Wang Xiaoyun

Results: 21



#Item
1Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes Xiaoyang Dong and Xiaoyun Wang Shandong University, Tsinghua University

Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes Xiaoyang Dong and Xiaoyun Wang Shandong University, Tsinghua University

Add to Reading List

Source URL: www.nuee.nagoya-u.ac.jp

Language: English - Date: 2017-03-06 00:55:10
    2How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, ,   Abstract. MD5 is one of the most widely used cryptographic hash funct

    How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

    Add to Reading List

    Source URL: merlot.usc.edu

    Language: English - Date: 2005-11-09 16:49:02
      3Got control ?  AutoControl: Automated Control of MultipleVirtualized Resources Pradeep Padala, Karen Hou, Xiaoyun Zhu*, Mustfa Uysal†, Zhikui Wang†, Sharad Singhal†, Arif Merchant†, Kang G. Shin

      Got control ? AutoControl: Automated Control of MultipleVirtualized Resources Pradeep Padala, Karen Hou, Xiaoyun Zhu*, Mustfa Uysal†, Zhikui Wang†, Sharad Singhal†, Arif Merchant†, Kang G. Shin

      Add to Reading List

      Source URL: eurosys2009.informatik.uni-erlangen.de

      Language: English - Date: 2009-04-19 11:57:08
        4Cube-like Attack on Round-Reduced Initialization of Ketje Sr Xiaoyang Dong, Zheng Li, Xiaoyun Wang and Ling Qin Shandong University, Tsinghua University FSE 2017

        Cube-like Attack on Round-Reduced Initialization of Ketje Sr Xiaoyang Dong, Zheng Li, Xiaoyun Wang and Ling Qin Shandong University, Tsinghua University FSE 2017

        Add to Reading List

        Source URL: www.nuee.nagoya-u.ac.jp

        Language: English - Date: 2017-03-06 23:19:26
          5Bit Cryptanalysis on Symmetric Ciphers Xiaoyun Wang Current Trends in Cryptology, Yaroslavl

          Bit Cryptanalysis on Symmetric Ciphers Xiaoyun Wang Current Trends in Cryptology, Yaroslavl

          Add to Reading List

          Source URL: ctcrypt.ru

          Language: English - Date: 2016-06-10 06:35:42
          6How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, ,   Abstract. MD5 is one of the most widely used cryptographic hash funct

          How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

          Add to Reading List

          Source URL: s3-eu-west-1.amazonaws.com

          Language: English - Date: 2014-12-18 11:32:43
            7Tracy	
  Y.	
  Wang,	
  University	
  of	
  Minnesota	
   Andrew	
  Winton,	
  University	
  of	
  Minnesota	
   Xiaoyun	
  Yu,	
  Indiana	
  University	
     March	
  2009	
  

            Tracy  Y.  Wang,  University  of  Minnesota   Andrew  Winton,  University  of  Minnesota   Xiaoyun  Yu,  Indiana  University     March  2009  

            Add to Reading List

            Source URL: www.afajof.org

            Language: English - Date: 2014-02-03 01:55:34
            8CRYPTO 2005 Rump Session Program 19::35 20::21

            CRYPTO 2005 Rump Session Program 19::35 20::21

            Add to Reading List

            Source URL: www.iacr.org

            Language: English - Date: 2005-08-16 15:12:59
            9Finding MD5 Collisions – a Toy For a Notebook Vlastimil Klíma 1 Prague, Czech Republic http://cryptography.hyperlink.cz  March 5, 2005

            Finding MD5 Collisions – a Toy For a Notebook Vlastimil Klíma 1 Prague, Czech Republic http://cryptography.hyperlink.cz March 5, 2005

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2005-03-08 12:38:58
            10Cryptographic hash function / Block cipher / Advanced Encryption Standard / CMAC / LEX / UMAC / HMAC / Message authentication codes / Cryptography / CBC-MAC

            Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC⋆ Zheng Yuan1,2 , Keting Jia3 , Wei Wang3 , and Xiaoyun Wang⋆⋆2,3 1 Beijing Electronic Science and Technology Institute, Beijing 1000

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2008-12-12 10:35:54