2009 |
23 | EE | Xiaoyun Wang,
Hongbo Yu,
Wei Wang,
Haina Zhang,
Tao Zhan:
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC.
EUROCRYPT 2009: 121-133 |
22 | EE | Hongbo Yu,
Xiaoyun Wang:
Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL.
ISPEC 2009: 285-297 |
2008 |
21 | | Xiaoyun Wang,
Wanping Zheng,
Yan-Ru Hu:
Active Flatness Control of Thermally Disturbed Membranes Using an Adaptive Genetic Algorithm.
ARCS 2008: 45-52 |
20 | EE | Haina Zhang,
Lin Li,
Xiaoyun Wang:
Fast correlation attack on stream cipher ABC v3.
Science in China Series F: Information Sciences 51(7): 936-947 (2008) |
2007 |
19 | | Tatsuaki Okamoto,
Xiaoyun Wang:
Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings
Springer 2007 |
18 | EE | Xiaoyun Wang:
Some Mathematical Problems in Cryptanalysis.
ASCM 2007: 322 |
17 | EE | Hongbo Yu,
Xiaoyun Wang:
Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL.
ICISC 2007: 206-226 |
16 | EE | Haina Zhang,
Xiaoyun Wang:
Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4.
ICISC 2007: 227-238 |
2006 |
15 | EE | Hongbo Yu,
Xiaoyun Wang,
Aaram Yun,
Sangwoo Park:
Cryptanalysis of the Full HAVAL with 4 and 5 Passes.
FSE 2006: 89-110 |
14 | | Xiaoyun Wang,
James K. Mills:
Dual-modal Control of Configuration-dependent Linkage Vibration in a Smart Parallel Manipulator.
ICRA 2006: 3544-3549 |
13 | EE | Xiaoyun Wang,
James K. Mills:
Modal Control Design of Configuration-Dependent Linkage Vibration in a Parallel Robot Through Experimental Identification.
IROS 2006: 3225-3230 |
12 | EE | Dengguo Feng,
Xiaoyun Wang:
Progress and Prospect of Some Fundamental Research on Information Security in China.
J. Comput. Sci. Technol. 21(5): 740-755 (2006) |
2005 |
11 | EE | Hongbo Yu,
Gaoli Wang,
Guoyan Zhang,
Xiaoyun Wang:
The Second-Preimage Attack on MD4.
CANS 2005: 1-12 |
10 | EE | Xiaoyun Wang,
Hongbo Yu,
Yiqun Lisa Yin:
Efficient Collision Search Attacks on SHA-0.
CRYPTO 2005: 1-16 |
9 | EE | Xiaoyun Wang,
Yiqun Lisa Yin,
Hongbo Yu:
Finding Collisions in the Full SHA-1.
CRYPTO 2005: 17-36 |
8 | EE | Xiaoyun Wang,
Xuejia Lai,
Dengguo Feng,
Hui Chen,
Xiuyuan Yu:
Cryptanalysis of the Hash Functions MD4 and RIPEMD.
EUROCRYPT 2005: 1-18 |
7 | EE | Xiaoyun Wang,
Hongbo Yu:
How to Break MD5 and Other Hash Functions.
EUROCRYPT 2005: 19-35 |
6 | | Xiaoyun Wang,
Kefei Chen:
An efficient proxy signature scheme in home network DRM.
ICETE 2005: 191-196 |
5 | | Yuxin Su,
Dong Sun,
Lu Ren,
Xiaoyun Wang,
James K. Mills:
Nonlinear PD Synchronized Control for Parallel Manipulators.
ICRA 2005: 1374-1379 |
4 | | Xiaoyun Wang,
James K. Mills:
Active Control of Configuration-Dependent Linkage Vibration with Application to a Planar Parallel Platform.
ICRA 2005: 4327-4332 |
2004 |
3 | EE | Xiaoyun Wang,
Lizhen Yang,
Kefei Chen:
SDD: Secure Distributed Diffusion Protocol for Sensor Networks.
ESAS 2004: 205-214 |
2 | EE | Xiaoyun Wang,
James K. Mills:
A FEM Model for Active Vibration Control of Flexible Linkages.
ICRA 2004: 4308-4313 |
2000 |
1 | | Xiaoyun Wang,
Lucas Chi Kwong Hui,
K. P. Chow,
Wai Wan Tsang,
C. F. Chong,
H. W. Chan:
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms.
Public Key Cryptography 2000: 167-177 |