Skip to search formSkip to main contentSkip to account menu

Wang Xiaoyun

Known as: Xiaoyun Wang 
Wang Xiaoyun (simplified Chinese: 王小云; traditional Chinese: 王小雲; pinyin: Wáng Xiǎoyún) (born 1966) is a researcher and professor in the Department of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Sharon K. Sagiv, Sheryl L. Rifas-Shiman, Abby F. Fleisch, Thomas F. Webster, Antonia M. Calafat, Xiaoyun Ye, Matthew W. Gillman… 
2015
2015
The Annage gold deposit is located at the east part of the eastern Kunlun orogenic belt. The characteristics of ore-forming… 
2015
2015
The Kalyna block cipher has recently been established as the Ukranian encryption standard in June, 2015. It was selected in a… 
2012
2012
Female, born in 1978, Lecturer. She obtained her master’s degree from Hefei University of Technology in 2005 and her research… 
2011
2011
Hamsi is one of the 14 second-stage candidates in NIST's SHA-3 competition. The only previous attack on this hash function was a… 
2007
2007
This article describes the design and development of knowware system to support automatic construction of knowledge-based systems… 
Highly Cited
2006
Highly Cited
2006
Attacks on AES.- Cache Attacks and Countermeasures: The Case of AES.- Related-Key Impossible Differential Attacks on 8-Round AES… 
Highly Cited
2005
Highly Cited
2005
In this article we show that coding theory can be exploited efficiently for the cryptanalysis of hash functions. We will mainly…