|
Search the dblp DataBase
Hongbo Yu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang
The Second-Preimage Attack on MD4. [Citation Graph (0, 0)][DBLP] CANS, 2005, pp:1-12 [Conf]
- Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin
Efficient Collision Search Attacks on SHA-0. [Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:1-16 [Conf]
- Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu
Finding Collisions in the Full SHA-1. [Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:17-36 [Conf]
- Xiaoyun Wang, Hongbo Yu
How to Break MD5 and Other Hash Functions. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:19-35 [Conf]
- Hongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park
Cryptanalysis of the Full HAVAL with 4 and 5 Passes. [Citation Graph (0, 0)][DBLP] FSE, 2006, pp:89-110 [Conf]
- Hongbo Yu, Xiaoyun Wang
Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:206-226 [Conf]
Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256. [Citation Graph (, )][DBLP]
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. [Citation Graph (, )][DBLP]
Precise analysis of hydraulic press performance based on rough set. [Citation Graph (, )][DBLP]
Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|