Skip to search formSkip to main contentSkip to account menu

Wang Xiaoyun

Known as: Xiaoyun Wang 
Wang Xiaoyun (simplified Chinese: 王小云; traditional Chinese: 王小雲; pinyin: Wáng Xiǎoyún) (born 1966) is a researcher and professor in the Department of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Sharon K. Sagiv, Sheryl L. Rifas-Shiman, Abby F. Fleisch, Thomas F. Webster, Antonia M. Calafat, Xiaoyun Ye, Matthew W. Gillman… 
2015
2015
The Annage gold deposit is located at the east part of the eastern Kunlun orogenic belt. The characteristics of ore-forming… 
2015
2015
The Kalyna block cipher has recently been established as the Ukranian encryption standard in June, 2015. It was selected in a… 
2011
2011
Hamsi is one of the 14 second-stage candidates in NIST's SHA-3 competition. The only previous attack on this hash function was a… 
2007
2007
  • L. Ding
  • Second International Conference on Innovative…
  • 2007
  • Corpus ID: 28682323
This article describes the design and development of knowware system to support automatic construction of knowledge-based systems… 
Highly Cited
2006
Highly Cited
2006
Attacks on AES.- Cache Attacks and Countermeasures: The Case of AES.- Related-Key Impossible Differential Attacks on 8-Round AES… 
Highly Cited
2006
Highly Cited
2006
In this paper, we present an improved attack algorithm to find two-block colli- sions of the hash function MD5. The attack uses… 
Highly Cited
2005
Highly Cited
2005
A tubular aluminum housing, having vertically centered pinpoint light bulbs at either end in nose cones, is suspended on a stand… 
Highly Cited
2005
Highly Cited
2005
In this article we show that coding theory can be exploited efficiently for the cryptanalysis of hash functions. We will mainly…