Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Wang Xiaoyun

Known as: Xiaoyun Wang 
Wang Xiaoyun (simplified Chinese: 王小云; traditional Chinese: 王小雲; pinyin: Wáng Xiǎoyún) (born 1966) is a researcher and professor in the Department of… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
We perform a coupled-channels calculation of the masses of light mesons with the quantum numbers $IJ^{P=-}$, $(I,J)=0,1$, by… Expand
  • table I
  • table II
  • table III
  • figure 1
  • table IV
2015
2015
The Kalyna block cipher has recently been established as the Ukranian encryption standard in June, 2015. It was selected in a… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2015
2015
The Annage gold deposit is located at the east part of the eastern Kunlun orogenic belt. The characteristics of ore-forming… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
2012
2012
Vehicular Ad Hoc Network (VANET) is an emerging type of network which facilitates vehicles on roads to communicate for driving… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • table I
2012
2012
In this paper, the authors give the definitions of a coprime sequence and a lever function, and describe the five algorithms and… Expand
2007
2007
  • L. Ding
  • Second International Conference on Innovative…
  • 2007
  • Corpus ID: 28682323
This article describes the design and development of knowware system to support automatic construction of knowledge-based systems… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
Highly Cited
2006
Highly Cited
2006
Attacks on AES.- Cache Attacks and Countermeasures: The Case of AES.- Related-Key Impossible Differential Attacks on 8-Round AES… Expand
2006
2006
  • M. Karlsson
  • IEEE International Conference on Networking…
  • 2006
  • Corpus ID: 41492615
This paper describes a control system that aims to maximize the value or utility obtained from a computer service (e.g., e… Expand
  • figure 1
  • figure 3
  • figure 2
  • figure 4
  • figure 5
Highly Cited
2005
Highly Cited
2005
A tubular aluminum housing, having vertically centered pinpoint light bulbs at either end in nose cones, is suspended on a stand… Expand
  • table 1
  • table 2
  • table 4
  • table 5
  • table 6
Highly Cited
2005
Highly Cited
2005
In this article we show that coding theory can be exploited efficiently for the cryptanalysis of hash functions. We will mainly… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
  • figure 2