Cryptographers' World
 

Yiqun Lisa Yin


Author's Web Page Link

13 papers in database with 1407 citations StarStar

H-number: 10

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Yedidya Hilewitz,  Yiqun Lisa Yin,  Ruby B. Lee,  Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation, pp. 173 - 188, FSE 2008.

[Electronic Edition][Cited 6 times ]

2. Michael Szydlo,  Yiqun Lisa Yin,  Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing, pp. 99 - 114, CT-RSA 2006.

[Electronic Edition][Cited 21 times ]

3. Scott Contini,  Yiqun Lisa Yin,  Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions, pp. 37 - 53, ASIACRYPT 2006.

[Electronic Edition][Cited 66 times Red Star]

4. Xiaoyun Wang,  Hongbo Yu,  Yiqun Lisa Yin,  Efficient Collision Search Attacks on SHA-0, pp. 1 - 16, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 256 times Red StarRed StarRed Star]

5. Xiaoyun Wang,  Yiqun Lisa Yin,  Hongbo Yu,  Finding Collisions in the Full SHA-1, pp. 17 - 36, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 802 times Red StarRed StarRed StarRed Star]

6. John Patrick McGregor,  Yiqun Lisa Yin,  Ruby B. Lee,  A Traitor Tracing Scheme Based on RSA for Fast Decryption, pp. 56 - 74, ACNS 2005.

[Electronic Edition][Cited 24 times ]

7. Frances F. Yao,  Yiqun Lisa Yin,  Design and Analysis of Password-Based Key Derivation Functions, pp. 245 - 261, CT-RSA 2005.

[Electronic Edition][Cited 6 times ]

8. Scott Contini,  Yiqun Lisa Yin,  Fast Software-Based Attacks on SecurID, pp. 454 - 471, FSE 2004.

[Electronic Edition][Cited 6 times ]

9. Anand Desai,  Alejandro Hevia,  Yiqun Lisa Yin,  A Practice-Oriented Treatment of Pseudorandom Number Generators, pp. 368 - 383, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 19 times ]

10. Eli Gafni,  Jessica Staddon,  Yiqun Lisa Yin,  Efficient Methods for Integrating Traceability and Broadcast Encryption, pp. 372 - 387, CRYPTO 1999.

[Electronic Edition][Cited 91 times Red Star]

11. Scott Contini,  Ronald L. Rivest,  Matthew J. B. Robshaw,  Yiqun Lisa Yin,  Improved Analysis of Some Simplified Variants of RC6, pp. 1 - 15, FSE 1999.

[Electronic Edition][Cited 20 times ]

12. Burton S. Kaliski Jr.,  Yiqun Lisa Yin,  Storage-Efficient Finite Field Basis Conversion, pp. 81 - 93, SAC 1998.

[Electronic Edition][Cited 19 times ]

13. Burton S. Kaliski Jr.,  Yiqun Lisa Yin,  On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm, pp. 171 - 184, CRYPTO 1995.

[Electronic Edition][Cited 71 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...