Xiaoyun Wang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

23EEXiaoyun Wang, Hongbo Yu, Wei Wang, Haina Zhang, Tao Zhan: Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. EUROCRYPT 2009: 121-133
22EEHongbo Yu, Xiaoyun Wang: Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL. ISPEC 2009: 285-297
21 Xiaoyun Wang, Wanping Zheng, Yan-Ru Hu: Active Flatness Control of Thermally Disturbed Membranes Using an Adaptive Genetic Algorithm. ARCS 2008: 45-52
20EEHaina Zhang, Lin Li, Xiaoyun Wang: Fast correlation attack on stream cipher ABC v3. Science in China Series F: Information Sciences 51(7): 936-947 (2008)
19 Tatsuaki Okamoto, Xiaoyun Wang: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings Springer 2007
18EEXiaoyun Wang: Some Mathematical Problems in Cryptanalysis. ASCM 2007: 322
17EEHongbo Yu, Xiaoyun Wang: Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. ICISC 2007: 206-226
16EEHaina Zhang, Xiaoyun Wang: Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4. ICISC 2007: 227-238
15EEHongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park: Cryptanalysis of the Full HAVAL with 4 and 5 Passes. FSE 2006: 89-110
14 Xiaoyun Wang, James K. Mills: Dual-modal Control of Configuration-dependent Linkage Vibration in a Smart Parallel Manipulator. ICRA 2006: 3544-3549
13EEXiaoyun Wang, James K. Mills: Modal Control Design of Configuration-Dependent Linkage Vibration in a Parallel Robot Through Experimental Identification. IROS 2006: 3225-3230
12EEDengguo Feng, Xiaoyun Wang: Progress and Prospect of Some Fundamental Research on Information Security in China. J. Comput. Sci. Technol. 21(5): 740-755 (2006)
11EEHongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang: The Second-Preimage Attack on MD4. CANS 2005: 1-12
10EEXiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin: Efficient Collision Search Attacks on SHA-0. CRYPTO 2005: 1-16
9EEXiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu: Finding Collisions in the Full SHA-1. CRYPTO 2005: 17-36
8EEXiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu: Cryptanalysis of the Hash Functions MD4 and RIPEMD. EUROCRYPT 2005: 1-18
7EEXiaoyun Wang, Hongbo Yu: How to Break MD5 and Other Hash Functions. EUROCRYPT 2005: 19-35
6 Xiaoyun Wang, Kefei Chen: An efficient proxy signature scheme in home network DRM. ICETE 2005: 191-196
5 Yuxin Su, Dong Sun, Lu Ren, Xiaoyun Wang, James K. Mills: Nonlinear PD Synchronized Control for Parallel Manipulators. ICRA 2005: 1374-1379
4 Xiaoyun Wang, James K. Mills: Active Control of Configuration-Dependent Linkage Vibration with Application to a Planar Parallel Platform. ICRA 2005: 4327-4332
3EEXiaoyun Wang, Lizhen Yang, Kefei Chen: SDD: Secure Distributed Diffusion Protocol for Sensor Networks. ESAS 2004: 205-214
2EEXiaoyun Wang, James K. Mills: A FEM Model for Active Vibration Control of Flexible Linkages. ICRA 2004: 4308-4313
1 Xiaoyun Wang, Lucas Chi Kwong Hui, K. P. Chow, Wai Wan Tsang, C. F. Chong, H. W. Chan: Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms. Public Key Cryptography 2000: 167-177

Coauthor Index

1H. W. Chan [1]
2Hui Chen [8]
3Kefei Chen [3] [6]
4C. F. Chong [1]
5K. P. Chow [1]
6Dengguo Feng [8] [12]
7Yan-Ru Hu [21]
8Lucas Chi Kwong Hui [1]
9Xuejia Lai [8]
10Lin Li [20]
11James K. Mills [2] [4] [5] [13] [14]
12Tatsuaki Okamoto [19]
13Sangwoo Park [15]
14Lu Ren [5]
15Yuxin Su [5]
16Dong Sun [5]
17Wai Wan Tsang [1]
18Gaoli Wang [11]
19Wei Wang [23]
20Lizhen Yang [3]
21Yiqun Lisa Yin [9] [10]
22Hongbo Yu [7] [9] [10] [11] [15] [17] [22] [23]
23Xiuyuan Yu [8]
24Aaram Yun [15]
25Tao Zhan [23]
26Guoyan Zhang [11]
27Haina Zhang [16] [20] [23]
28Wanping Zheng [21]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)