What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xiaoyun Wang
Google Scholar
66
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/joc
Exploiting the Symmetry of $\mathbb {Z}^n$: Randomization and the Automorphism Problem.
Kaijie Jiang
Anyu Wang
Hengyi Luo
Guoxiao Liu
Yang Yu
Xiaoyun Wang
2025
conf/ndss
Safety Misalignment Against Large Language Models.
Yichen Gong
Delong Ran
Xinlei He
Tianshuo Cong
Anyu Wang
Xiaoyun Wang
2025
conf/pkc
Thorough Power Analysis on Falcon Gaussian Samplers and Practical Countermeasure.
Xiuhan Lin
Shiduo Zhang
Yang Yu
Weijia Wang
Qidi You
Ximing Xu
Xiaoyun Wang
2025
conf/eurocrypt
Re-randomize and Extract: A Novel Commitment Construction Framework Based on Group Actions.
Kaijie Jiang
Anyu Wang
Hengyi Luo
Guoxiao Liu
Tang Gang
Yanbin Pan
Xiaoyun Wang
2024
journals/tches
Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation.
Shihe Ma
Tairong Huang
Anyu Wang
Qixian Zhou
Xiaoyun Wang
2024
conf/ccs
Unbalanced Private Set Union with Reduced Computation and Communication.
Cong Zhang
Yu Chen
Weiran Liu
Liqiang Peng
Meng Hao
Anyu Wang
Xiaoyun Wang
2024
conf/acisp
Approximate Methods for the Computation of Step Functions in Homomorphic Encryption.
Tairong Huang
Shihe Ma
Anyu Wang
Xiaoyun Wang
2024
conf/crypto
Generic MitM Attack Frameworks on Sponge Constructions.
Xiaoyang Dong
Boxin Zhao
Lingyue Qin
Qingliang Hou
Shun Zhang
Xiaoyun Wang
2024
conf/eurocrypt
Accelerating BGV Bootstrapping for Large p Using Null Polynomials over $\mathbb {Z}_{p^e}$.
Shihe Ma
Tairong Huang
Anyu Wang
Xiaoyun Wang
2024
conf/asiacrypt
Hard-Label Cryptanalytic Extraction of Neural Network Models.
Yi Chen
Xiaoyang Dong
Jian Guo
Yantian Shen
Anyu Wang
Xiaoyun Wang
2024
conf/asiacrypt
Faster BGV Bootstrapping for Power-of-Two Cyclotomics Through Homomorphic NTT.
Shihe Ma
Tairong Huang
Anyu Wang
Xiaoyun Wang
2023
journals/tches
Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers.
Qingyuan Yu
Xiaoyang Dong
Lingyue Qin
Yongze Kang
Keting Jia
Xiaoyun Wang
Guoyan Zhang
2023
conf/crypto
Compact Lattice Gadget and Its Applications to Hash-and-Sign Signatures.
Yang Yu
Huiwen Jia
Xiaoyun Wang
2023
conf/crypto
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks.
Tianrui Wang
Anyu Wang
Xiaoyun Wang
2023
conf/eurocrypt
Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing.
Lingyue Qin
Jialiang Hua
Xiaoyang Dong
Hailun Yan
Xiaoyun Wang
2023
conf/asiacrypt
Automated Meet-in-the-Middle Attack Goes to Feistel.
Qingliang Hou
Xiaoyang Dong
Lingyue Qin
Guoyan Zhang
Xiaoyun Wang
2023
conf/asiacrypt
Exploiting the Symmetry of $\mathbb {Z}^n$: Randomization and the Automorphism Problem.
Kaijie Jiang
Anyu Wang
Hengyi Luo
Guoxiao Liu
Yang Yu
Xiaoyun Wang
2022
journals/tosc
Improved MITM Cryptanalysis on Streebog.
Jialiang Hua
Xiaoyang Dong
Siwei Sun
Zhiyu Zhang
Lei Hu
Xiaoyun Wang
2022
conf/eurocrypt
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks.
Xiaoyang Dong
Lingyue Qin
Siwei Sun
Xiaoyun Wang
2022
conf/asiacrypt
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256.
Lingyue Qin
Xiaoyang Dong
Anyu Wang
Jialiang Hua
Xiaoyun Wang
2021
journals/tosc
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny.
Lingyue Qin
Xiaoyang Dong
Xiaoyun Wang
Keting Jia
Yunwen Liu
2021
conf/crypto
Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks.
Xiaoyang Dong
Jialiang Hua
Siwei Sun
Zheng Li
Xiaoyun Wang
Lei Hu
2021
conf/icisc
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems.
Congming Wei
Chenhao Wu
Ximing Fu
Xiaoyang Dong
Kai He
Jue Hong
Xiaoyun Wang
2021
conf/eurocrypt
Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.
Zhenzhen Bao
Xiaoyang Dong
Jian Guo
Zheng Li
Danping Shi
Siwei Sun
Xiaoyun Wang
2021
conf/asiacrypt
Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials.
Xiaoyang Dong
Zhiyu Zhang
Siwei Sun
Congming Wei
Xiaoyun Wang
Lei Hu
2020
conf/asiacrypt
Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories.
Xiaoyang Dong
Siwei Sun
Danping Shi
Fei Gao
Xiaoyun Wang
Lei Hu
2019
journals/tosc
New Conditional Cube Attack on Keccak Keyed Modes.
Zheng Li
Xiaoyang Dong
Wenquan Bi
Keting Jia
Xiaoyun Wang
Willi Meier
2018
conf/crypto
A Key-Recovery Attack on 855-round Trivium.
Ximing Fu
Xiaoyun Wang
Xiaoyang Dong
Willi Meier
2017
journals/tosc
Cube-like Attack on Round-Reduced Initialization of Ketje Sr.
Xiaoyang Dong
Zheng Li
Xiaoyun Wang
Ling Qin
2017
journals/tosc
Conditional Cube Attack on Round-Reduced ASCON.
Zheng Li
Xiaoyang Dong
Xiaoyun Wang
2017
conf/pkc
Provably Secure NTRU Instances over Prime Cyclotomic Rings.
Yang Yu
Guangwu Xu
Xiaoyun Wang
2017
conf/eurocrypt
Conditional Cube Attack on Reduced-Round Keccak Sponge Function.
Senyang Huang
Xiaoyun Wang
Guangwu Xu
Meiqin Wang
Jingyuan Zhao
2017
conf/asiacrypt
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.
Zheng Li
Wenquan Bi
Xiaoyang Dong
Xiaoyun Wang
2016
journals/tosc
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes.
Xiaoyang Dong
Xiaoyun Wang
2016
conf/fse
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques.
Huaifeng Chen
Xiaoyun Wang
2016
conf/acisp
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques.
Lingyue Qin
Huaifeng Chen
Xiaoyun Wang
2015
conf/fse
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia.
Leibo Li
Keting Jia
Xiaoyun Wang
Xiaoyang Dong
2015
conf/icisc
Improved Impossible Differential Attack on Reduced-Round LBlock.
Ning Wang
Xiaoyun Wang
Keting Jia
2015
conf/ctrsa
Finding Shortest Lattice Vectors in the Presence of Gaps.
Wei Wei
Mingjie Liu
Xiaoyun Wang
2015
conf/ctrsa
Improved Attacks on Reduced-Round Camellia-128/192/256.
Xiaoyang Dong
Leibo Li
Keting Jia
Xiaoyun Wang
2014
conf/fse
Improved Single-Key Attacks on 9-Round AES-192/256.
Leibo Li
Keting Jia
Xiaoyun Wang
2013
conf/fse
Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256.
Hongbo Yu
Jiazhe Chen
Xiaoyun Wang
2013
conf/acisp
Improved Boomerang Attacks on SM3.
Dongxia Bai
Hongbo Yu
Gaoli Wang
Xiaoyun Wang
2012
conf/fse
New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia.
Ya Liu
Leibo Li
Dawu Gu
Xiaoyun Wang
Zhiqiang Liu
Jiazhe Chen
Wei Li
2012
conf/sacrypt
The Boomerang Attacks on the Round-Reduced Skein-512.
Hongbo Yu
Jiazhe Chen
Xiaoyun Wang
2012
conf/sacrypt
Improved Cryptanalysis of the Block Cipher KASUMI.
Keting Jia
Leibo Li
Christian Rechberger
Jiazhe Chen
Xiaoyun Wang
2011
conf/ccs
Improved Nguyen-Vidick heuristic sieve algorithm for shortest vector problem.
Xiaoyun Wang
Mingjie Liu
Chengliang Tian
Jingguo Bi
2011
conf/acisp
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256.
Jiazhe Chen
Keting Jia
Hongbo Yu
Xiaoyun Wang
2011
conf/acisp
Cryptanalysis of the Compression Function of SIMD.
Hongbo Yu
Xiaoyun Wang
2011
conf/sacrypt
Practical Attack on the Full MMB Block Cipher.
Keting Jia
Jiazhe Chen
Meiqin Wang
Xiaoyun Wang
2009
conf/fse
New Distinguishing Attack on MAC Using Secret-Prefix Method.
Xiaoyun Wang
Wei Wang
Keting Jia
Meiqin Wang
2009
conf/acisp
Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256.
Hongbo Yu
Xiaoyun Wang
2009
conf/crypto
New Birthday Attacks on Some MACs Based on Block Ciphers.
Zheng Yuan
Wei Wang
Keting Jia
Guangwu Xu
Xiaoyun Wang
2009
conf/icics
Public Key Encryption without Random Oracle Made Truly Practical.
Puwen Wei
Xiaoyun Wang
Yuliang Zheng
2009
conf/eurocrypt
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC.
Xiaoyun Wang
Hongbo Yu
Wei Wang
Haina Zhang
Tao Zhan
2009
conf/cans
Distinguishing and Second-Preimage Attacks on CBC-Like MACs.
Keting Jia
Xiaoyun Wang
Zheng Yuan
Guangwu Xu
2008
conf/sacrypt
New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256.
Meiqin Wang
Xiaoyun Wang
Changhui Hu
2007
conf/icisc
Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4.
Haina Zhang
Xiaoyun Wang
2007
conf/icisc
Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL.
Hongbo Yu
Xiaoyun Wang
2006
conf/fse
Cryptanalysis of the Full HAVAL with 4 and 5 Passes.
Hongbo Yu
Xiaoyun Wang
Aaram Yun
Sangwoo Park
2005
conf/crypto
Efficient Collision Search Attacks on SHA-0.
Xiaoyun Wang
Hongbo Yu
Yiqun Lisa Yin
2005
conf/crypto
Finding Collisions in the Full SHA-1.
Xiaoyun Wang
Yiqun Lisa Yin
Hongbo Yu
2005
conf/eurocrypt
Cryptanalysis of the Hash Functions MD4 and RIPEMD.
Xiaoyun Wang
Xuejia Lai
Dengguo Feng
Hui Chen
Xiuyuan Yu
2005
conf/eurocrypt
How to Break MD5 and Other Hash Functions.
Xiaoyun Wang
Hongbo Yu
2005
conf/cans
The Second-Preimage Attack on MD4.
Hongbo Yu
Gaoli Wang
Guoyan Zhang
Xiaoyun Wang
2000
conf/pkc
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms.
Xiaoyun Wang
Lucas Chi Kwong Hui
Kam-Pui Chow
Wai Wan Tsang
C. F. Chong
H. W. Chan
Coauthors
Aaram Yun
(1)
Anyu Wang
(12)
Boxin Zhao
(1)
C. F. Chong
(1)
Changhui Hu
(1)
Chengliang Tian
(1)
Chenhao Wu
(1)
Christian Rechberger
(1)
Cong Zhang
(1)
Congming Wei
(2)
Danping Shi
(2)
Dawu Gu
(1)
Delong Ran
(1)
Dengguo Feng
(1)
Dongxia Bai
(1)
Fei Gao
(1)
Gaoli Wang
(2)
Guangwu Xu
(4)
Guoxiao Liu
(3)
Guoyan Zhang
(3)
H. W. Chan
(1)
Hailun Yan
(1)
Haina Zhang
(2)
Hengyi Luo
(3)
Hongbo Yu
(13)
Huaifeng Chen
(2)
Hui Chen
(1)
Huiwen Jia
(1)
Jialiang Hua
(4)
Jian Guo
(2)
Jiazhe Chen
(6)
Jingguo Bi
(1)
Jingyuan Zhao
(1)
Jue Hong
(1)
Kai He
(1)
Kaijie Jiang
(3)
Kam-Pui Chow
(1)
Keting Jia
(13)
Lei Hu
(4)
Leibo Li
(5)
Ling Qin
(1)
Lingyue Qin
(8)
Liqiang Peng
(1)
Lucas Chi Kwong Hui
(1)
Meiqin Wang
(4)
Meng Hao
(1)
Mingjie Liu
(2)
Ning Wang
(1)
Puwen Wei
(1)
Qidi You
(1)
Qingliang Hou
(2)
Qingyuan Yu
(1)
Qixian Zhou
(1)
Sangwoo Park
(1)
Senyang Huang
(1)
Shiduo Zhang
(1)
Shihe Ma
(4)
Shun Zhang
(1)
Siwei Sun
(6)
Tairong Huang
(4)
Tang Gang
(1)
Tao Zhan
(1)
Tianrui Wang
(1)
Tianshuo Cong
(1)
Wai Wan Tsang
(1)
Wei Li
(1)
Wei Wang
(3)
Wei Wei
(1)
Weijia Wang
(1)
Weiran Liu
(1)
Wenquan Bi
(2)
Willi Meier
(2)
Xiaoyang Dong
(22)
Xiaoyun Wang
(66)
Ximing Fu
(2)
Ximing Xu
(1)
Xinlei He
(1)
Xiuhan Lin
(1)
Xiuyuan Yu
(1)
Xuejia Lai
(1)
Ya Liu
(1)
Yanbin Pan
(1)
Yang Yu
(5)
Yantian Shen
(1)
Yi Chen
(1)
Yichen Gong
(1)
Yiqun Lisa Yin
(2)
Yongze Kang
(1)
Yu Chen
(1)
Yuliang Zheng
(1)
Yunwen Liu
(1)
Zheng Li
(6)
Zheng Yuan
(2)
Zhenzhen Bao
(1)
Zhiqiang Liu
(1)
Zhiyu Zhang
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to