Seguir
Yiqun Lisa Yin
Yiqun Lisa Yin
Independent Security Consultant
Dirección de correo verificada de alum.mit.edu
Título
Citado por
Citado por
Año
Finding collisions in the full SHA-1
X Wang, YL Yin, H Yu
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
21582005
The RC6TM block cipher
RL Rivest, MJB Robshaw, R Sidney, YL Yin
First advanced encryption standard (AES) conference, 16, 1998
7181998
Efficient collision search attacks on SHA-0
X Wang, H Yu, YL Yin
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
5642005
Securing binding update using address based keys
J Kempf, C Gentry, A Silverberg, A Desai, S Okazaki, Y Yin
US Patent App. 10/364,289, 2003
3102003
Secure user identification based on constrained polynomials
J Hoffstein, BS Kaliski Jr, DB Lieman, MJB Robshaw, YL Yin
US Patent 6,076,163, 2000
3032000
Enhanced block ciphers with data-dependent rotations
RL Rivest, MJB Robshaw, RM Sidney, YL Yin
US Patent 6,269,163, 2001
2962001
Efficient finite field multiplication in normal basis
YL Yin, P Ning
US Patent 6,389,442, 2002
2412002
Efficient methods for integrating traceability and broadcast encryption
E Gafni, J Staddon, YL Yin
Annual International Cryptology Conference, 372-387, 1999
1631999
On differential and linear cryptanalysis of the RC5 encryption algorithm
BS Kaliski Jr, YL Yin
Annual international cryptology conference, 171-184, 1995
1491995
Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
S Contini, YL Yin
AsiaCrypt 2006, 37-53, 2006
1442006
The MD6 hash function–a proposal to NIST for SHA-3
RL Rivest, B Agre, DV Bailey, C Crutchfield, Y Dodis, KE Fleming, A Khan, ...
Submission to NIST 2 (3), 1-234, 2008
122*2008
Design and analysis of password-based key derivation functions
FF Yao, YL Yin
Topics in Cryptology–CT-RSA 2005: The Cryptographers’ Track at the RSA …, 2005
1052005
Collision search attacks on SHA1
X Wang, YL Yin, H Yu
Feb, 2005
992005
The security of the RC6 block cipher
S Contini, RL Rivest, MJB Robshaw, YL Yin
v1. 0. Available at www. rsa. com/rsalabs/aes/. Google Scholar, 1998
98*1998
Optimal constructions of hybrid algorithms
MY Kao, Y Ma, M Sipser, Y Yin
Journal of Algorithms 29 (1), 142-164, 1998
951998
On the security of the RC5 encryption algorithm
BS Kaliski, YL Yin
RSA Laboratories Technical Report TR-602. To appear, 1998
931998
Elliptic curve cryptosystems
MJB Robshaw, YL Yin
RSA Laboratories Technical Report, 1997
781997
A practice-oriented treatment of pseudorandom number generators
A Desai, A Hevia, YL Yin
International Conference on the Theory and Applications of Cryptographic …, 2002
692002
Advances in Cryptology-CRYPTO 2012-32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012
R Safavi-Naini, R Canetti
Proceedings 7417, 188-191, 2012
65*2012
Systems, methods, and devices for implementing a smart contract on a distributed ledger technology platform
M Smith, A Vijayaraghavan, E Wagner, Y Yin
US Patent 10,476,847, 2019
632019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20