Folgen
Hailun Yan
Hailun Yan
Zugehörigkeit unbekannt
Keine bestätigte E-Mail-Adresse
Titel
Zitiert von
Zitiert von
Jahr
New attacks on LowMC instances with a single plaintext/ciphertext pair
S Banik, K Barooti, S Vaudenay, H Yan
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
162021
Transposition of AES key schedule
J Huang, H Yan, X Lai
Information Security and Cryptology: 12th International Conference, Inscrypt …, 2017
152017
New zero‐sum distinguishers on full 24‐round Keccak ‐f using the division property
H Yan, X Lai, L Wang, Y Yu, Y Xing
IET Information Security 13 (5), 469-478, 2019
132019
Meet-in-the-middle preimage attacks on sponge-based hashing
L Qin, J Hua, X Dong, H Yan, X Wang
Annual International Conference on the Theory and Applications of …, 2023
102023
Symmetric asynchronous ratcheted communication with associated data
H Yan, S Vaudenay
Advances in Information and Computer Security: 15th International Workshop …, 2020
82020
Security evaluation and improvement of a white-box SMS4 implementation based on affine equivalence algorithm
T Lin, H Yan, X Lai, Y Zhong, Y Jia
The Computer Journal 61 (12), 1783-1790, 2018
72018
New observation on the key schedule of RECTANGLE
H Yan, Y Luo, M Chen, X Lai
Science China Information Sciences 62, 1-13, 2019
42019
Secure key-alternating Feistel ciphers without key schedule
Y Shen, H Yan, L Wang, X Lai
Science China Information Sciences 64, 1-3, 2021
32021
Tweaking Key-Alternating Feistel Block Ciphers
H Yan, L Wang, Y Shen, X Lai
International Conference on Applied Cryptography and Network Security, 69-88, 2020
22020
Optimal Symmetric Ratcheting for Secure Communication
H Yan, S Vaudenay, D Collins, A Caforio
The Computer Journal 66 (4), 987-1016, 2023
12023
XMSS-SM3 and MT-XMSS-SM3: Instantiating Extended Merkle Signature Schemes with SM3
S Sun, T Liu, Z Guan, Y He, J Jing, L Hu, Z Zhang, H Yan
Cryptology ePrint Archive, 2022
12022
LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3
S Sun, T Liu, Z Guan, Y He, J Jing, L Hu, Z Zhang, H Yan
Cryptology ePrint Archive, 2022
12022
Several methods for constructing white-box solutions
T Lin, H Yan, X Lai, W Qiu
Journal of Physics: Conference Series 1288 (1), 012005, 2019
12019
Revisit and Cryptanalysis of a CAST Cipher
X Zhou, J Li, X Lai, H Yan
DEStech Transactions on Computer Science and Engineering, 0
1
A Security-Enhanced Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks
Z Xu, L Wang, Y Luo, Y Long, K Zhang, H Yan, K Chen
IEEE Internet of Things Journal, 2023
2023
Enabling Privacy-Preserving Data Sharing with Bilateral Access Control for Cloud
T Wu, X Ma, H Yan
Electronics 12 (23), 4798, 2023
2023
New cryptanalysis of LowMC with algebraic techniques
W Qiao, H Yan, S Sun, L Hu, J Jing
Designs, Codes and Cryptography 91 (5), 2057-2075, 2023
2023
General Results of Linear Approximations over Finite Abelian Groups
Z Niu, S Sun, H Yan, Q Wang
Cryptology ePrint Archive, 2023
2023
New Observation on Division Property: Simplifying Models of Basic Operations and Modeling Modular Multiplication Operation
Y Xing, H Yan, X Lai
Proceedings of the 2nd International Conference on Computer Science and …, 2018
2018
Length-Preserving Encryption Based on Single-Key Tweakable Block Cipher
X Zhang, Y Shen, H Yan, Y Zou, M Wan, Z Wu, L Wang
Provable Security: 12th International Conference, ProvSec 2018, Jeju, South …, 2018
2018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20