关注
Yiqun Lisa Yin
Yiqun Lisa Yin
Independent Security Consultant
在 alum.mit.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Finding collisions in the full SHA-1
X Wang, YL Yin, H Yu
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
21412005
The RC6TM block cipher
RL Rivest, MJB Robshaw, R Sidney, YL Yin
First advanced encryption standard (AES) conference, 16, 1998
7151998
Efficient collision search attacks on SHA-0
X Wang, H Yu, YL Yin
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
5612005
Securing binding update using address based keys
J Kempf, C Gentry, A Silverberg, A Desai, S Okazaki, Y Yin
US Patent App. 10/364,289, 2003
3072003
Secure user identification based on constrained polynomials
J Hoffstein, BS Kaliski Jr, DB Lieman, MJB Robshaw, YL Yin
US Patent 6,076,163, 2000
3032000
Enhanced block ciphers with data-dependent rotations
RL Rivest, MJB Robshaw, RM Sidney, YL Yin
US Patent 6,269,163, 2001
2962001
Efficient finite field multiplication in normal basis
YL Yin, P Ning
US Patent 6,389,442, 2002
2412002
Efficient methods for integrating traceability and broadcast encryption
E Gafni, J Staddon, YL Yin
Annual International Cryptology Conference, 372-387, 1999
1621999
On differential and linear cryptanalysis of the RC5 encryption algorithm
BS Kaliski Jr, YL Yin
Annual international cryptology conference, 171-184, 1995
1481995
Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
S Contini, YL Yin
AsiaCrypt 2006, 37-53, 2006
1432006
The MD6 hash function–a proposal to NIST for SHA-3
RL Rivest, B Agre, DV Bailey, C Crutchfield, Y Dodis, KE Fleming, A Khan, ...
Submission to NIST 2 (3), 1-234, 2008
120*2008
Design and analysis of password-based key derivation functions
FF Yao, YL Yin
Topics in Cryptology–CT-RSA 2005: The Cryptographers’ Track at the RSA …, 2005
1032005
Collision search attacks on SHA1
X Wang, YL Yin, H Yu
Feb, 2005
982005
The security of the RC6 block cipher
S Contini, RL Rivest, MJB Robshaw, YL Yin
v1. 0. Available at www. rsa. com/rsalabs/aes/. Google Scholar, 1998
98*1998
Optimal constructions of hybrid algorithms
MY Kao, Y Ma, M Sipser, Y Yin
Journal of Algorithms 29 (1), 142-164, 1998
951998
On the security of the RC5 encryption algorithm
BS Kaliski, YL Yin
RSA Laboratories Technical Report TR-602. To appear, 1998
911998
Elliptic curve cryptosystems
MJB Robshaw, YL Yin
RSA Laboratories Technical Report, 1997
781997
A practice-oriented treatment of pseudorandom number generators
A Desai, A Hevia, YL Yin
International Conference on the Theory and Applications of Cryptographic …, 2002
692002
Efficient software implementation for finite field multiplication in normal basis
P Ning, YL Yin
International Conference on Information and Communications Security, 177-188, 2001
632001
Systems, methods, and devices for implementing a smart contract on a distributed ledger technology platform
M Smith, A Vijayaraghavan, E Wagner, Y Yin
US Patent 10,476,847, 2019
612019
系统目前无法执行此操作,请稍后再试。
文章 1–20