当前位置:首页 >> 科研论文
 

科研论文(2002-2009)

  1. Xiaoyun Wang, Yiqun Yin, Hongbo Yu, Collision Search Attacks on SHA1, http://theory.csail.mit.edu/yiqun/shanote.pdf, 2005.
  2. Arjen Lenstra, Xiaoyun Wang, Benne de Weger, Colliding X.509 Certificates, Cryptology ePrint Archive,Report 2005/067, http://eprint.iacr.org/2005/067, 2005.
  3. Xiaoyun Wang, Xuejia Lai etc, Cryptanalysis of the Hash Functions MD4 and RIPEMD, Advances in Cryptology-Eurocrypt 2005, LNCS3494:18-36, 2005.
  4. Xiaoyun Wang, Hongbo Yu, How to Break MD5 and Other Hash Functions, Advances in Cryptology-Eurocrypt 2005, LNCS 3494:1-18, 2005.
  5. Xiaoyun Wang etc, An Attack on Hash Function HAVAL-128, Science in China, Series E, 35(4): 405-416, 2005.
  6. Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang, Cryptology and Network Security 2005, LNCS 3810, pp. 1–12, 2005.
  7. Xiaoyun Wang, Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD, Crypto 2004, http://eprint.iacr.org/2004/199.pdf,2004.
  8. Xianmeng Meng, A mean value theorem on the binary Goldbach problem and its application. Monatsh. Math. 151 (2007), no. 4, 319--332.
  9. Xianmeng Meng, Linear Equations with Small Prime and Almost Prime Solutions, Canadian Mathematical Bulletin, 51 (2008), no. 3, 399-405.
  10. Xianmeng Meng (with Guangshi Lü), On sums of a prime and four prime squares in short intervals, Acta Math. Sin. (Engl. Ser.) 24 (2008), 1291--1302.
  11. 上一页 下一页