2008 |
28 | EE | Olivier Billet,
Matthew J. B. Robshaw,
Yannick Seurin,
Yiqun Lisa Yin:
Looking Back at a New Hash Function.
ACISP 2008: 239-253 |
27 | EE | Yedidya Hilewitz,
Yiqun Lisa Yin,
Ruby B. Lee:
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation.
FSE 2008: 173-188 |
26 | EE | Yongxi Cheng,
Xiaoming Sun,
Yiqun Lisa Yin:
Searching monotone multi-dimensional arrays.
Discrete Mathematics 308(11): 2213-2221 (2008) |
2007 |
25 | EE | Yongxi Cheng,
Xi Chen,
Yiqun Lisa Yin:
On searching a table consistent with division poset.
Theor. Comput. Sci. 370(1-3): 240-253 (2007) |
2006 |
24 | EE | Scott Contini,
Yiqun Lisa Yin:
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions.
ASIACRYPT 2006: 37-53 |
23 | EE | Michael Szydlo,
Yiqun Lisa Yin:
Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing.
CT-RSA 2006: 99-114 |
2005 |
22 | EE | John Patrick McGregor,
Yiqun Lisa Yin,
Ruby B. Lee:
A Traitor Tracing Scheme Based on RSA for Fast Decryption.
ACNS 2005: 56-74 |
21 | EE | Xiaoyun Wang,
Hongbo Yu,
Yiqun Lisa Yin:
Efficient Collision Search Attacks on SHA-0.
CRYPTO 2005: 1-16 |
20 | EE | Xiaoyun Wang,
Yiqun Lisa Yin,
Hongbo Yu:
Finding Collisions in the Full SHA-1.
CRYPTO 2005: 17-36 |
19 | EE | Frances F. Yao,
Yiqun Lisa Yin:
Design and Analysis of Password-Based Key Derivation Functions.
CT-RSA 2005: 245-261 |
18 | EE | Yongxi Cheng,
Xiaoming Sun,
Yiqun Lisa Yin:
Searching Monotone Multi-dimensional Arrays
CoRR abs/cs/0504026: (2005) |
17 | EE | Yongxi Cheng,
Xi Chen,
Yiqun Lisa Yin:
On Searching a Table Consistent with Division Poset
CoRR abs/cs/0505075: (2005) |
16 | EE | Frances F. Yao,
Yiqun Lisa Yin:
Design and Analysis of Password-Based Key Derivation Functions.
IEEE Transactions on Information Theory 51(9): 3292-3297 (2005) |
2004 |
15 | EE | Scott Contini,
Yiqun Lisa Yin:
Fast Software-Based Attacks on SecurID.
FSE 2004: 454-471 |
14 | EE | Ruby B. Lee,
Zhijie Shi,
Yiqun Lisa Yin,
Ronald L. Rivest,
Matthew J. B. Robshaw:
On Permutation Operations in Cipher Design.
ITCC (2) 2004: 569-577 |
2002 |
13 | EE | Anand Desai,
Alejandro Hevia,
Yiqun Lisa Yin:
A Practice-Oriented Treatment of Pseudorandom Number Generators.
EUROCRYPT 2002: 368-383 |
2001 |
12 | EE | Peng Ning,
Yiqun Lisa Yin:
Efficient Software Implementation for Finite Field Multiplication in Normal Basis.
ICICS 2001: 177-188 |
11 | EE | Ming-Yang Kao,
Yuan Ma,
Michael Sipser,
Yiqun Lisa Yin:
Optimal Constructions of Hybrid Algorithms
CoRR cs.DM/0101028: (2001) |
2000 |
10 | | Ronald L. Rivest,
Matthew J. B. Robshaw,
Yiqun Lisa Yin:
RC6 as the AES.
AES Candidate Conference 2000: 337-342 |
9 | | Yiqun Lisa Yin:
On the Development of the Advanced Encryption Standard.
SEC 2000: 503-504 |
1999 |
8 | EE | Eli Gafni,
Jessica Staddon,
Yiqun Lisa Yin:
Efficient Methods for Integrating Traceability and Broadcast Encryption.
CRYPTO 1999: 372-387 |
7 | EE | Scott Contini,
Ronald L. Rivest,
Matthew J. B. Robshaw,
Yiqun Lisa Yin:
Improved Analysis of Some Simplified Variants of RC6.
FSE 1999: 1-15 |
1998 |
6 | EE | Burton S. Kaliski Jr.,
Yiqun Lisa Yin:
Storage-Efficient Finite Field Basis Conversion.
Selected Areas in Cryptography 1998: 81-93 |
5 | | Ming-Yang Kao,
Yuan Ma,
Michael Sipser,
Yiqun Lisa Yin:
Optimal Constructions of Hybrid Algorithms.
J. Algorithms 29(1): 142-164 (1998) |
1995 |
4 | EE | Yiqun Lisa Yin:
Reducing the Number of Queries in Self-Directed Learning.
COLT 1995: 128-135 |
3 | EE | Ronald L. Rivest,
Yiqun Lisa Yin:
Being Taught can be Faster than Asking Questions.
COLT 1995: 144-151 |
2 | EE | Burton S. Kaliski Jr.,
Yiqun Lisa Yin:
On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm.
CRYPTO 1995: 171-184 |
1994 |
1 | | Ming-Yang Kao,
Yuan Ma,
Michael Sipser,
Yiqun Lisa Yin:
Optimal Constructions of Hybrid Algorithms.
SODA 1994: 372-381 |