Xiaoyun Wang
Orcid: 0000-0002-7846-269XAffiliations:
- Shandong University, Key Laboratory of Cryptologic Technology and Information Security, China
- Tsinghua University, Institute for Advanced Study, Beijing, China
According to our database1,
Xiaoyun Wang
authored at least 163 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
Multistatic Integrated Sensing and Communication System Based on Macro-Micro Cooperation.
Sensors, April, 2024
Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Accelerating BGV Bootstrapping for Large p Using Null Polynomials Over ℤ<sub>p<sup>e</sup></sub>.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Have You Merged My Model? On The Robustness of Large Language Model IP Protection Methods Against Model Merging.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024
Proceedings of the IEEE International Conference on Communications Workshops, 2024
Proceedings of the Nineteenth European Conference on Computer Systems, 2024
Accelerating BGV Bootstrapping for Large p Using Null Polynomials over $\mathbb {Z}_{p^e}$.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
2023
Automatic Search of Meet-in-the-Middle Differential Fault Analysis on AES-like Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Cryptol. ePrint Arch., 2023
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks.
IACR Cryptol. ePrint Arch., 2023
Weak-Diffusion Structure: Meet-in-the-Middle Attacks on Sponge-based Hashing Revisited.
IACR Cryptol. ePrint Arch., 2023
Fast and Accurate: Efficient Full-Domain Functional Bootstrap and Digit Decomposition for Homomorphic Computation.
IACR Cryptol. ePrint Arch., 2023
Exploiting the Symmetry of ℤ<sup>n</sup>: Randomization and the Automorphism Problem.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
CoRR, 2023
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2023
Exploiting the Symmetry of $\mathbb {Z}^n$: Randomization and the Automorphism Problem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
Impact of Errors in Environmental Correction on Gravity Field Recovery Using Interferometric Radar Altimeter Observations.
Remote. Sens., December, 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022
2021
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny.
IACR Trans. Symmetric Cryptol., 2021
J. Real Time Image Process., 2021
IACR Cryptol. ePrint Arch., 2021
Automatic Classical and Quantum Rebound Attacks on AES-like Hashing by Exploiting Related-key Differentials.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks.
IACR Cryptol. ePrint Arch., 2021
Error estimation of practical convolution discrete Gaussian sampling with rejection sampling.
Sci. China Inf. Sci., 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
x-only coordinate: with application to secp256k1 " >Chosen base-point side-channel attack on Montgomery ladder with <i>x</i>-only coordinate: with application to secp256k1.
IET Inf. Secur., 2020
Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
2019
IACR Trans. Symmetric Cryptol., 2019
An EOG-Based Human-Machine Interface to Control a Smart Home Environment for Patients With Severe Spinal Cord Injuries.
IEEE Trans. Biomed. Eng., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications.
IACR Cryptol. ePrint Arch., 2019
Des. Codes Cryptogr., 2019
Sci. China Inf. Sci., 2019
Sci. China Inf. Sci., 2019
Proceedings of the 27th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2019
2018
Secur. Commun. Networks, 2018
Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key-Guessing Techniques.
Secur. Commun. Networks, 2018
MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
CoRR, 2018
CoRR, 2018
Sci. China Inf. Sci., 2018
Improved automatic search of impossible differentials for camellia with <i>FL</i>/<i>FL</i> <sup>-1</sup> layers.
Sci. China Inf. Sci., 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the Advanced Computer Architecture - 12th Conference, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
3-D-MIMO With Massive Antennas Paves the Way to 5G Enhanced Mobile Broadband: From System Design to Field Trials.
IEEE J. Sel. Areas Commun., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the 13th International Conference on Network and Service Management, 2017
2016
Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes.
IACR Trans. Symmetric Cryptol., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Information Security Practice and Experience, 2016
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IET Inf. Secur., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
Proceedings of the Topics in Cryptology, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
New transference theorems on lattices possessing n<sup>∈</sup>-unique shortest vectors.
Discret. Math., 2014
Appl. Math. Comput., 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
A study on monoamine neurotransmitters in ovariectomized female rats with different Chinese herbs treatment.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014
Regional homogeneity change in female depressive patients after abdominal acupuncture treatment.
Proceedings of the 2014 IEEE International Conference on Bioinformatics and Biomedicine, 2014
2013
IEEE Trans. Circuits Syst. II Express Briefs, 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Appl. Math. Comput., 2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
IACR Cryptol. ePrint Arch., 2012
New Transference Theorems on Lattices Possessing n<sup>ε</sup>-unique Shortest Vectors.
IACR Cryptol. ePrint Arch., 2012
Comput. Electr. Eng., 2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IACR Cryptol. ePrint Arch., 2010
Sci. China Inf. Sci., 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Information Security and Cryptology, 2007
Proceedings of the Information Security and Cryptology, 2007
Proceedings of the Computer Mathematics, 8th Asian Symposium, 2007
2006
J. Comput. Sci. Technol., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
2005
An efficient proxy signature scheme in home network DRM.
Proceedings of the ICETE 2005, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
2004
Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1.
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
2000
Proceedings of the Public Key Cryptography, 2000