Yiyuan Luo

Orcid: 0000-0002-9557-5100

According to our database1, Yiyuan Luo authored at least 40 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Security-Enhanced Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks.
IEEE Internet Things J., April, 2024

2023
An Open Problem About Monomial Bent Functions.
IEEE Trans. Inf. Theory, December, 2023

Quantum key recovery attacks on tweakable Even-Mansour ciphers.
Quantum Inf. Process., September, 2023

A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To <tt>Midori</tt>, <tt>SKINNY</tt> And <tt>CRAFT</tt>.
Comput. J., May, 2023

New results on quantum boomerang attacks.
Quantum Inf. Process., April, 2023

Quantum attacks against BBB secure PRFs or MACs built from public random permutations.
Quantum Inf. Process., 2023

A Miniaturized Dual U-shaped Patch Antenna for WiFi-6E Applications.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

Quantum Attacks: A View of Data Complexity on Offline Simon's Algorithm.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids.
Wirel. Pers. Commun., 2022

Some efficient quantum circuit implementations of Camellia.
Quantum Inf. Process., 2022

New quantum circuit implementations of SM4 and SM3.
Quantum Inf. Process., 2022

A blockchain-based dynamic and traceable data integrity verification scheme for smart homes.
J. Syst. Archit., 2022

A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs.
IEEE Access, 2022

2021
Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128.
IACR Trans. Symmetric Cryptol., 2021

Two Problems about Monomial Bent Functions.
CoRR, 2021

Forward-Secure Revocable Identity-Based Encryption.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2019
New observation on the key schedule of RECTANGLE.
Sci. China Inf. Sci., 2019

2017
Improvements for Finding Impossible Differentials of Block Cipher Structures.
Secur. Commun. Networks, 2017

Generic attacks on the Lai-Massey scheme.
Des. Codes Cryptogr., 2017

General attacks on compression functions based on key alternating ciphers.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

2016
Biclique cryptanalysis using balanced complete bipartite subgraphs.
Sci. China Inf. Sci., 2016

A proposal for high rate double-block-length hash functions.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

A fuzzy min-max neural network with classification performance irrelevant to the input sequences of samples.
Proceedings of the 3rd International Conference on Systems and Informatics, 2016

2015
The Pseudorandomness of Many-Round Lai-Massey Scheme.
J. Inf. Sci. Eng., 2015

Attacks on a double length blockcipher-based hash proposal.
Cryptogr. Commun., 2015

2014
A unified method for finding impossible differentials of block cipher structures.
Inf. Sci., 2014

2013
Attacks on JH, Grstl and SMASH Hash Functions.
IACR Cryptol. ePrint Arch., 2013

Cryptanalysis of the Lightweight Block Cipher Hummingbird-1.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2011
Attacks On a Double Length Blockcipher-based Hash Proposal.
IACR Cryptol. ePrint Arch., 2011

Indifferentiability of Domain Extension Modes for Hash Functions.
Proceedings of the Trusted Systems - Third International Conference, 2011

Tag Impersonation Attack on Two RFID Mutual Authentication Protocols.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Pseudorandomness analysis of the (extended) Lai-Massey scheme.
Inf. Process. Lett., 2010

More Insights on Blockcipher-Based Hash Functions.
IACR Cryptol. ePrint Arch., 2010

A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication.
Proceedings of the Global Communications Conference, 2010

2009
Impossible Differential Cryptanalysis of FOX.
IACR Cryptol. ePrint Arch., 2009

Pseudorandomness Analysis of the Lai-Massey Scheme.
IACR Cryptol. ePrint Arch., 2009

Revisiting the Indifferentiability of PGV Hash Functions.
IACR Cryptol. ePrint Arch., 2009

Improved Cryptanalysis of the FOX Block Cipher.
Proceedings of the Trusted Systems, First International Conference, 2009

2008
Higher Order Differential Cryptanalysis of Multivariate Hash Functions.
IACR Cryptol. ePrint Arch., 2008


  Loading...