Wang Xiaoyun

Results: 21



#Item
1

Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes Xiaoyang Dong and Xiaoyun Wang Shandong University, Tsinghua University

Add to Reading List

Source URL: www.nuee.nagoya-u.ac.jp

Language: English - Date: 2017-03-06 00:55:10
    2

    How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

    Add to Reading List

    Source URL: merlot.usc.edu

    Language: English - Date: 2005-11-09 16:49:02
      3

      Got control ? AutoControl: Automated Control of MultipleVirtualized Resources Pradeep Padala, Karen Hou, Xiaoyun Zhu*, Mustfa Uysal†, Zhikui Wang†, Sharad Singhal†, Arif Merchant†, Kang G. Shin

      Add to Reading List

      Source URL: eurosys2009.informatik.uni-erlangen.de

      Language: English - Date: 2009-04-19 11:57:08
        4

        Cube-like Attack on Round-Reduced Initialization of Ketje Sr Xiaoyang Dong, Zheng Li, Xiaoyun Wang and Ling Qin Shandong University, Tsinghua University FSE 2017

        Add to Reading List

        Source URL: www.nuee.nagoya-u.ac.jp

        Language: English - Date: 2017-03-06 23:19:26
          5Applied mathematics / Block cipher / Differential cryptanalysis / Cryptanalysis / Symmetric-key algorithm / Data Encryption Standard / Cube attack / Cryptography / Higher-order differential cryptanalysis

          Bit Cryptanalysis on Symmetric Ciphers Xiaoyun Wang Current Trends in Cryptology, Yaroslavl

          Add to Reading List

          Source URL: ctcrypt.ru

          Language: English - Date: 2016-06-10 06:35:42
          6

          How to Break MD5 and Other Hash Functions Xiaoyun Wang and Hongbo Yu Shandong University, Jinan, China, , Abstract. MD5 is one of the most widely used cryptographic hash funct

          Add to Reading List

          Source URL: s3-eu-west-1.amazonaws.com

          Language: English - Date: 2014-12-18 11:32:43
            7Tort law / Ethics / Investment / Auditing / Crimes / Deception / Fraud

            Tracy  Y.  Wang,  University  of  Minnesota   Andrew  Winton,  University  of  Minnesota   Xiaoyun  Yu,  Indiana  University     March  2009  

            Add to Reading List

            Source URL: www.afajof.org

            Language: English - Date: 2014-02-03 01:55:34
            8SHA-1 / Wang Xiaoyun / Serge Vaudenay / Collision resistance / Random oracle / Jean-Jacques Quisquater / Eurocrypt / Cryptography / Cryptographic hash functions / Hashing

            CRYPTO 2005 Rump Session Program 19::35 20::21

            Add to Reading List

            Source URL: www.iacr.org

            Language: English - Date: 2005-08-16 15:12:59
            9MD5 / MD4 / HAVAL / Wang Xiaoyun / X.509 / Hash function / Collision / MD2 / Cryptography / Cryptographic hash functions / Hashing

            Finding MD5 Collisions – a Toy For a Notebook Vlastimil Klíma 1 Prague, Czech Republic http://cryptography.hyperlink.cz March 5, 2005

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2005-03-08 12:38:58
            10Cryptographic hash function / Block cipher / Advanced Encryption Standard / CMAC / LEX / UMAC / HMAC / Message authentication codes / Cryptography / CBC-MAC

            Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC⋆ Zheng Yuan1,2 , Keting Jia3 , Wei Wang3 , and Xiaoyun Wang⋆⋆2,3 1 Beijing Electronic Science and Technology Institute, Beijing 1000

            Add to Reading List

            Source URL: eprint.iacr.org

            Language: English - Date: 2008-12-12 10:35:54
            UPDATE