Name
Papers
Collaborators
XIAOYUN WANG
126
145
Citations 
PageRank 
Referers 
2338
170.86
2435
Referees 
References 
1003
976
Search Limit
1001000
Title
Citations
PageRank
Year
Mind the TWEAKEY Schedule: Cryptanalysis on SKINNYe-64-256.00.342022
A Detailed Analysis Of Primal Attack And Its Variants00.342022
Improved MITM Cryptanalysis on Streebog00.342022
Meet-In-The-Middle Attacks Revisited: Key-Recovery, Collision, And Preimage Attacks00.342021
Automatic Classical and Quantum Rebound Attacks on AES-Like Hashing by Exploiting Related-Key Differentials.00.342021
A Dedicated Hardware Accelerator For Real-Time Acceleration Of Yolov210.372021
Preimage Attacks on 4-Round Keccak by Solving Multivariate Quadratic Systems00.342021
Retraction: The Correlation Between Social Transformation Economic Risk And Internet Public Opinion (Retraction Of Vol 40, Pg 723, 2020)00.342021
Chosen Base-Point Side-Channel Attack On Montgomery Ladder Withx-Only Coordinate: With Application To Secp256k100.342020
New Conditional Cube Attack On Keccak Keyed Modes00.342019
New Distinguisher On Reduced-Round Keccak Sponge Function00.342019
A regulated digital currency40.432019
A Scalable OpenCL-Based FPGA Accelerator for YOLOv200.342019
Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications.00.342019
Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash.00.342019
Improved automatic search of impossible differentials for camellia with / layers.10.352018
Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256.00.342018
Error Estimation of Practical Convolution Discrete Gaussian Sampling.00.342018
Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques.00.342018
Conditional Cube Attack on Round-Reduced River Keyak.10.352018
Quantum attacks on some feistel block ciphers20.402018
Impossible Differential Attack on Simpira v2.00.342018
A Key-recovery Attack on 855-round Trivium.20.372018
Differential attacks on reduced SIMON versions with dynamic key-guessing techniques.10.352018
Improved automatic search of impossible differentials for camellia with FL/FL -1 layers.10.352018
Improved integral attacks without full codebook.00.342018
MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes.00.342018
Quantum Key-recovery Attack on Feistel Structures.00.342018
Analysis of Software Implemented Low Entropy Masking Schemes.00.342018
The Application of Dynamic Models to the Exploration of β1-AR Overactivation as a Cause of Heart Failure.00.342018
Impossible Differential Attack on Midori128 Using Rebound-like Technique.00.342017
A Key Backup Scheme Based on Bitcoin.00.342017
Quantum Cryptanalysis on Some Generalized Feistel Schemes.30.412017
Conditional Cube Attack On Round-Reduced Ascon40.552017
Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently.00.342017
Conditional Cube Attack on Reduced-Round Keccak Sponge Function.70.482017
Provably Secure NTRUEncrypt over More General Cyclotomic Rings.00.342017
Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method.40.412017
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques.120.612016
Cryptanalysis of a Homomorphic Encryption Scheme Over Integers.00.342016
Enhancing Cognitive Control for Improvement of Inspection Performance: A Study of Construction Safety.00.342016
Improved Attacks on Reduced-Round Camellia-128/192/256.50.412015
A Genetic Algorithm for Searching the Shortest Lattice Vector of SVP Challenge30.412015
Impossible Differential Cryptanalysis of Reduced Round SIMON.80.582015
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia60.472015
Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-25640.482015
Finding Shortest Lattice Vectors in the Presence of Gaps.10.352015
Improved Impossible Differential Attack on Reduced-Round LBlock.10.352015
Improved Differential Attacks on Reduced SIMON Versions.80.602014
A note on BDD problems with λ2 -gap00.342014
  • 1
  • 2