Cryptographers' World
 

Xiaoyun Wang


Author's Web Page Link

9 papers in database with 2054 citations StarStarStar

Editor of 1 conference proceedings book

H-number: 7

Conference Proceedings

 
1. Tatsuaki OkamotoXiaoyun Wang, editors, Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings. Springer, 2007. ISBN 3-540-71676-9.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Zheng Yuan,  Wei Wang,  Keting Jia,  Guangwu Xu,  Xiaoyun Wang,  New Birthday Attacks on Some MACs Based on Block Ciphers, pp. 209 - 230, CRYPTO 2009.

[Electronic Edition][Cited 4 times ]

2. Xiaoyun Wang,  Hongbo Yu,  Wei Wang,  Haina Zhang,  Tao Zhan,  Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC, pp. 121 - 133, EUROCRYPT 2009.

[Electronic Edition][Cited 14 times ]

3. Xiaoyun Wang,  Wei Wang,  Keting Jia,  Meiqin Wang,  New Distinguishing Attack on MAC Using Secret-Prefix Method, pp. 363 - 374, FSE 2009.

[Electronic Edition][Cited 10 times ]

4. Hongbo Yu,  Xiaoyun Wang,  Aaram Yun,  Sangwoo Park,  Cryptanalysis of the Full HAVAL with 4 and 5 Passes, pp. 89 - 110, FSE 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 23 times ]

5. Xiaoyun Wang,  Yiqun Lisa Yin,  Hongbo Yu,  Finding Collisions in the Full SHA-1, pp. 17 - 36, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 802 times Red StarRed StarRed StarRed Star]

6. Xiaoyun Wang,  Hongbo Yu,  Yiqun Lisa Yin,  Efficient Collision Search Attacks on SHA-0, pp. 1 - 16, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 256 times Red StarRed StarRed Star]

7. Xiaoyun Wang,  Hongbo Yu,  How to Break MD5 and Other Hash Functions, pp. 19 - 35, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 641 times Red StarRed StarRed StarRed Star]

8. Xiaoyun Wang,  Xuejia Lai,  Dengguo Feng,  Hui Chen,  Xiuyuan Yu,  Cryptanalysis of the Hash Functions MD4 and RIPEMD, pp. 1 - 18, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 304 times Red StarRed StarRed Star]

9. Xiaoyun Wang,  Lucas Chi Kwong Hui,  K. P. Chow,  Wai Wan Tsang,  C. F. Chong,  H. W. Chan,  Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms, pp. 167 - 177, PKC 2000.

[Electronic Edition][No citation]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...