Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 219,937,503 papers from all fields of science
Search
Sign In
Create Free Account
Wang Xiaoyun
Known as:
Xiaoyun Wang
Wang Xiaoyun (simplified Chinese: 王小云; traditional Chinese: 王小雲; pinyin: Wáng Xiǎoyún) (born 1966) is a researcher and professor in the Department of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Collision attack
FORK-256
Frances Yao
Hash function
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Early pregnancy perfluoroalkyl substance plasma concentrations and birth outcomes in Project Viva : confounded by pregnancy hemodynamics ?
S. Sagiv
,
S. Rifas-Shiman
,
+6 authors
E. Oken
2018
Corpus ID: 54973900
Sharon K. Sagiv, Sheryl L. Rifas-Shiman, Abby F. Fleisch, Thomas F. Webster, Antonia M. Calafat, Xiaoyun Ye, Matthew W. Gillman…
Expand
2015
2015
Characteristics of Fluid Inclusions and Metallogenesis of Annage Gold Deposit in Qinghai Province, China
J. Lai
,
P. Ju
,
Jinjin Tao
,
Bao Yang
,
Xiao-ying Wang
2015
Corpus ID: 52428419
The Annage gold deposit is located at the east part of the eastern Kunlun orogenic belt. The characteristics of ore-forming…
Expand
2015
2015
Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512
Akshima
,
D. Chang
,
Mohona Ghosh
,
Aarushi Goel
,
S. K. Sanadhya
International Conference on Information Security…
2015
Corpus ID: 6205686
The Kalyna block cipher has recently been established as the Ukranian encryption standard in June, 2015. It was selected in a…
Expand
2012
2012
Efficient HMAC-based secure communication for VANETs
Changhui Hu
,
T. W. Chim
,
S. Yiu
,
L. Hui
,
V. Li
Comput. Networks
2012
Corpus ID: 14743435
2012
2012
A public key cryptosystem based on three new provable problems
Shenghui Su
,
Shuwang Lü
Theoretical Computer Science
2012
Corpus ID: 19882869
2012
2012
Influence of impact energy on work hardening ability of austenitic manganese steel and its mechanism
Li
,
Xiaoyun
,
+7 authors
Xianfeng
2012
Corpus ID: 73593547
Female, born in 1978, Lecturer. She obtained her master’s degree from Hefei University of Technology in 2005 and her research…
Expand
2011
2011
An Improved Algebraic Attack on Hamsi-256
Itai Dinur
,
A. Shamir
Fast Software Encryption Workshop
2011
Corpus ID: 11999228
Hamsi is one of the 14 second-stage candidates in NIST's SHA-3 competition. The only previous attack on this hash function was a…
Expand
2007
2007
Design and Development of Knowware System
L. Ding
International Conference on Innovative Computing…
2007
Corpus ID: 28682323
This article describes the design and development of knowware system to support automatic construction of knowledge-based systems…
Expand
Highly Cited
2006
Highly Cited
2006
Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings
D. Pointcheval
The Cryptographer's Track at RSA Conference
2006
Corpus ID: 29323551
Attacks on AES.- Cache Attacks and Countermeasures: The Case of AES.- Related-Key Impossible Differential Attacks on 8-Round AES…
Expand
Highly Cited
2005
Highly Cited
2005
Exploiting Coding Theory for Collision Attacks on SHA-1
Norbert Pramstaller
,
Christian Rechberger
,
V. Rijmen
IMA Conference on Cryptography and Coding
2005
Corpus ID: 1679226
In this article we show that coding theory can be exploited efficiently for the cryptanalysis of hash functions. We will mainly…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required