


default search action
Yiyuan Luo
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Chun Guo, Yiyuan Luo
, Chenyu Xiao:
On the sequential indifferentiability of the Lai-Massey construction. Des. Codes Cryptogr. 92(6): 1637-1661 (2024) - [j22]Zhiyu Xu
, Liangliang Wang
, Yiyuan Luo
, Yu Long
, Kai Zhang
, Hailun Yan, Kefei Chen
:
A Security-Enhanced Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks. IEEE Internet Things J. 11(8): 13482-13495 (2024) - [j21]Jian Zou, Kairong Huang, Min Zhu, Hongkai Zou, Yiyuan Luo, Qian Liu:
New Demiric-Selçuk meet-in-the-middle attacks on Misty and Feistel schemes. Quantum Inf. Process. 23(4): 136 (2024) - [j20]Ping Zhang, Yiyuan Luo:
Breaking permutation-based pseudorandom cryptographic schemes using distributed exact quantum algorithms. Quantum Inf. Process. 23(6): 239 (2024) - 2023
- [j19]Hao Guo, Zhiyu Zhang, Qianqian Yang, Lei Hu, Yiyuan Luo:
A New Method To Find All The High-Probability Word-Oriented Truncated Differentials: Application To Midori, SKINNY And CRAFT. Comput. J. 66(5): 1069-1082 (2023) - [j18]Jiehui Nan
, Honggang Hu, Ping Zhang, Yiyuan Luo:
Quantum attacks against BBB secure PRFs or MACs built from public random permutations. Quantum Inf. Process. 22(1): 26 (2023) - [j17]Hongkai Zou, Jian Zou
, Yiyuan Luo:
New results on quantum boomerang attacks. Quantum Inf. Process. 22(4): 171 (2023) - [j16]Ping Zhang, Yiyuan Luo
:
Quantum key recovery attacks on tweakable Even-Mansour ciphers. Quantum Inf. Process. 22(9): 336 (2023) - [j15]Honggang Hu
, Bei Wang
, Xianhong Xie
, Yiyuan Luo
:
An Open Problem About Monomial Bent Functions. IEEE Trans. Inf. Theory 69(12): 8111-8115 (2023) - [c12]Tongxia Deng, Ping Li, Shunzhi Yang, Yupeng Zhang, Zheng Gong, Ming Duan, Yiyuan Luo:
A Deep-Learning Approach for Predicting Round Obfuscation in White-Box Block Ciphers. ACNS Workshops 2023: 419-438 - [c11]Bo Yu
, Tairong Shi, Xiaoyang Dong, Xuan Shen, Yiyuan Luo, Bing Sun:
Quantum Attacks: A View of Data Complexity on Offline Simon's Algorithm. Inscrypt (2) 2023: 329-342 - [c10]Wenzhe Gu
, Botao Feng
, Yiyuan Luo
, Jianchao Zheng
, Yun Lu
:
A Miniaturized Dual U-shaped Patch Antenna for WiFi-6E Applications. ICCNS 2023: 246-251 - 2022
- [j14]Huiwen Wang
, Liangliang Wang
, Kai Zhang
, Jinguo Li
, Yiyuan Luo
:
A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs. IEEE Access 10: 15605-15618 (2022) - [j13]Chunliang Chen
, Liangliang Wang
, Yu Long, Yiyuan Luo, Kefei Chen:
A blockchain-based dynamic and traceable data integrity verification scheme for smart homes. J. Syst. Archit. 130: 102677 (2022) - [j12]Jian Zou
, Zihao Wei, Siwei Sun, Yiyuan Luo, Qian Liu, Wenling Wu:
Some efficient quantum circuit implementations of Camellia. Quantum Inf. Process. 21(4): 131 (2022) - [j11]Jian Zou
, Liji Li, Zihao Wei, Yiyuan Luo, Qian Liu, Wenling Wu:
New quantum circuit implementations of SM4 and SM3. Quantum Inf. Process. 21(5): 181 (2022) - [j10]Huiwen Wang, Liangliang Wang
, Mi Wen, Kefei Chen, Yiyuan Luo:
A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids. Wirel. Pers. Commun. 126(2): 1577-1599 (2022) - 2021
- [j9]Rui Zong, Xiaoyang Dong, Huaifeng Chen, Yiyuan Luo, Si Wang, Zheng Li:
Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128. IACR Trans. Symmetric Cryptol. 2021(1): 156-184 (2021) - [c9]Baodong Qin, Xue Bai, Dong Zheng, Hui Cui, Yiyuan Luo:
Forward-Secure Revocable Identity-Based Encryption. ICICS (2) 2021: 321-340 - [i10]Honggang Hu, Bei Wang, Xianhong Xie, Yiyuan Luo:
Two Problems about Monomial Bent Functions. CoRR abs/2102.12304 (2021)
2010 – 2019
- 2019
- [j8]Hailun Yan, Yiyuan Luo, Mo Chen, Xuejia Lai:
New observation on the key schedule of RECTANGLE. Sci. China Inf. Sci. 62(3): 32108:1-32108:13 (2019) - 2017
- [j7]Yiyuan Luo, Xuejia Lai, Yujie Zhou:
Generic attacks on the Lai-Massey scheme. Des. Codes Cryptogr. 83(2): 407-423 (2017) - [j6]Yiyuan Luo
, Xuejia Lai:
Improvements for Finding Impossible Differentials of Block Cipher Structures. Secur. Commun. Networks 2017: 5980251:1-5980251:9 (2017) - [c8]Yiyuan Luo:
General attacks on compression functions based on key alternating ciphers. ICSAI 2017: 980-984 - [i9]Yiyuan Luo, Xuejia Lai:
Improvements for Finding Impossible Differentials of Block Cipher Structures. IACR Cryptol. ePrint Arch. 2017: 1209 (2017) - 2016
- [j5]Zheng Gong, Shusheng Liu, Yamin Wen, Yiyuan Luo, Weidong Qiu:
Biclique cryptanalysis using balanced complete bipartite subgraphs. Sci. China Inf. Sci. 59(4): 049101:1-049101:3 (2016) - [c7]Jing Hu, Yiyuan Luo:
A fuzzy min-max neural network with classification performance irrelevant to the input sequences of samples. ICSAI 2016: 393-398 - [c6]Yiyuan Luo:
A proposal for high rate double-block-length hash functions. ICSAI 2016: 797-802 - 2015
- [j4]Yiyuan Luo, Xuejia Lai, Tiejun Jia:
Attacks on a double length blockcipher-based hash proposal. Cryptogr. Commun. 7(3): 289-295 (2015) - [j3]Yiyuan Luo, Xuejia Lai, Jing Hu:
The Pseudorandomness of Many-Round Lai-Massey Scheme. J. Inf. Sci. Eng. 31(3): 1085-1096 (2015) - 2014
- [j2]Yiyuan Luo, Xuejia Lai, Zhongming Wu, Guang Gong:
A unified method for finding impossible differentials of block cipher structures. Inf. Sci. 263: 211-220 (2014) - 2013
- [c5]Xunjun Chen, Yuelong Zhu, Zheng Gong, Yiyuan Luo:
Cryptanalysis of the Lightweight Block Cipher Hummingbird-1. EIDWT 2013: 515-518 - [i8]Yiyuan Luo, Xuejia Lai:
Attacks on JH, Grstl and SMASH Hash Functions. IACR Cryptol. ePrint Arch. 2013: 233 (2013) - 2011
- [c4]Masoumeh Safkhani
, Nasour Bagheri
, Majid Naderi, Yiyuan Luo, Qi Chai:
Tag Impersonation Attack on Two RFID Mutual Authentication Protocols. ARES 2011: 581-584 - [c3]Yiyuan Luo, Xuejia Lai, Zheng Gong:
Indifferentiability of Domain Extension Modes for Hash Functions. INTRUST 2011: 138-155 - [i7]Yiyuan Luo, Xuejia Lai:
Attacks On a Double Length Blockcipher-based Hash Proposal. IACR Cryptol. ePrint Arch. 2011: 238 (2011) - 2010
- [j1]Yiyuan Luo, Xuejia Lai, Zheng Gong:
Pseudorandomness analysis of the (extended) Lai-Massey scheme. Inf. Process. Lett. 111(2): 90-96 (2010) - [c2]Yiyuan Luo, Qi Chai, Guang Gong, Xuejia Lai:
A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication. GLOBECOM 2010: 1-6 - [i6]Yiyuan Luo, Xuejia Lai:
More Insights on Blockcipher-Based Hash Functions. IACR Cryptol. ePrint Arch. 2010: 642 (2010)
2000 – 2009
- 2009
- [c1]Zhongming Wu, Yiyuan Luo, Xuejia Lai, Bo Zhu:
Improved Cryptanalysis of the FOX Block Cipher. INTRUST 2009: 236-249 - [i5]Yiyuan Luo, Zheng Gong, Ming Duan, Bo Zhu, Xuejia Lai:
Revisiting the Indifferentiability of PGV Hash Functions. IACR Cryptol. ePrint Arch. 2009: 265 (2009) - [i4]Yiyuan Luo, Xuejia Lai, Zheng Gong, Zhongming Wu:
Pseudorandomness Analysis of the Lai-Massey Scheme. IACR Cryptol. ePrint Arch. 2009: 266 (2009) - [i3]Zhongming Wu, Xuejia Lai, Bo Zhu, Yiyuan Luo:
Impossible Differential Cryptanalysis of FOX. IACR Cryptol. ePrint Arch. 2009: 357 (2009) - [i2]Yiyuan Luo, Zhongming Wu, Xuejia Lai, Guang Gong:
A Unified Method for Finding Impossible Differentials of Block Cipher Structures. IACR Cryptol. ePrint Arch. 2009: 627 (2009) - 2008
- [i1]Yiyuan Luo, Xuejia Lai:
Higher Order Differential Cryptanalysis of Multivariate Hash Functions. IACR Cryptol. ePrint Arch. 2008: 350 (2008)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint