Hailun Yan

Orcid: 0000-0002-0592-6772

According to our database1, Hailun Yan authored at least 18 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Security-Enhanced Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks.
IEEE Internet Things J., April, 2024

2023
New cryptanalysis of LowMC with algebraic techniques.
Des. Codes Cryptogr., May, 2023

Optimal Symmetric Ratcheting for Secure Communication.
Comput. J., April, 2023

General Results of Linear Approximations over Finite Abelian Groups.
IACR Cryptol. ePrint Arch., 2023

2022
XMSS-SM3 and MT-XMSS-SM3: Instantiating Extended Merkle Signature Schemes with SM3.
IACR Cryptol. ePrint Arch., 2022

LMS-SM3 and HSS-SM3: Instantiating Hash-based Post-Quantum Signature Schemes with SM3.
IACR Cryptol. ePrint Arch., 2022

Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing.
IACR Cryptol. ePrint Arch., 2022

BERT-Enhanced with Context-Aware Embedding for Instance Segmentation in 3D Point Clouds.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2022

2021
New Attacks on LowMC instances with a Single Plaintext/Ciphertext pair.
IACR Cryptol. ePrint Arch., 2021

Secure key-alternating Feistel ciphers without key schedule.
Sci. China Inf. Sci., 2021

2020
Symmetric Asynchronous Ratcheted Communication with Associated Data.
Proceedings of the Advances in Information and Computer Security, 2020

Tweaking Key-Alternating Feistel Block Ciphers.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
New zero-sum distinguishers on full 24-round Keccak-f using the division property.
IET Inf. Secur., 2019

New observation on the key schedule of RECTANGLE.
Sci. China Inf. Sci., 2019

2018
Security Evaluation and Improvement of a White-Box SMS4 Implementation Based on Affine Equivalence Algorithm.
Comput. J., 2018

Length-Preserving Encryption Based on Single-Key Tweakable Block Cipher.
Proceedings of the Provable Security, 2018

New Observation on Division Property: Simplifying Models of Basic Operations and Modeling Modular Multiplication Operation.
Proceedings of the 2nd International Conference on Computer Science and Application Engineering, 2018

2016
Transposition of AES Key Schedule.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016


  Loading...