Seguir
Yiyuan Luo
Yiyuan Luo
School of Computer Science and Engineering, Huizhou University
Dirección de correo verificada de hzu.edu.cn - Página principal
Título
Citado por
Citado por
Año
A unified method for finding impossible differentials of block cipher structures
Y Luo, X Lai, Z Wu, G Gong
Information Sciences 263, 211-220, 2014
992014
A lightweight stream cipher WG-7 for RFID encryption and authentication
Y Luo, Q Chai, G Gong, X Lai
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
892010
A conditional privacy-preserving certificateless aggregate signature scheme in the standard model for VANETs
H Wang, L Wang, K Zhang, J Li, Y Luo
IEEE Access 10, 15605-15618, 2022
282022
Pseudorandomness analysis of the (extended) Lai–Massey scheme
Y Luo, X Lai, Z Gong
Information processing letters 111 (2), 90-96, 2010
242010
Towards key-recovery-attack friendly distinguishers: application to GIFT-128
R Zong, X Dong, H Chen, Y Luo, S Wang, Z Li
IACR Transactions on Symmetric Cryptology, 156-184, 2021
212021
Tag impersonation attack on two RFID mutual authentication protocols
M Safkhani, N Bagheri, M Naderi, Y Luo, Q Chai
2011 Sixth International Conference on Availability, Reliability and …, 2011
172011
WG-7: a lightweight stream cipher with good cryptographic properties
Y Luo, Q Chai, G Gong, X Lai
IEEE Global Communications Conference–GLOBECOM, 1-6, 2010
172010
New quantum circuit implementations of SM4 and SM3
J Zou, L Li, Z Wei, Y Luo, Q Liu, W Wu
Quantum Information Processing 21 (5), 181, 2022
132022
Impossible differential cryptanalysis of FOX
Z Wu, X Lai, B Zhu, Y Luo
Cryptology ePrint Archive, 2009
132009
Improvements for finding impossible differentials of block cipher structures
Y Luo, X Lai
Security and Communication Networks 2017, 2017
102017
The Pseudorandomness of Many-Round Lai-Massey Scheme.
Y Luo, X Lai, J Hu
J. Inf. Sci. Eng. 31 (3), 1085-1096, 2015
102015
On the security of multivariate hash functions
Y Luo, X Lai
Journal of Shanghai Jiaotong University (Science) 14, 219-222, 2009
102009
Revisiting the indifferentiability of PGV hash functions
Y Luo, Z Gong, M Duan, B Zhu, X Lai
Cryptology ePrint Archive, 2009
102009
Improved cryptanalysis of the FOX block cipher
Z Wu, Y Luo, X Lai, B Zhu
International Conference on Trusted Systems, 236-249, 2009
82009
A blockchain-based dynamic and traceable data integrity verification scheme for smart homes
C Chen, L Wang, Y Long, Y Luo, K Chen
Journal of Systems Architecture 130, 102677, 2022
72022
Generic attacks on the Lai–Massey scheme
Y Luo, X Lai, Y Zhou
Designs, Codes and Cryptography 83, 407-423, 2017
72017
A lightweight certificateless aggregate ring signature scheme for privacy protection in smart grids
H Wang, L Wang, M Wen, K Chen, Y Luo
Wireless Personal Communications 126 (2), 1577-1599, 2022
62022
Some efficient quantum circuit implementations of camellia
J Zou, Z Wei, S Sun, Y Luo, Q Liu, W Wu
Quantum Information Processing 21 (4), 131, 2022
62022
Attacks on a double length blockcipher-based hash proposal
Y Luo, X Lai, T Jia
Cryptography and communications 7, 289-295, 2015
62015
Cryptanalysis of the lightweight block cipher hummingbird-1
X Chen, Y Zhu, Z Gong, Y Luo
2013 Fourth International Conference on Emerging Intelligent Data and Web …, 2013
62013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20