The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yiqun Lisa Yin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John Patrick McGregor, Yiqun Lisa Yin, Ruby B. Lee
    A Traitor Tracing Scheme Based on RSA for Fast Decryption. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:56-74 [Conf]
  2. Ronald L. Rivest, Matthew J. B. Robshaw, Yiqun Lisa Yin
    RC6 as the AES. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:337-342 [Conf]
  3. Scott Contini, Yiqun Lisa Yin
    Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:37-53 [Conf]
  4. Yiqun Lisa Yin
    Reducing the Number of Queries in Self-Directed Learning. [Citation Graph (0, 0)][DBLP]
    COLT, 1995, pp:128-135 [Conf]
  5. Ronald L. Rivest, Yiqun Lisa Yin
    Being Taught can be Faster than Asking Questions. [Citation Graph (0, 0)][DBLP]
    COLT, 1995, pp:144-151 [Conf]
  6. Eli Gafni, Jessica Staddon, Yiqun Lisa Yin
    Efficient Methods for Integrating Traceability and Broadcast Encryption. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:372-387 [Conf]
  7. Burton S. Kaliski Jr., Yiqun Lisa Yin
    On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:171-184 [Conf]
  8. Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin
    Efficient Collision Search Attacks on SHA-0. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:1-16 [Conf]
  9. Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu
    Finding Collisions in the Full SHA-1. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:17-36 [Conf]
  10. Michael Szydlo, Yiqun Lisa Yin
    Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:99-114 [Conf]
  11. Frances F. Yao, Yiqun Lisa Yin
    Design and Analysis of Password-Based Key Derivation Functions. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:245-261 [Conf]
  12. Anand Desai, Alejandro Hevia, Yiqun Lisa Yin
    A Practice-Oriented Treatment of Pseudorandom Number Generators. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:368-383 [Conf]
  13. Scott Contini, Ronald L. Rivest, Matthew J. B. Robshaw, Yiqun Lisa Yin
    Improved Analysis of Some Simplified Variants of RC6. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:1-15 [Conf]
  14. Scott Contini, Yiqun Lisa Yin
    Fast Software-Based Attacks on SecurID. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:454-471 [Conf]
  15. Peng Ning, Yiqun Lisa Yin
    Efficient Software Implementation for Finite Field Multiplication in Normal Basis. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:177-188 [Conf]
  16. Ruby B. Lee, Zhijie Shi, Yiqun Lisa Yin, Ronald L. Rivest, Matthew J. B. Robshaw
    On Permutation Operations in Cipher Design. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:569-577 [Conf]
  17. Burton S. Kaliski Jr., Yiqun Lisa Yin
    Storage-Efficient Finite Field Basis Conversion. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:81-93 [Conf]
  18. Yiqun Lisa Yin
    On the Development of the Advanced Encryption Standard. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:503-504 [Conf]
  19. Ming-Yang Kao, Yuan Ma, Michael Sipser, Yiqun Lisa Yin
    Optimal Constructions of Hybrid Algorithms. [Citation Graph (0, 0)][DBLP]
    SODA, 1994, pp:372-381 [Conf]
  20. Ming-Yang Kao, Yuan Ma, Michael Sipser, Yiqun Lisa Yin
    Optimal Constructions of Hybrid Algorithms [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  21. Ming-Yang Kao, Yuan Ma, Michael Sipser, Yiqun Lisa Yin
    Optimal Constructions of Hybrid Algorithms. [Citation Graph (0, 0)][DBLP]
    J. Algorithms, 1998, v:29, n:1, pp:142-164 [Journal]
  22. Yongxi Cheng, Xi Chen, Yiqun Lisa Yin
    On searching a table consistent with division poset. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2007, v:370, n:1-3, pp:240-253 [Journal]
  23. Frances F. Yao, Yiqun Lisa Yin
    Design and Analysis of Password-Based Key Derivation Functions. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2005, v:51, n:9, pp:3292-3297 [Journal]
  24. Yongxi Cheng, Xiaoming Sun, Yiqun Lisa Yin
    Searching Monotone Multi-dimensional Arrays [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]

  25. Looking Back at a New Hash Function. [Citation Graph (, )][DBLP]


  26. Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. [Citation Graph (, )][DBLP]


  27. On Searching a Table Consistent with Division Poset [Citation Graph (, )][DBLP]


  28. Searching monotone multi-dimensional arrays. [Citation Graph (, )][DBLP]


Search in 0.005secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002