Xiaoyun Wang

Orcid: 0000-0002-7846-269X

Affiliations:
  • Shandong University, Key Laboratory of Cryptologic Technology and Information Security, China
  • Tsinghua University, Institute for Advanced Study, Beijing, China


According to our database1, Xiaoyun Wang authored at least 146 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Multistatic Integrated Sensing and Communication System Based on Macro-Micro Cooperation.
Sensors, April, 2024

Generic MitM Attack Frameworks on Sponge Constructions.
IACR Cryptol. ePrint Arch., 2024

Dashing and Star: Byzantine Fault Tolerance with Weak Certificates.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024

2023
Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Weak-Diffusion Structure: Meet-in-the-Middle Attacks on Sponge-based Hashing Revisited.
IACR Cryptol. ePrint Arch., 2023

Automated Meet-in-the-Middle Attack Goes to Feistel.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Impact of Errors in Environmental Correction on Gravity Field Recovery Using Interferometric Radar Altimeter Observations.
Remote. Sens., December, 2022

Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing.
IACR Cryptol. ePrint Arch., 2022

Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256.
IACR Cryptol. ePrint Arch., 2022

Improved MITM Cryptanalysis on Streebog.
IACR Cryptol. ePrint Arch., 2022

Accelerated GNN Training with DGL and RAPIDS cuGraph in a Fraud Detection Workflow.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

2021
A dedicated hardware accelerator for real-time acceleration of YOLOv2.
J. Real Time Image Process., 2021

Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems.
IACR Cryptol. ePrint Arch., 2021

Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny.
IACR Cryptol. ePrint Arch., 2021

Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials.
IACR Cryptol. ePrint Arch., 2021

Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks.
IACR Cryptol. ePrint Arch., 2021

Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks.
IACR Cryptol. ePrint Arch., 2021

Error estimation of practical convolution discrete Gaussian sampling with rejection sampling.
Sci. China Inf. Sci., 2021

Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
x-only coordinate: with application to secp256k1 " >Chosen base-point side-channel attack on Montgomery ladder with <i>x</i>-only coordinate: with application to secp256k1.
IET Inf. Secur., 2020

Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories.
IACR Cryptol. ePrint Arch., 2020

Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.
IACR Cryptol. ePrint Arch., 2020

Quantum attacks on some feistel block ciphers.
Des. Codes Cryptogr., 2020

2019
An EOG-Based Human-Machine Interface to Control a Smart Home Environment for Patients With Severe Spinal Cord Injuries.
IEEE Trans. Biomed. Eng., 2019

New Distinguisher on Reduced-Round Keccak Sponge Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash.
IACR Cryptol. ePrint Arch., 2019

Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications.
IACR Cryptol. ePrint Arch., 2019

New Conditional Cube Attack on Keccak Keyed Modes.
IACR Cryptol. ePrint Arch., 2019

MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes.
Des. Codes Cryptogr., 2019

GraphDefense: Towards Robust Graph Convolutional Networks.
CoRR, 2019

Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256.
Sci. China Inf. Sci., 2019

A regulated digital currency.
Sci. China Inf. Sci., 2019

Quantum cryptanalysis on some generalized Feistel schemes.
Sci. China Inf. Sci., 2019

A Scalable OpenCL-Based FPGA Accelerator for YOLOv2.
Proceedings of the 27th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2019

2018
Analysis of Software Implemented Low Entropy Masking Schemes.
Secur. Commun. Networks, 2018

Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques.
Secur. Commun. Networks, 2018

Improved integral attacks without full codebook.
IET Inf. Secur., 2018

MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC.
IACR Cryptol. ePrint Arch., 2018

A Refinement of "A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018.
IACR Cryptol. ePrint Arch., 2018

A Key-recovery Attack on 855-round Trivium.
IACR Cryptol. ePrint Arch., 2018

Conditional cube attack on round-reduced River Keyak.
Des. Codes Cryptogr., 2018

More or Less? Predict the Social Influence of Malicious URLs on Social Media.
CoRR, 2018

Attack Graph Convolutional Networks by Adding Fake Nodes.
CoRR, 2018

Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on Graphs.
CoRR, 2018

Impossible differential attack on Simpira v2.
Sci. China Inf. Sci., 2018

Orthogonalized lattice enumeration for solving SVP.
Sci. China Inf. Sci., 2018

Differential attacks on reduced SIMON versions with dynamic key-guessing techniques.
Sci. China Inf. Sci., 2018

Quantum key-recovery attack on Feistel structures.
Sci. China Inf. Sci., 2018

Improved automatic search of impossible differentials for camellia with <i>FL</i>/<i>FL</i> <sup>-1</sup> layers.
Sci. China Inf. Sci., 2018

Multiple Accounts Detection on Facebook Using Semi-Supervised Learning on Graphs.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

A Scalable FPGA Accelerator for Convolutional Neural Networks.
Proceedings of the Advanced Computer Architecture - 12th Conference, 2018

2017
3-D-MIMO With Massive Antennas Paves the Way to 5G Enhanced Mobile Broadband: From System Design to Field Trials.
IEEE J. Sel. Areas Commun., 2017

A Key Backup Scheme Based on Bitcoin.
IACR Cryptol. ePrint Arch., 2017

Provably Secure NTRUEncrypt over More General Cyclotomic Rings.
IACR Cryptol. ePrint Arch., 2017

Conditional Cube Attack on Round-Reduced ASCON.
IACR Cryptol. ePrint Arch., 2017

Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.
IACR Cryptol. ePrint Arch., 2017

Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently.
IACR Cryptol. ePrint Arch., 2017

Cube-like Attack on Round-Reduced Initialization of Ketje Sr.
IACR Cryptol. ePrint Arch., 2017

Provably Secure NTRU Instances over Prime Cyclotomic Rings.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Attacking strategies and temporal analysis involving Facebook discussion groups.
Proceedings of the 13th International Conference on Network and Service Management, 2017

2016
Orthogonalized Lattice Enumeration for Solving SVP.
IACR Cryptol. ePrint Arch., 2016

Conditional Cube Attack on Reduced-Round Keccak Sponge Function.
IACR Cryptol. ePrint Arch., 2016

Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis of Midori128 Using Impossible Differential Techniques.
Proceedings of the Information Security Practice and Experience, 2016

Cryptanalysis of a Homomorphic Encryption Scheme Over Integers.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256.
IET Inf. Secur., 2015

Improved Attacks on Reduced-Round Camellia-128/192/256.
IACR Cryptol. ePrint Arch., 2015

Impossible Differential Cryptanalysis of Reduced Round SIMON.
IACR Cryptol. ePrint Arch., 2015

Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques.
IACR Cryptol. ePrint Arch., 2015

Improved Impossible Differential Attack on Reduced-Round LBlock.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Finding Shortest Lattice Vectors in the Presence of Gaps.
Proceedings of the Topics in Cryptology, 2015

2014
Cryptanalysis of GOST R hash function.
Inf. Process. Lett., 2014

A note on BDD problems with λ<sub>2</sub>-gap.
Inf. Process. Lett., 2014

Differential Analysis on Block Cipher PRIDE.
IACR Cryptol. ePrint Arch., 2014

Improved Differential Attacks on Reduced SIMON Versions.
IACR Cryptol. ePrint Arch., 2014

A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge.
IACR Cryptol. ePrint Arch., 2014

New transference theorems on lattices possessing n<sup>∈</sup>-unique shortest vectors.
Discret. Math., 2014

Dynamical analysis and perturbation solution of an SEIR epidemic model.
Appl. Math. Comput., 2014

Improved Single-Key Attacks on 9-Round AES-192/256.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

A study on monoamine neurotransmitters in ovariectomized female rats with different Chinese herbs treatment.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014

Regional homogeneity change in female depressive patients after abdominal acupuncture treatment.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014

2013
Fault Rate Analysis: Breaking Masked AES Hardware Implementations Efficiently.
IEEE Trans. Circuits Syst. II Express Briefs, 2013

Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE.
IACR Cryptol. ePrint Arch., 2013

Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256.
IACR Cryptol. ePrint Arch., 2013

Novel results for a class of singular perturbed slow-fast system.
Appl. Math. Comput., 2013

Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

Improved Boomerang Attacks on SM3.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
The Boomerang Attacks on the Round-Reduced Skein-512.
IACR Cryptol. ePrint Arch., 2012

New Transference Theorems on Lattices Possessing n<sup>ε</sup>-unique Shortest Vectors.
IACR Cryptol. ePrint Arch., 2012

Public key encryption without random oracle made truly practical.
Comput. Electr. Eng., 2012

Improved Cryptanalysis of the Block Cipher KASUMI.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Cryptanalysis of a homomorphic encryption scheme from ISIT 2008.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012

2011
Near-Collision Attack on the Step-Reduced Compression Function of Skein-256.
IACR Cryptol. ePrint Arch., 2011

Public Key Encryption for the Forgetful.
IACR Cryptol. ePrint Arch., 2011

The Fault Attack ECDLP Revisited.
IACR Cryptol. ePrint Arch., 2011

Attack Cryptosystems Based on HCDLP.
IACR Cryptol. ePrint Arch., 2011

Shortest Lattice Vectors in the Presence of Gaps.
IACR Cryptol. ePrint Arch., 2011

Multiplied Conditional Impossible Differential Attack on Reduced-Round Camellia.
IACR Cryptol. ePrint Arch., 2011

A Meet-in-the-Middle Attack on the Full KASUMI.
IACR Cryptol. ePrint Arch., 2011

New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256.
IACR Cryptol. ePrint Arch., 2011

Practical Attack on the Full MMB Block Cipher.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

2010
New Differential Cryptanalytic Results for Reduced-Round CAST-128.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Cryptanalysis of the Compression Function of SIMD.
IACR Cryptol. ePrint Arch., 2010

Skew-Frobenius map on twisted Edwards curve.
IACR Cryptol. ePrint Arch., 2010

Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem.
IACR Cryptol. ePrint Arch., 2010

Practical-time Attack on the Full MMB Block Cipher.
IACR Cryptol. ePrint Arch., 2010

Differential-algebraic cryptanalysis of reduced-round of Serpent-256.
Sci. China Inf. Sci., 2010

On an attack on RSA with small CRT-exponents.
Sci. China Inf. Sci., 2010

2009
On the Security of Stream Cipher CryptMT v3.
IACR Cryptol. ePrint Arch., 2009

Cryptanalysis of Stream Cipher Grain Family.
IACR Cryptol. ePrint Arch., 2009

Near-Collision Attack on the Compression Function of Dynamic SHA2.
IACR Cryptol. ePrint Arch., 2009

Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES.
IACR Cryptol. ePrint Arch., 2009

New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256.
IACR Cryptol. ePrint Arch., 2009

Pseudo-Cryptanalysis of Luffa.
IACR Cryptol. ePrint Arch., 2009

Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL.
Proceedings of the Information Security Practice and Experience, 2009

New Distinguishing Attack on MAC Using Secret-Prefix Method.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC.
Proceedings of the Advances in Cryptology, 2009

New Birthday Attacks on Some MACs Based on Block Ciphers.
Proceedings of the Advances in Cryptology, 2009

Distinguishing and Second-Preimage Attacks on CBC-Like MACs.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC.
IACR Cryptol. ePrint Arch., 2008

Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs.
IACR Cryptol. ePrint Arch., 2008

Fast correlation attack on stream cipher ABC v3.
Sci. China Ser. F Inf. Sci., 2008

New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

2007
MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL.
IACR Cryptol. ePrint Arch., 2007

Improved Impossible Differential Cryptanalysis of CLEFIA.
IACR Cryptol. ePrint Arch., 2007

Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4.
Proceedings of the Information Security and Cryptology, 2007

Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL.
Proceedings of the Information Security and Cryptology, 2007

Some Mathematical Problems in Cryptanalysis.
Proceedings of the Computer Mathematics, 8th Asian Symposium, 2007

2006
Progress and Prospect of Some Fundamental Research on Information Security in China.
J. Comput. Sci. Technol., 2006

The Probability Advantages of Two Linear Expressions in Symmetric Ciphers.
IACR Cryptol. ePrint Arch., 2006

Cryptanalysis of the Full HAVAL with 4 and 5 Passes.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

2005
Colliding X.509 Certificates.
IACR Cryptol. ePrint Arch., 2005

An attack on hash function HAVAL-128.
Sci. China Ser. F Inf. Sci., 2005

An efficient proxy signature scheme in home network DRM.
Proceedings of the ICETE 2005, 2005

How to Break MD5 and Other Hash Functions.
Proceedings of the Advances in Cryptology, 2005

Cryptanalysis of the Hash Functions MD4 and RIPEMD.
Proceedings of the Advances in Cryptology, 2005

Finding Collisions in the Full SHA-1.
Proceedings of the Advances in Cryptology, 2005

Efficient Collision Search Attacks on SHA-0.
Proceedings of the Advances in Cryptology, 2005

The Second-Preimage Attack on MD4.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1.
IACR Cryptol. ePrint Arch., 2004

Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD.
IACR Cryptol. ePrint Arch., 2004

2000
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms.
Proceedings of the Public Key Cryptography, 2000


  Loading...