Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Yiyuan Luo
@article{DBLP:journals/iotj/XuWLLZYC24, author = {Zhiyu Xu and Liangliang Wang and Yiyuan Luo and Yu Long and Kai Zhang and Hailun Yan and Kefei Chen}, title = {A Security-Enhanced Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {8}, pages = {13482--13495}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3337136}, doi = {10.1109/JIOT.2023.3337136}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/XuWLLZYC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/GuoZYHL23, author = {Hao Guo and Zhiyu Zhang and Qianqian Yang and Lei Hu and Yiyuan Luo}, title = {A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To \texttt{Midori}, \texttt{SKINNY} And \texttt{CRAFT}}, journal = {Comput. J.}, volume = {66}, number = {5}, pages = {1069--1082}, year = {2023}, url = {https://doi.org/10.1093/comjnl/bxab213}, doi = {10.1093/COMJNL/BXAB213}, timestamp = {Fri, 23 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/GuoZYHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/NanHZL23, author = {Jiehui Nan and Honggang Hu and Ping Zhang and Yiyuan Luo}, title = {Quantum attacks against {BBB} secure PRFs or MACs built from public random permutations}, journal = {Quantum Inf. Process.}, volume = {22}, number = {1}, pages = {26}, year = {2023}, url = {https://doi.org/10.1007/s11128-022-03774-5}, doi = {10.1007/S11128-022-03774-5}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/NanHZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZouZL23, author = {Hongkai Zou and Jian Zou and Yiyuan Luo}, title = {New results on quantum boomerang attacks}, journal = {Quantum Inf. Process.}, volume = {22}, number = {4}, pages = {171}, year = {2023}, url = {https://doi.org/10.1007/s11128-023-03921-6}, doi = {10.1007/S11128-023-03921-6}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZouZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZhangL23b, author = {Ping Zhang and Yiyuan Luo}, title = {Quantum key recovery attacks on tweakable Even-Mansour ciphers}, journal = {Quantum Inf. Process.}, volume = {22}, number = {9}, pages = {336}, year = {2023}, url = {https://doi.org/10.1007/s11128-023-04098-8}, doi = {10.1007/S11128-023-04098-8}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZhangL23b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/HuWXL23, author = {Honggang Hu and Bei Wang and Xianhong Xie and Yiyuan Luo}, title = {An Open Problem About Monomial Bent Functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {69}, number = {12}, pages = {8111--8115}, year = {2023}, url = {https://doi.org/10.1109/TIT.2023.3311583}, doi = {10.1109/TIT.2023.3311583}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/HuWXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DengLYZGDL23, author = {Tongxia Deng and Ping Li and Shunzhi Yang and Yupeng Zhang and Zheng Gong and Ming Duan and Yiyuan Luo}, editor = {Jianying Zhou and Lejla Batina and Zengpeng Li and Jingqiang Lin and Eleonora Losiouk and Suryadipta Majumdar and Daisuke Mashima and Weizhi Meng and Stjepan Picek and Mohammad Ashiqur Rahman and Jun Shao and Masaki Shimaoka and Ezekiel O. Soremekun and Chunhua Su and Je Sen Teh and Aleksei Udovenko and Cong Wang and Leo Yu Zhang and Yury Zhauniarovich}, title = {A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers}, booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2023 Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P, SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13907}, pages = {419--438}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41181-6\_23}, doi = {10.1007/978-3-031-41181-6\_23}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/DengLYZGDL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YuSDSLS23, author = {Bo Yu and Tairong Shi and Xiaoyang Dong and Xuan Shen and Yiyuan Luo and Bing Sun}, editor = {Chunpeng Ge and Moti Yung}, title = {Quantum Attacks: {A} View of Data Complexity on Offline Simon's Algorithm}, booktitle = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14527}, pages = {329--342}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0945-8\_19}, doi = {10.1007/978-981-97-0945-8\_19}, timestamp = {Mon, 11 Mar 2024 15:20:47 +0100}, biburl = {https://dblp.org/rec/conf/cisc/YuSDSLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangWZLL22, author = {Huiwen Wang and Liangliang Wang and Kai Zhang and Jinguo Li and Yiyuan Luo}, title = {A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs}, journal = {{IEEE} Access}, volume = {10}, pages = {15605--15618}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3147595}, doi = {10.1109/ACCESS.2022.3147595}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangWZLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/ChenWLLC22, author = {Chunliang Chen and Liangliang Wang and Yu Long and Yiyuan Luo and Kefei Chen}, title = {A blockchain-based dynamic and traceable data integrity verification scheme for smart homes}, journal = {J. Syst. Archit.}, volume = {130}, pages = {102677}, year = {2022}, url = {https://doi.org/10.1016/j.sysarc.2022.102677}, doi = {10.1016/J.SYSARC.2022.102677}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/ChenWLLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZouWSLLW22, author = {Jian Zou and Zihao Wei and Siwei Sun and Yiyuan Luo and Qian Liu and Wenling Wu}, title = {Some efficient quantum circuit implementations of Camellia}, journal = {Quantum Inf. Process.}, volume = {21}, number = {4}, pages = {131}, year = {2022}, url = {https://doi.org/10.1007/s11128-022-03477-x}, doi = {10.1007/S11128-022-03477-X}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZouWSLLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZouLWLLW22, author = {Jian Zou and Liji Li and Zihao Wei and Yiyuan Luo and Qian Liu and Wenling Wu}, title = {New quantum circuit implementations of {SM4} and {SM3}}, journal = {Quantum Inf. Process.}, volume = {21}, number = {5}, pages = {181}, year = {2022}, url = {https://doi.org/10.1007/s11128-022-03518-5}, doi = {10.1007/S11128-022-03518-5}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZouLWLLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/WangWWCL22, author = {Huiwen Wang and Liangliang Wang and Mi Wen and Kefei Chen and Yiyuan Luo}, title = {A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids}, journal = {Wirel. Pers. Commun.}, volume = {126}, number = {2}, pages = {1577--1599}, year = {2022}, url = {https://doi.org/10.1007/s11277-022-09809-5}, doi = {10.1007/S11277-022-09809-5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/WangWWCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ZongDCLWL21, author = {Rui Zong and Xiaoyang Dong and Huaifeng Chen and Yiyuan Luo and Si Wang and Zheng Li}, title = {Towards Key-recovery-attack Friendly Distinguishers: Application to {GIFT-128}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {156--184}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.156-184}, doi = {10.46586/TOSC.V2021.I1.156-184}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ZongDCLWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/QinBZCL21, author = {Baodong Qin and Xue Bai and Dong Zheng and Hui Cui and Yiyuan Luo}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Forward-Secure Revocable Identity-Based Encryption}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {321--340}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_19}, doi = {10.1007/978-3-030-88052-1\_19}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/QinBZCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-12304, author = {Honggang Hu and Bei Wang and Xianhong Xie and Yiyuan Luo}, title = {Two Problems about Monomial Bent Functions}, journal = {CoRR}, volume = {abs/2102.12304}, year = {2021}, url = {https://arxiv.org/abs/2102.12304}, eprinttype = {arXiv}, eprint = {2102.12304}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-12304.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/YanLCL19, author = {Hailun Yan and Yiyuan Luo and Mo Chen and Xuejia Lai}, title = {New observation on the key schedule of {RECTANGLE}}, journal = {Sci. China Inf. Sci.}, volume = {62}, number = {3}, pages = {32108:1--32108:13}, year = {2019}, url = {https://doi.org/10.1007/s11432-018-9527-8}, doi = {10.1007/S11432-018-9527-8}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/YanLCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LuoLZ17, author = {Yiyuan Luo and Xuejia Lai and Yujie Zhou}, title = {Generic attacks on the Lai-Massey scheme}, journal = {Des. Codes Cryptogr.}, volume = {83}, number = {2}, pages = {407--423}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0235-2}, doi = {10.1007/S10623-016-0235-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LuoLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LuoL17, author = {Yiyuan Luo and Xuejia Lai}, title = {Improvements for Finding Impossible Differentials of Block Cipher Structures}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {5980251:1--5980251:9}, year = {2017}, url = {https://doi.org/10.1155/2017/5980251}, doi = {10.1155/2017/5980251}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LuoL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsai/Luo17, author = {Yiyuan Luo}, title = {General attacks on compression functions based on key alternating ciphers}, booktitle = {4th International Conference on Systems and Informatics, {ICSAI} 2017, Hangzhou, China, November 11-13, 2017}, pages = {980--984}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICSAI.2017.8248428}, doi = {10.1109/ICSAI.2017.8248428}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/icsai/Luo17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoL17, author = {Yiyuan Luo and Xuejia Lai}, title = {Improvements for Finding Impossible Differentials of Block Cipher Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1209}, year = {2017}, url = {http://eprint.iacr.org/2017/1209}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/GongLWLQ16, author = {Zheng Gong and Shusheng Liu and Yamin Wen and Yiyuan Luo and Weidong Qiu}, title = {Biclique cryptanalysis using balanced complete bipartite subgraphs}, journal = {Sci. China Inf. Sci.}, volume = {59}, number = {4}, pages = {049101:1--049101:3}, year = {2016}, url = {https://doi.org/10.1007/s11432-016-5540-x}, doi = {10.1007/S11432-016-5540-X}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/GongLWLQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsai/HuL16, author = {Jing Hu and Yiyuan Luo}, editor = {Xiang Fei and Lipo Wang and Chunlei Ji and Qiang Sun and Niansheng Chen and Xiaoyong Song and Xin Wang}, title = {A fuzzy min-max neural network with classification performance irrelevant to the input sequences of samples}, booktitle = {3rd International Conference on Systems and Informatics, {ICSAI} 2016, Shanghai, China, November 19-21, 2016}, pages = {393--398}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICSAI.2016.7810987}, doi = {10.1109/ICSAI.2016.7810987}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/icsai/HuL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsai/Luo16, author = {Yiyuan Luo}, editor = {Xiang Fei and Lipo Wang and Chunlei Ji and Qiang Sun and Niansheng Chen and Xiaoyong Song and Xin Wang}, title = {A proposal for high rate double-block-length hash functions}, booktitle = {3rd International Conference on Systems and Informatics, {ICSAI} 2016, Shanghai, China, November 19-21, 2016}, pages = {797--802}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICSAI.2016.7811060}, doi = {10.1109/ICSAI.2016.7811060}, timestamp = {Tue, 09 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icsai/Luo16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LuoLJ15, author = {Yiyuan Luo and Xuejia Lai and Tiejun Jia}, title = {Attacks on a double length blockcipher-based hash proposal}, journal = {Cryptogr. Commun.}, volume = {7}, number = {3}, pages = {289--295}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0117-2}, doi = {10.1007/S12095-014-0117-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LuoLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/LuoLH15, author = {Yiyuan Luo and Xuejia Lai and Jing Hu}, title = {The Pseudorandomness of Many-Round Lai-Massey Scheme}, journal = {J. Inf. Sci. Eng.}, volume = {31}, number = {3}, pages = {1085--1096}, year = {2015}, url = {http://www.iis.sinica.edu.tw/page/jise/2015/201505\_17.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/LuoLH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LuoLWG14, author = {Yiyuan Luo and Xuejia Lai and Zhongming Wu and Guang Gong}, title = {A unified method for finding impossible differentials of block cipher structures}, journal = {Inf. Sci.}, volume = {263}, pages = {211--220}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2013.08.051}, doi = {10.1016/J.INS.2013.08.051}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LuoLWG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eidwt/ChenZGL13, author = {Xunjun Chen and Yuelong Zhu and Zheng Gong and Yiyuan Luo}, title = {Cryptanalysis of the Lightweight Block Cipher Hummingbird-1}, booktitle = {2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013}, pages = {515--518}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/EIDWT.2013.92}, doi = {10.1109/EIDWT.2013.92}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eidwt/ChenZGL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoL13, author = {Yiyuan Luo and Xuejia Lai}, title = {Attacks on JH, Grstl and {SMASH} Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2013}, url = {http://eprint.iacr.org/2013/233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SafkhaniBNLC11, author = {Masoumeh Safkhani and Nasour Bagheri and Majid Naderi and Yiyuan Luo and Qi Chai}, title = {Tag Impersonation Attack on Two {RFID} Mutual Authentication Protocols}, booktitle = {Sixth International Conference on Availability, Reliability and Security, {ARES} 2011, Vienna, Austria, August 22-26, 2011}, pages = {581--584}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ARES.2011.87}, doi = {10.1109/ARES.2011.87}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SafkhaniBNLC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/LuoLG11, author = {Yiyuan Luo and Xuejia Lai and Zheng Gong}, editor = {Liqun Chen and Moti Yung and Liehuang Zhu}, title = {Indifferentiability of Domain Extension Modes for Hash Functions}, booktitle = {Trusted Systems - Third International Conference, {INTRUST} 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7222}, pages = {138--155}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-32298-3\_10}, doi = {10.1007/978-3-642-32298-3\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/LuoLG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoL11, author = {Yiyuan Luo and Xuejia Lai}, title = {Attacks On a Double Length Blockcipher-based Hash Proposal}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {238}, year = {2011}, url = {http://eprint.iacr.org/2011/238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/LuoLG10, author = {Yiyuan Luo and Xuejia Lai and Zheng Gong}, title = {Pseudorandomness analysis of the (extended) Lai-Massey scheme}, journal = {Inf. Process. Lett.}, volume = {111}, number = {2}, pages = {90--96}, year = {2010}, url = {https://doi.org/10.1016/j.ipl.2010.10.012}, doi = {10.1016/J.IPL.2010.10.012}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/LuoLG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LuoCGL10, author = {Yiyuan Luo and Qi Chai and Guang Gong and Xuejia Lai}, title = {A Lightweight Stream Cipher {WG-7} for {RFID} Encryption and Authentication}, booktitle = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM} 2010, 6-10 December 2010, Miami, Florida, {USA}}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/GLOCOM.2010.5684215}, doi = {10.1109/GLOCOM.2010.5684215}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/LuoCGL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoL10, author = {Yiyuan Luo and Xuejia Lai}, title = {More Insights on Blockcipher-Based Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {642}, year = {2010}, url = {http://eprint.iacr.org/2010/642}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/WuLLZ09, author = {Zhongming Wu and Yiyuan Luo and Xuejia Lai and Bo Zhu}, editor = {Liqun Chen and Moti Yung}, title = {Improved Cryptanalysis of the {FOX} Block Cipher}, booktitle = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing, China, December 17-19, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6163}, pages = {236--249}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14597-1\_15}, doi = {10.1007/978-3-642-14597-1\_15}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/intrust/WuLLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoGDZL09, author = {Yiyuan Luo and Zheng Gong and Ming Duan and Bo Zhu and Xuejia Lai}, title = {Revisiting the Indifferentiability of {PGV} Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2009}, url = {http://eprint.iacr.org/2009/265}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoGDZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoLGW09, author = {Yiyuan Luo and Xuejia Lai and Zheng Gong and Zhongming Wu}, title = {Pseudorandomness Analysis of the Lai-Massey Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {266}, year = {2009}, url = {http://eprint.iacr.org/2009/266}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoLGW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuLZL09, author = {Zhongming Wu and Xuejia Lai and Bo Zhu and Yiyuan Luo}, title = {Impossible Differential Cryptanalysis of {FOX}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {357}, year = {2009}, url = {http://eprint.iacr.org/2009/357}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuLZL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoWLG09, author = {Yiyuan Luo and Zhongming Wu and Xuejia Lai and Guang Gong}, title = {A Unified Method for Finding Impossible Differentials of Block Cipher Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {627}, year = {2009}, url = {http://eprint.iacr.org/2009/627}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoWLG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuoL08, author = {Yiyuan Luo and Xuejia Lai}, title = {Higher Order Differential Cryptanalysis of Multivariate Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {350}, year = {2008}, url = {http://eprint.iacr.org/2008/350}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuoL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.