Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Xiaoyun Wang
Search web for home page
Program Committees
1
2012
Eurocrypt
pc
2
2012
Asiacrypt
pc chair
3
2011
Asiacrypt
pc chair
4
2007
Eurocrypt
pc
5
2007
PKC
pc chair
6
2005
Asiacrypt
pc
Publications
year
title
booktitle
pages
1
2012
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia
fse
90-109
2
2010
Practical-time Attack on the Full MMB Block Cipher
eprint
online
3
2010
Skew-Frobenius map on twisted Edwards curve
eprint
online
4
2010
Cryptanalysis of the Compression Function of SIMD
eprint
online
5
2009
New Birthday Attacks on Some MACs Based on Block Ciphers
crypto
209-230
6
2009
Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES
eprint
online
7
2009
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
eurocrypt
121-133
8
2009
New Distinguishing Attack on MAC Using Secret-Prefix Method
fse
363-374
9
2008
Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs
eprint
online
10
2008
Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC
eprint
online
11
2007
MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
eprint
online
12
2007
Improved Impossible Differential Cryptanalysis of CLEFIA
eprint
online
13
2006
Cryptanalysis of the Full HAVAL with 4 and 5 Passes
fse
online
14
2006
The Probability Advantages of Two Linear Expressions in Symmetric Ciphers
eprint
online
15
2005
Efficient Collision Search Attacks on SHA-0
crypto
online
16
2005
Finding Collisions in the Full SHA-1
crypto
online
17
2005
Cryptanalysis of the Hash Functions MD4 and RIPEMD
eurocrypt
online
18
2005
How to Break MD5 and Other Hash Functions
eurocrypt
online
19
2005
Colliding X.509 Certificates
eprint
online
20
2004
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
eprint
online
21
2004
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1
eprint
online
22
2000
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms
pkc
167-177
Coauthors of Xiaoyun Wang
Ya Liu 0001
Wei Li 0013
H. W. Chan
Jiazhe Chen
Hui Chen
Kefei Chen
C. F. Chong
K. P. Chow
Dengguo Feng
Dawu Gu
Lucas C.K. Hui
Keting Jia
Xuejia Lai
Arjen K. Lenstra
Leibo Li
Zhiqiang Liu
Sangwoo Park
Wai Wan Tsang
Shaohui Wang
Mingqiang Wang
Meiqin Wang
Wei Wang
Benne de Weger
Guangwu Xu
Lizhen Yang
Yiqun Lisa Yin
Hongbo Yu
Xiuyuan Yu
Zheng Yuan
Aaram Yun
Tao Zhan
Haina Zhang
Yuliang Zheng
Dong Zheng