|
Search the dblp DataBase
Yiqun Lisa Yin:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
A Traitor Tracing Scheme Based on RSA for Fast Decryption. [Citation Graph (0, 0)][DBLP] ACNS, 2005, pp:56-74 [Conf]
- Ronald L. Rivest, Matthew J. B. Robshaw, Yiqun Lisa Yin
RC6 as the AES. [Citation Graph (0, 0)][DBLP] AES Candidate Conference, 2000, pp:337-342 [Conf]
- Scott Contini, Yiqun Lisa Yin
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2006, pp:37-53 [Conf]
- Yiqun Lisa Yin
Reducing the Number of Queries in Self-Directed Learning. [Citation Graph (0, 0)][DBLP] COLT, 1995, pp:128-135 [Conf]
- Ronald L. Rivest, Yiqun Lisa Yin
Being Taught can be Faster than Asking Questions. [Citation Graph (0, 0)][DBLP] COLT, 1995, pp:144-151 [Conf]
- Eli Gafni, Jessica Staddon, Yiqun Lisa Yin
Efficient Methods for Integrating Traceability and Broadcast Encryption. [Citation Graph (0, 0)][DBLP] CRYPTO, 1999, pp:372-387 [Conf]
- Burton S. Kaliski Jr., Yiqun Lisa Yin
On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm. [Citation Graph (0, 0)][DBLP] CRYPTO, 1995, pp:171-184 [Conf]
- Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin
Efficient Collision Search Attacks on SHA-0. [Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:1-16 [Conf]
- Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu
Finding Collisions in the Full SHA-1. [Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:17-36 [Conf]
- Michael Szydlo, Yiqun Lisa Yin
Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing. [Citation Graph (0, 0)][DBLP] CT-RSA, 2006, pp:99-114 [Conf]
- Frances F. Yao, Yiqun Lisa Yin
Design and Analysis of Password-Based Key Derivation Functions. [Citation Graph (0, 0)][DBLP] CT-RSA, 2005, pp:245-261 [Conf]
- Anand Desai, Alejandro Hevia, Yiqun Lisa Yin
A Practice-Oriented Treatment of Pseudorandom Number Generators. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2002, pp:368-383 [Conf]
- Scott Contini, Ronald L. Rivest, Matthew J. B. Robshaw, Yiqun Lisa Yin
Improved Analysis of Some Simplified Variants of RC6. [Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1999, pp:1-15 [Conf]
- Scott Contini, Yiqun Lisa Yin
Fast Software-Based Attacks on SecurID. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:454-471 [Conf]
- Peng Ning, Yiqun Lisa Yin
Efficient Software Implementation for Finite Field Multiplication in Normal Basis. [Citation Graph (0, 0)][DBLP] ICICS, 2001, pp:177-188 [Conf]
- Ruby B. Lee, Zhijie Shi, Yiqun Lisa Yin, Ronald L. Rivest, Matthew J. B. Robshaw
On Permutation Operations in Cipher Design. [Citation Graph (0, 0)][DBLP] ITCC (2), 2004, pp:569-577 [Conf]
- Burton S. Kaliski Jr., Yiqun Lisa Yin
Storage-Efficient Finite Field Basis Conversion. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1998, pp:81-93 [Conf]
- Yiqun Lisa Yin
On the Development of the Advanced Encryption Standard. [Citation Graph (0, 0)][DBLP] SEC, 2000, pp:503-504 [Conf]
- Ming-Yang Kao, Yuan Ma, Michael Sipser, Yiqun Lisa Yin
Optimal Constructions of Hybrid Algorithms. [Citation Graph (0, 0)][DBLP] SODA, 1994, pp:372-381 [Conf]
- Ming-Yang Kao, Yuan Ma, Michael Sipser, Yiqun Lisa Yin
Optimal Constructions of Hybrid Algorithms [Citation Graph (0, 0)][DBLP] CoRR, 2001, v:0, n:, pp:- [Journal]
- Ming-Yang Kao, Yuan Ma, Michael Sipser, Yiqun Lisa Yin
Optimal Constructions of Hybrid Algorithms. [Citation Graph (0, 0)][DBLP] J. Algorithms, 1998, v:29, n:1, pp:142-164 [Journal]
- Yongxi Cheng, Xi Chen, Yiqun Lisa Yin
On searching a table consistent with division poset. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2007, v:370, n:1-3, pp:240-253 [Journal]
- Frances F. Yao, Yiqun Lisa Yin
Design and Analysis of Password-Based Key Derivation Functions. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2005, v:51, n:9, pp:3292-3297 [Journal]
- Yongxi Cheng, Xiaoming Sun, Yiqun Lisa Yin
Searching Monotone Multi-dimensional Arrays [Citation Graph (0, 0)][DBLP] CoRR, 2005, v:0, n:, pp:- [Journal]
Looking Back at a New Hash Function. [Citation Graph (, )][DBLP]
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. [Citation Graph (, )][DBLP]
On Searching a Table Consistent with Division Poset [Citation Graph (, )][DBLP]
Searching monotone multi-dimensional arrays. [Citation Graph (, )][DBLP]
Search in 0.040secs, Finished in 0.042secs
|