当前位置:首页 >> 课程负责人
 

科研论文:
1.Xiaoyun Wang, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan, Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC, Advances in Cryptology-Eurocrypt 2009, LNCS 5479, 2009, pp. 121-133.
2.xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang, New Distinguishing Attack on MAC using Secret-Prefix Method, FSE 2009, 2009.
3.Mingqiang Wang, Xiaoyun Wang, Guangwu Xu, Lidong Han, Fast Scalar Multiplication on a Family of Supersingular Curves over , Inscrypt 2008.
4.Meiqin Wang, Xiaoyun Wang, Changhui Hu, Near Linear Cryptanlytic Results of Reduced-Round of CAST-128 and CAST-256, SAC 2008, 2009
5.Wang Wei, Wang Xiao-yun, Saturation Cryptanalysis of CLEFIA, Journal of Communications, vol.10, pp.88-92.
6.Hongbo Yu, Xiaoyun Wang, Multi-collision Attack on the Compression Function of MA4 and 3-Pass Haval, ICISC 2007, LNCS 4817, pp.206-226, 2007.
7.Haina Zhang, Xiaoyun Wang, Differential Crayptanalysis of T-function Based Stream Cipher TSC-4, ICISC 2007, LNCS 4817, pp.227-238, 2007
8.Hongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park, Cryptanalysis of the Full HAVAL with 4 and 5 Passes, Fast Software Encryption 2006, LNCS 4047, pp. 89-110, 2006.
9.Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin, Efficient Collision Search Attacks on SHA-0, Advances in Cryptology-Crypto 05, LNCS 3621: 1-16, 2005.
10.Xiaoyun Wang, Yiqun Yin, Hongbo Yu, Finding Collisions in the Full SHA-1, Advances in Cryptology-Crypto 05, LNCS 3621: 17-36, 2005.
11.Xiaoyun Wang, Yiqun Yin, Hongbo Yu, Collision Search Attacks on SHA1, http://theory.csail.mit.edu/yiqun/shanote.pdf, 2005.
12.Arjen Lenstra, Xiaoyun Wang, Benne de Weger, Colliding X.509 Certificates, Cryptology ePrint Archive,Report 2005/067, http://eprint.iacr.org/2005/067, 2005.
13.Xiaoyun Wang, Xuejia Lai etc, Cryptanalysis of the Hash Functions MD4 and RIPEMD, Advances in Cryptology-Eurocrypt 2005, LNCS3494:18-36, 2005.
14.Xiaoyun Wang, Hongbo Yu, How to Break MD5 and Other Hash Functions, Advances in Cryptology-Eurocrypt 2005, LNCS 3494:1-18, 2005.
15.Xiaoyun Wang etc, An Attack on Hash Function HAVAL-128, Science in China, Series E, 35(4): 405-416, 2005.
16.Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang, Cryptology and Network Security 2005, LNCS 3810, pp. 1–12, 2005.
17.Xiaoyun Wang, Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD, Crypto 2004, http://eprint.iacr.org/2004/199.pdf,2004.
18.L. C. K. Hui, Xiaoyun Wang etc, The Differential Analysis of Reduced Skipjack Variants, Advance in Cryptography--CHINACRYPT'2002, Science Publishing House, 77-87, 2002.
19.Xiaoyun Wang, L. C. K. Hui etc, Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms, Public Key Cryptography, LNCS 1751, 167-177, 2000.
20.Xiaoyun Wang, L. C. K. Hui etc, The Differential Cryptanalysis of an AES Finalist-Serpent, Technical Report TR-2000-04, 2000.
21.Xiaoyun Wang, The Improved Collision attack on SHA-0 (Chinese version, English version coming), 1998.
22.Xiaoyun Wang, The Collision attack on SHA-0 (Chinese version, English version coming), 1997.
23.Xiaoyun Wang, Dashui Zhou, A Method for Constructing One-Way Hash Functions, J. of Software, Vol. 7, Supplement, 279-284, 1996.
24.Xiaoyun Wang, The Proof of Polynomial Security for Generalized GM Probabilistic Public-Key Cryptosystem, J. of China Institute of Communications, Vol. 17, No. 5, 35-40, 1996.
25.Xiaoyun Wang, Daxing Li, The Design of One-Way Paralleling Hash Function, Advance in Cryptography--CHINACRYPT'96, Science Publishing House, 153-157, 1996.
26.Xiaoyun Wang, YinRu Chen, Probabilistic Encryption Cryptosystem Based on the Discrete Logarithm, Communication security, China, No. 3, 1996.
27.Xiaoyun Wang, Jinqing Zhang, Collision Analysis for Every Round Function of the MD5 Message Digest Algorithm, Computer Engineering and Science, Vol.18, No. 2, 15-22, 1996.
28.Xiaoyun Wang, A Secure-Predicate on the Discrete Logarithm Problem for Zpq*, Chinese J. Computer, Vol. 18, No. 3, 205-211, 1995.
29.Xiaoyun Wang, A Secret Key Exchange Scheme Which Is Equivalent to the Discrete Logarithm for Zpq*, J. of China Institute of Communications, Vol. 16, No. 2, 79-83, 1995.
30.Daxing Li, Xiaoyun Wang, Cryptanalysis of Extended Linear Code Public-Key Cryptosystem. Advance in Cryptography--CHINACRYPT'94, Science Publishing House, 1-5, 1994.
31.Xiaoyun Wang, An Interactive Zero-Knowledge Proof Scheme Based on the Discrete Logarithm Problem for Zpq?*, Communication Security, China, No. 1, 64-68, 1993.
32.Xiaoyun Wang, Some Applications of Prime in Cryptography, Communication Security, China, No.1, 1993.
33.Xiaoyun Wang, Diophantine- Knapsack Public-Key Cryptosystem, J. of Shandong University, vol. 27, no. 1, 29-33, 1992.

上一页