Yi Lu

Affiliations:
  • Selmer Center for Secure and Reliable Communications, UiB
  • National Research Center of Fundamental Software, Chinese Academy of Sciences
  • École Polytechnique Fédérale de Lausanne (EPFL)


According to our database1, Yi Lu authored at least 20 papers between 2004 and 2017.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
New Linear Attacks on Block Cipher GOST.
IACR Cryptol. ePrint Arch., 2017

2016
Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing.
IACR Cryptol. ePrint Arch., 2016

Practical Tera-scale Walsh-Hadamard Transform.
CoRR, 2016

Walsh Sampling with Incomplete Noisy Signals.
CoRR, 2016

Walsh transforms and cryptographic applications in bias computing.
Cryptogr. Commun., 2016

2015
Sampling with Walsh Transforms.
CoRR, 2015

2014
Privacy-Preserving Location Assurance Protocols for Mobile Applications.
J. Softw., 2014

Efficient Interval Check in the Presence of Malicious Adversaries.
IACR Cryptol. ePrint Arch., 2014

2013
Improved Davies-Murphy's Attack on DES Revisited.
Proceedings of the Foundations and Practice of Security - 6th International Symposium, 2013

2012
Synthetic linear analysis with applications to CubeHash and Rabbit.
Cryptogr. Commun., 2012

Improved Linear Analysis on Block Cipher MULTI2.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2011
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2010
Improved Distinguishing Attack on Rabbit.
Proceedings of the Information Security - 13th International Conference, 2010

Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

2008
Cryptanalysis of an E0-like Combiner with Memory.
J. Cryptol., 2008

Cryptanalysis of Rabbit.
Proceedings of the Information Security, 11th International Conference, 2008

2006
A classical introduction to cryptography exercise book.
Springer, ISBN: 978-0-387-27934-3, 2006

2005
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption.
Proceedings of the Advances in Cryptology, 2005

2004
Faster Correlation Attack on Bluetooth Keystream Generator E0.
Proceedings of the Advances in Cryptology, 2004

Cryptanalysis of Bluetooth Keystream Generator Two-Level E0.
Proceedings of the Advances in Cryptology, 2004


  Loading...