear Cryptanlytic Results of Reduced-Round of CAST-128 and CAST-256, SAC 2008, LNCS 5381, pp. 429-441
  17. Hongbo Yu, Xiaoyun Wang, Multi-collision Attack on the Compression Function of MA4 and 3-Pass Haval, ICISC 2007, LNCS 4817, pp.206-226, 2007.
  18. Haina Zhang, Xiaoyun Wang, Differential Crayptanalysis of T-function Based Stream Cipher TSC-4, ICISC 2007, LNCS 4817, pp.227-238, 2007
  19. Hongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park, Cryptanalysis of the Full HAVAL with 4 and 5 Passes, Fast Software Encryption 06, LNCS 4047, pp. 89-110, 2006.
  20. Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin, Efficient Collision Search Attacks on SHA-0, Advances in Cryptology-Crypto 05, LNCS 3621: 1-16, 2005.
  21. Xiaoyun Wang, Yiqun Yin, Hongbo Yu, Finding Collisions in the Full SHA-1, Advances in Cryptology-Crypto 05, LNCS 3621: 17-36, 2005.
  22. Xiaoyun Wang, Yiqun Yin, Hongbo Yu, Collision Search Attacks on SHA1, http://theory.csail.mit.edu/yiqun/shanote.pdf, 2005.
  23. Arjen Lenstra, Xiaoyun Wang, Benne de Weger, Colliding X.509 Certificates, Cryptology ePrint Archive,Report 2005/067,http://eprint.iacr.org/2005/067, 2005.
  24. Xiaoyun Wang, Xuejia Lai etc, Cryptanalysis of the Hash Functions MD4 and RIPEMD, Advances in Cryptology-Eurocrypt 05, LNCS3494:18-36, 2005.
  25. Xiaoyun Wang, Hongbo Yu, How to Break MD5 and Other Hash Functions, Advances in Cryptology-Eurocrypt 05, LNCS 3494:1-18, 2005.
  26. Xiaoyun Wang etc, An Attack on Hash Function HAVAL-128, Science in China, Series E, 35(4): 405-416, 2005.
  27. Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang, The Second–Preimage Attack on MD4. Cryptology and Network Security 05, LNCS 3810, pp. 1–12, 2005.
  28. Xiaoyun Wang, Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD, Crypto'04,http://eprint.iacr.org/2004/199.pdf,2004.
  29. L. C. K. Hui, Xiaoyun Wang etc, The Differential Analysis of Reduced Skipjack Variants, Advance in Cryptography--CHINACRYPT'2002, Science Publishing House, 77-87, 2002.
  30. Xiaoyun Wang, L. C. K. Hui etc, Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms, Public Key Cryptography, LNCS 1751, 167-177, 2000.
  31. Xiaoyun Wang, L. C. K. Hui etc, The Differential Cryptanalysis of an AES Finalist-Serpent, Technical Report TR-2000-04, 2000.
  32. Xiaoyun Wang, The Improved Collision attack on SHA-0 (Chinese version), 1998.
  33. Xiaoyun Wang, The Collision attack on SHA-0 (Chinese version), 1997.

 

(Go to Previous Page)
 
 

上一页 [1] [2]