BibTeX records: Yiyuan Luo

download as .bib file

@article{DBLP:journals/iotj/XuWLLZYC24,
  author       = {Zhiyu Xu and
                  Liangliang Wang and
                  Yiyuan Luo and
                  Yu Long and
                  Kai Zhang and
                  Hailun Yan and
                  Kefei Chen},
  title        = {A Security-Enhanced Conditional Privacy-Preserving Certificateless
                  Aggregate Signature Scheme for Vehicular Ad-Hoc Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {8},
  pages        = {13482--13495},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3337136},
  doi          = {10.1109/JIOT.2023.3337136},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/XuWLLZYC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/GuoZYHL23,
  author       = {Hao Guo and
                  Zhiyu Zhang and
                  Qianqian Yang and
                  Lei Hu and
                  Yiyuan Luo},
  title        = {A New Method To Find All The High-Probability Word-Oriented Truncated
                  Differentials: Application To \texttt{Midori}, \texttt{SKINNY} And
                  \texttt{CRAFT}},
  journal      = {Comput. J.},
  volume       = {66},
  number       = {5},
  pages        = {1069--1082},
  year         = {2023},
  url          = {https://doi.org/10.1093/comjnl/bxab213},
  doi          = {10.1093/COMJNL/BXAB213},
  timestamp    = {Fri, 23 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/GuoZYHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/NanHZL23,
  author       = {Jiehui Nan and
                  Honggang Hu and
                  Ping Zhang and
                  Yiyuan Luo},
  title        = {Quantum attacks against {BBB} secure PRFs or MACs built from public
                  random permutations},
  journal      = {Quantum Inf. Process.},
  volume       = {22},
  number       = {1},
  pages        = {26},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11128-022-03774-5},
  doi          = {10.1007/S11128-022-03774-5},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/NanHZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZouZL23,
  author       = {Hongkai Zou and
                  Jian Zou and
                  Yiyuan Luo},
  title        = {New results on quantum boomerang attacks},
  journal      = {Quantum Inf. Process.},
  volume       = {22},
  number       = {4},
  pages        = {171},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11128-023-03921-6},
  doi          = {10.1007/S11128-023-03921-6},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ZouZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZhangL23b,
  author       = {Ping Zhang and
                  Yiyuan Luo},
  title        = {Quantum key recovery attacks on tweakable Even-Mansour ciphers},
  journal      = {Quantum Inf. Process.},
  volume       = {22},
  number       = {9},
  pages        = {336},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11128-023-04098-8},
  doi          = {10.1007/S11128-023-04098-8},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ZhangL23b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/HuWXL23,
  author       = {Honggang Hu and
                  Bei Wang and
                  Xianhong Xie and
                  Yiyuan Luo},
  title        = {An Open Problem About Monomial Bent Functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {69},
  number       = {12},
  pages        = {8111--8115},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIT.2023.3311583},
  doi          = {10.1109/TIT.2023.3311583},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/HuWXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DengLYZGDL23,
  author       = {Tongxia Deng and
                  Ping Li and
                  Shunzhi Yang and
                  Yupeng Zhang and
                  Zheng Gong and
                  Ming Duan and
                  Yiyuan Luo},
  editor       = {Jianying Zhou and
                  Lejla Batina and
                  Zengpeng Li and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Daisuke Mashima and
                  Weizhi Meng and
                  Stjepan Picek and
                  Mohammad Ashiqur Rahman and
                  Jun Shao and
                  Masaki Shimaoka and
                  Ezekiel O. Soremekun and
                  Chunhua Su and
                  Je Sen Teh and
                  Aleksei Udovenko and
                  Cong Wang and
                  Leo Yu Zhang and
                  Yury Zhauniarovich},
  title        = {A Deep-Learning Approach for Predicting Round Obfuscation in White-Box
                  Block Ciphers},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2023
                  Satellite Workshops, ADSC, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Kyoto, Japan, June 19-22, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13907},
  pages        = {419--438},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41181-6\_23},
  doi          = {10.1007/978-3-031-41181-6\_23},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/DengLYZGDL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YuSDSLS23,
  author       = {Bo Yu and
                  Tairong Shi and
                  Xiaoyang Dong and
                  Xuan Shen and
                  Yiyuan Luo and
                  Bing Sun},
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {Quantum Attacks: {A} View of Data Complexity on Offline Simon's Algorithm},
  booktitle    = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14527},
  pages        = {329--342},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0945-8\_19},
  doi          = {10.1007/978-981-97-0945-8\_19},
  timestamp    = {Mon, 11 Mar 2024 15:20:47 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/YuSDSLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangWZLL22,
  author       = {Huiwen Wang and
                  Liangliang Wang and
                  Kai Zhang and
                  Jinguo Li and
                  Yiyuan Luo},
  title        = {A Conditional Privacy-Preserving Certificateless Aggregate Signature
                  Scheme in the Standard Model for VANETs},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {15605--15618},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3147595},
  doi          = {10.1109/ACCESS.2022.3147595},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangWZLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/ChenWLLC22,
  author       = {Chunliang Chen and
                  Liangliang Wang and
                  Yu Long and
                  Yiyuan Luo and
                  Kefei Chen},
  title        = {A blockchain-based dynamic and traceable data integrity verification
                  scheme for smart homes},
  journal      = {J. Syst. Archit.},
  volume       = {130},
  pages        = {102677},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.sysarc.2022.102677},
  doi          = {10.1016/J.SYSARC.2022.102677},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/ChenWLLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZouWSLLW22,
  author       = {Jian Zou and
                  Zihao Wei and
                  Siwei Sun and
                  Yiyuan Luo and
                  Qian Liu and
                  Wenling Wu},
  title        = {Some efficient quantum circuit implementations of Camellia},
  journal      = {Quantum Inf. Process.},
  volume       = {21},
  number       = {4},
  pages        = {131},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11128-022-03477-x},
  doi          = {10.1007/S11128-022-03477-X},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ZouWSLLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZouLWLLW22,
  author       = {Jian Zou and
                  Liji Li and
                  Zihao Wei and
                  Yiyuan Luo and
                  Qian Liu and
                  Wenling Wu},
  title        = {New quantum circuit implementations of {SM4} and {SM3}},
  journal      = {Quantum Inf. Process.},
  volume       = {21},
  number       = {5},
  pages        = {181},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11128-022-03518-5},
  doi          = {10.1007/S11128-022-03518-5},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ZouLWLLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/WangWWCL22,
  author       = {Huiwen Wang and
                  Liangliang Wang and
                  Mi Wen and
                  Kefei Chen and
                  Yiyuan Luo},
  title        = {A Lightweight Certificateless Aggregate Ring Signature Scheme for
                  Privacy Protection in Smart Grids},
  journal      = {Wirel. Pers. Commun.},
  volume       = {126},
  number       = {2},
  pages        = {1577--1599},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11277-022-09809-5},
  doi          = {10.1007/S11277-022-09809-5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/WangWWCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ZongDCLWL21,
  author       = {Rui Zong and
                  Xiaoyang Dong and
                  Huaifeng Chen and
                  Yiyuan Luo and
                  Si Wang and
                  Zheng Li},
  title        = {Towards Key-recovery-attack Friendly Distinguishers: Application to
                  {GIFT-128}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {156--184},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.156-184},
  doi          = {10.46586/TOSC.V2021.I1.156-184},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ZongDCLWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/QinBZCL21,
  author       = {Baodong Qin and
                  Xue Bai and
                  Dong Zheng and
                  Hui Cui and
                  Yiyuan Luo},
  editor       = {Debin Gao and
                  Qi Li and
                  Xiaohong Guan and
                  Xiaofeng Liao},
  title        = {Forward-Secure Revocable Identity-Based Encryption},
  booktitle    = {Information and Communications Security - 23rd International Conference,
                  {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12919},
  pages        = {321--340},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88052-1\_19},
  doi          = {10.1007/978-3-030-88052-1\_19},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/QinBZCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-12304,
  author       = {Honggang Hu and
                  Bei Wang and
                  Xianhong Xie and
                  Yiyuan Luo},
  title        = {Two Problems about Monomial Bent Functions},
  journal      = {CoRR},
  volume       = {abs/2102.12304},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.12304},
  eprinttype    = {arXiv},
  eprint       = {2102.12304},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-12304.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/YanLCL19,
  author       = {Hailun Yan and
                  Yiyuan Luo and
                  Mo Chen and
                  Xuejia Lai},
  title        = {New observation on the key schedule of {RECTANGLE}},
  journal      = {Sci. China Inf. Sci.},
  volume       = {62},
  number       = {3},
  pages        = {32108:1--32108:13},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11432-018-9527-8},
  doi          = {10.1007/S11432-018-9527-8},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/YanLCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LuoLZ17,
  author       = {Yiyuan Luo and
                  Xuejia Lai and
                  Yujie Zhou},
  title        = {Generic attacks on the Lai-Massey scheme},
  journal      = {Des. Codes Cryptogr.},
  volume       = {83},
  number       = {2},
  pages        = {407--423},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0235-2},
  doi          = {10.1007/S10623-016-0235-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LuoLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LuoL17,
  author       = {Yiyuan Luo and
                  Xuejia Lai},
  title        = {Improvements for Finding Impossible Differentials of Block Cipher
                  Structures},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {5980251:1--5980251:9},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/5980251},
  doi          = {10.1155/2017/5980251},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LuoL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsai/Luo17,
  author       = {Yiyuan Luo},
  title        = {General attacks on compression functions based on key alternating
                  ciphers},
  booktitle    = {4th International Conference on Systems and Informatics, {ICSAI} 2017,
                  Hangzhou, China, November 11-13, 2017},
  pages        = {980--984},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICSAI.2017.8248428},
  doi          = {10.1109/ICSAI.2017.8248428},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icsai/Luo17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoL17,
  author       = {Yiyuan Luo and
                  Xuejia Lai},
  title        = {Improvements for Finding Impossible Differentials of Block Cipher
                  Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1209},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/GongLWLQ16,
  author       = {Zheng Gong and
                  Shusheng Liu and
                  Yamin Wen and
                  Yiyuan Luo and
                  Weidong Qiu},
  title        = {Biclique cryptanalysis using balanced complete bipartite subgraphs},
  journal      = {Sci. China Inf. Sci.},
  volume       = {59},
  number       = {4},
  pages        = {049101:1--049101:3},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11432-016-5540-x},
  doi          = {10.1007/S11432-016-5540-X},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/GongLWLQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsai/HuL16,
  author       = {Jing Hu and
                  Yiyuan Luo},
  editor       = {Xiang Fei and
                  Lipo Wang and
                  Chunlei Ji and
                  Qiang Sun and
                  Niansheng Chen and
                  Xiaoyong Song and
                  Xin Wang},
  title        = {A fuzzy min-max neural network with classification performance irrelevant
                  to the input sequences of samples},
  booktitle    = {3rd International Conference on Systems and Informatics, {ICSAI} 2016,
                  Shanghai, China, November 19-21, 2016},
  pages        = {393--398},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICSAI.2016.7810987},
  doi          = {10.1109/ICSAI.2016.7810987},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icsai/HuL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsai/Luo16,
  author       = {Yiyuan Luo},
  editor       = {Xiang Fei and
                  Lipo Wang and
                  Chunlei Ji and
                  Qiang Sun and
                  Niansheng Chen and
                  Xiaoyong Song and
                  Xin Wang},
  title        = {A proposal for high rate double-block-length hash functions},
  booktitle    = {3rd International Conference on Systems and Informatics, {ICSAI} 2016,
                  Shanghai, China, November 19-21, 2016},
  pages        = {797--802},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICSAI.2016.7811060},
  doi          = {10.1109/ICSAI.2016.7811060},
  timestamp    = {Tue, 09 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icsai/Luo16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/LuoLJ15,
  author       = {Yiyuan Luo and
                  Xuejia Lai and
                  Tiejun Jia},
  title        = {Attacks on a double length blockcipher-based hash proposal},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {3},
  pages        = {289--295},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0117-2},
  doi          = {10.1007/S12095-014-0117-2},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/LuoLJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/LuoLH15,
  author       = {Yiyuan Luo and
                  Xuejia Lai and
                  Jing Hu},
  title        = {The Pseudorandomness of Many-Round Lai-Massey Scheme},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {31},
  number       = {3},
  pages        = {1085--1096},
  year         = {2015},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2015/201505\_17.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/LuoLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LuoLWG14,
  author       = {Yiyuan Luo and
                  Xuejia Lai and
                  Zhongming Wu and
                  Guang Gong},
  title        = {A unified method for finding impossible differentials of block cipher
                  structures},
  journal      = {Inf. Sci.},
  volume       = {263},
  pages        = {211--220},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2013.08.051},
  doi          = {10.1016/J.INS.2013.08.051},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LuoLWG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eidwt/ChenZGL13,
  author       = {Xunjun Chen and
                  Yuelong Zhu and
                  Zheng Gong and
                  Yiyuan Luo},
  title        = {Cryptanalysis of the Lightweight Block Cipher Hummingbird-1},
  booktitle    = {2013 Fourth International Conference on Emerging Intelligent Data
                  and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013},
  pages        = {515--518},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/EIDWT.2013.92},
  doi          = {10.1109/EIDWT.2013.92},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eidwt/ChenZGL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoL13,
  author       = {Yiyuan Luo and
                  Xuejia Lai},
  title        = {Attacks on JH, Grstl and {SMASH} Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SafkhaniBNLC11,
  author       = {Masoumeh Safkhani and
                  Nasour Bagheri and
                  Majid Naderi and
                  Yiyuan Luo and
                  Qi Chai},
  title        = {Tag Impersonation Attack on Two {RFID} Mutual Authentication Protocols},
  booktitle    = {Sixth International Conference on Availability, Reliability and Security,
                  {ARES} 2011, Vienna, Austria, August 22-26, 2011},
  pages        = {581--584},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ARES.2011.87},
  doi          = {10.1109/ARES.2011.87},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SafkhaniBNLC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/LuoLG11,
  author       = {Yiyuan Luo and
                  Xuejia Lai and
                  Zheng Gong},
  editor       = {Liqun Chen and
                  Moti Yung and
                  Liehuang Zhu},
  title        = {Indifferentiability of Domain Extension Modes for Hash Functions},
  booktitle    = {Trusted Systems - Third International Conference, {INTRUST} 2011,
                  Beijing, China, November 27-29, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7222},
  pages        = {138--155},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-32298-3\_10},
  doi          = {10.1007/978-3-642-32298-3\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/LuoLG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoL11,
  author       = {Yiyuan Luo and
                  Xuejia Lai},
  title        = {Attacks On a Double Length Blockcipher-based Hash Proposal},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/LuoLG10,
  author       = {Yiyuan Luo and
                  Xuejia Lai and
                  Zheng Gong},
  title        = {Pseudorandomness analysis of the (extended) Lai-Massey scheme},
  journal      = {Inf. Process. Lett.},
  volume       = {111},
  number       = {2},
  pages        = {90--96},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ipl.2010.10.012},
  doi          = {10.1016/J.IPL.2010.10.012},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/LuoLG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LuoCGL10,
  author       = {Yiyuan Luo and
                  Qi Chai and
                  Guang Gong and
                  Xuejia Lai},
  title        = {A Lightweight Stream Cipher {WG-7} for {RFID} Encryption and Authentication},
  booktitle    = {Proceedings of the Global Communications Conference, 2010. {GLOBECOM}
                  2010, 6-10 December 2010, Miami, Florida, {USA}},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/GLOCOM.2010.5684215},
  doi          = {10.1109/GLOCOM.2010.5684215},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/LuoCGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoL10,
  author       = {Yiyuan Luo and
                  Xuejia Lai},
  title        = {More Insights on Blockcipher-Based Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {642},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/642},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/WuLLZ09,
  author       = {Zhongming Wu and
                  Yiyuan Luo and
                  Xuejia Lai and
                  Bo Zhu},
  editor       = {Liqun Chen and
                  Moti Yung},
  title        = {Improved Cryptanalysis of the {FOX} Block Cipher},
  booktitle    = {Trusted Systems, First International Conference, {INTRUST} 2009, Beijing,
                  China, December 17-19, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6163},
  pages        = {236--249},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-14597-1\_15},
  doi          = {10.1007/978-3-642-14597-1\_15},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/WuLLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoGDZL09,
  author       = {Yiyuan Luo and
                  Zheng Gong and
                  Ming Duan and
                  Bo Zhu and
                  Xuejia Lai},
  title        = {Revisiting the Indifferentiability of {PGV} Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/265},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoGDZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoLGW09,
  author       = {Yiyuan Luo and
                  Xuejia Lai and
                  Zheng Gong and
                  Zhongming Wu},
  title        = {Pseudorandomness Analysis of the Lai-Massey Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/266},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoLGW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuLZL09,
  author       = {Zhongming Wu and
                  Xuejia Lai and
                  Bo Zhu and
                  Yiyuan Luo},
  title        = {Impossible Differential Cryptanalysis of {FOX}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {357},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/357},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuLZL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoWLG09,
  author       = {Yiyuan Luo and
                  Zhongming Wu and
                  Xuejia Lai and
                  Guang Gong},
  title        = {A Unified Method for Finding Impossible Differentials of Block Cipher
                  Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {627},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/627},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoWLG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuoL08,
  author       = {Yiyuan Luo and
                  Xuejia Lai},
  title        = {Higher Order Differential Cryptanalysis of Multivariate Hash Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {350},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/350},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuoL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics