Skip to search formSkip to main contentSkip to account menu

Wang Xiaoyun

Known as: Xiaoyun Wang 
Wang Xiaoyun (simplified Chinese: 王小云; traditional Chinese: 王小雲; pinyin: Wáng Xiǎoyún) (born 1966) is a researcher and professor in the Department of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Sharon K. Sagiv, Sheryl L. Rifas-Shiman, Abby F. Fleisch, Thomas F. Webster, Antonia M. Calafat, Xiaoyun Ye, Matthew W. Gillman… 
2015
2015
The Annage gold deposit is located at the east part of the eastern Kunlun orogenic belt. The characteristics of ore-forming… 
2015
2015
The Kalyna block cipher has recently been established as the Ukranian encryption standard in June, 2015. It was selected in a… 
2011
2011
Hamsi is one of the 14 second-stage candidates in NIST's SHA-3 competition. The only previous attack on this hash function was a… 
2007
2007
This article describes the design and development of knowware system to support automatic construction of knowledge-based systems… 
Highly Cited
2006
Highly Cited
2006
Attacks on AES.- Cache Attacks and Countermeasures: The Case of AES.- Related-Key Impossible Differential Attacks on 8-Round AES… 
2006
2006
This paper describes a control system that aims to maximize the value or utility obtained from a computer service (e.g., e… 
Highly Cited
2005
Highly Cited
2005
In this article we show that coding theory can be exploited efficiently for the cryptanalysis of hash functions. We will mainly…