Yiqun Lisa Yin

According to our database1, Yiqun Lisa Yin authored at least 24 papers between 1995 and 2008.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
Searching monotone multi-dimensional arrays.
Discret. Math., 2008

Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Looking Back at a New Hash Function.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
On searching a table consistent with division poset.
Theor. Comput. Sci., 2007

2006
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions.
IACR Cryptol. ePrint Arch., 2006

2005
Design and Analysis of Password-Based Key Derivation Functions.
IEEE Trans. Inf. Theory, 2005

Collision-Resistant usage of MD5 and SHA-1 via Message Preprocessing.
IACR Cryptol. ePrint Arch., 2005

Finding Collisions in the Full SHA-1.
Proceedings of the Advances in Cryptology, 2005

Efficient Collision Search Attacks on SHA-0.
Proceedings of the Advances in Cryptology, 2005

A Traitor Tracing Scheme Based on RSA for Fast Decryption.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
On Permutation Operations in Cipher Design.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Fast Software-Based Attacks on SecurID.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

2003
Improved Cryptanalysis of SecurID.
IACR Cryptol. ePrint Arch., 2003

2002
A Practice-Oriented Treatment of Pseudorandom Number Generators.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

2001
Efficient Software Implementation for Finite Field Multiplication in Normal Basis.
Proceedings of the Information and Communications Security, Third International Conference, 2001

2000
On the Development of the Advanced Encryption Standard.
Proceedings of the Information Security for Global Information Infrastructures, 2000

RC6 as the AES.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1999
Improved Analysis of Some Simplified Variants of RC6.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Efficient Methods for Integrating Traceability and Broadcast Encryption.
Proceedings of the Advances in Cryptology, 1999

1998
Optimal Constructions of Hybrid Algorithms.
J. Algorithms, 1998

Storage-Efficient Finite Field Basis Conversion.
Proceedings of the Selected Areas in Cryptography '98, 1998

1995
On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm.
Proceedings of the Advances in Cryptology, 1995

Reducing the Number of Queries in Self-Directed Learning.
Proceedings of the Eigth Annual Conference on Computational Learning Theory, 1995

Being Taught can be Faster than Asking Questions.
Proceedings of the Eigth Annual Conference on Computational Learning Theory, 1995


  Loading...