Finding collisions in the full SHA-1 X Wang, YL Yin, H Yu Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005 | 2141 | 2005 |
The RC6TM block cipher RL Rivest, MJB Robshaw, R Sidney, YL Yin First advanced encryption standard (AES) conference, 16, 1998 | 715 | 1998 |
Efficient collision search attacks on SHA-0 X Wang, H Yu, YL Yin Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005 | 561 | 2005 |
Securing binding update using address based keys J Kempf, C Gentry, A Silverberg, A Desai, S Okazaki, Y Yin US Patent App. 10/364,289, 2003 | 307 | 2003 |
Secure user identification based on constrained polynomials J Hoffstein, BS Kaliski Jr, DB Lieman, MJB Robshaw, YL Yin US Patent 6,076,163, 2000 | 303 | 2000 |
Enhanced block ciphers with data-dependent rotations RL Rivest, MJB Robshaw, RM Sidney, YL Yin US Patent 6,269,163, 2001 | 296 | 2001 |
Efficient finite field multiplication in normal basis YL Yin, P Ning US Patent 6,389,442, 2002 | 241 | 2002 |
Efficient methods for integrating traceability and broadcast encryption E Gafni, J Staddon, YL Yin Annual International Cryptology Conference, 372-387, 1999 | 162 | 1999 |
On differential and linear cryptanalysis of the RC5 encryption algorithm BS Kaliski Jr, YL Yin Annual international cryptology conference, 171-184, 1995 | 148 | 1995 |
Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions S Contini, YL Yin AsiaCrypt 2006, 37-53, 2006 | 143 | 2006 |
The MD6 hash function–a proposal to NIST for SHA-3 RL Rivest, B Agre, DV Bailey, C Crutchfield, Y Dodis, KE Fleming, A Khan, ... Submission to NIST 2 (3), 1-234, 2008 | 120* | 2008 |
Design and analysis of password-based key derivation functions FF Yao, YL Yin Topics in Cryptology–CT-RSA 2005: The Cryptographers’ Track at the RSA …, 2005 | 103 | 2005 |
Collision search attacks on SHA1 X Wang, YL Yin, H Yu Feb, 2005 | 98 | 2005 |
The security of the RC6 block cipher S Contini, RL Rivest, MJB Robshaw, YL Yin v1. 0. Available at www. rsa. com/rsalabs/aes/. Google Scholar, 1998 | 98* | 1998 |
Optimal constructions of hybrid algorithms MY Kao, Y Ma, M Sipser, Y Yin Journal of Algorithms 29 (1), 142-164, 1998 | 95 | 1998 |
On the security of the RC5 encryption algorithm BS Kaliski, YL Yin RSA Laboratories Technical Report TR-602. To appear, 1998 | 91 | 1998 |
Elliptic curve cryptosystems MJB Robshaw, YL Yin RSA Laboratories Technical Report, 1997 | 78 | 1997 |
A practice-oriented treatment of pseudorandom number generators A Desai, A Hevia, YL Yin International Conference on the Theory and Applications of Cryptographic …, 2002 | 69 | 2002 |
Efficient software implementation for finite field multiplication in normal basis P Ning, YL Yin International Conference on Information and Communications Security, 177-188, 2001 | 63 | 2001 |
Systems, methods, and devices for implementing a smart contract on a distributed ledger technology platform M Smith, A Vijayaraghavan, E Wagner, Y Yin US Patent 10,476,847, 2019 | 61 | 2019 |