A unified method for finding impossible differentials of block cipher structures Y Luo, X Lai, Z Wu, G Gong Information Sciences 263, 211-220, 2014 | 100 | 2014 |
A lightweight stream cipher WG-7 for RFID encryption and authentication Y Luo, Q Chai, G Gong, X Lai 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010 | 92 | 2010 |
A conditional privacy-preserving certificateless aggregate signature scheme in the standard model for VANETs H Wang, L Wang, K Zhang, J Li, Y Luo IEEE Access 10, 15605-15618, 2022 | 43 | 2022 |
Pseudorandomness analysis of the (extended) Lai–Massey scheme Y Luo, X Lai, Z Gong Information processing letters 111 (2), 90-96, 2010 | 24 | 2010 |
Towards key-recovery-attack friendly distinguishers: application to GIFT-128 R Zong, X Dong, H Chen, Y Luo, S Wang, Z Li IACR Transactions on Symmetric Cryptology, 156-184, 2021 | 23 | 2021 |
Tag impersonation attack on two RFID mutual authentication protocols M Safkhani, N Bagheri, M Naderi, Y Luo, Q Chai 2011 Sixth International Conference on Availability, Reliability and …, 2011 | 18 | 2011 |
WG-7: a lightweight stream cipher with good cryptographic properties Y Luo, Q Chai, G Gong, X Lai IEEE Global Communications Conference–GLOBECOM, 1-6, 2010 | 17 | 2010 |
New quantum circuit implementations of SM4 and SM3 J Zou, L Li, Z Wei, Y Luo, Q Liu, W Wu Quantum Information Processing 21 (5), 181, 2022 | 16 | 2022 |
Impossible differential cryptanalysis of FOX Z Wu, X Lai, B Zhu, Y Luo Cryptology ePrint Archive, 2009 | 13 | 2009 |
A blockchain-based dynamic and traceable data integrity verification scheme for smart homes C Chen, L Wang, Y Long, Y Luo, K Chen Journal of Systems Architecture 130, 102677, 2022 | 11 | 2022 |
Improvements for finding impossible differentials of block cipher structures Y Luo, X Lai Security and Communication Networks 2017 (1), 5980251, 2017 | 10 | 2017 |
The Pseudorandomness of Many-Round Lai-Massey Scheme. Y Luo, X Lai, J Hu J. Inf. Sci. Eng. 31 (3), 1085-1096, 2015 | 10 | 2015 |
On the security of multivariate hash functions Y Luo, X Lai Journal of Shanghai Jiaotong University (Science) 14, 219-222, 2009 | 10 | 2009 |
Revisiting the indifferentiability of PGV hash functions Y Luo, Z Gong, M Duan, B Zhu, X Lai Cryptology ePrint Archive, 2009 | 10 | 2009 |
A lightweight certificateless aggregate ring signature scheme for privacy protection in smart grids H Wang, L Wang, M Wen, K Chen, Y Luo Wireless Personal Communications 126 (2), 1577-1599, 2022 | 9 | 2022 |
Improved cryptanalysis of the FOX block cipher Z Wu, Y Luo, X Lai, B Zhu International Conference on Trusted Systems, 236-249, 2009 | 8 | 2009 |
Generic attacks on the Lai–Massey scheme Y Luo, X Lai, Y Zhou Designs, Codes and Cryptography 83, 407-423, 2017 | 7 | 2017 |
A differential privacy budget allocation algorithm based on out-of-bag estimation in random forest X Li, B Qin, Y Luo, D Zheng Mathematics 10 (22), 4338, 2022 | 6 | 2022 |
Some efficient quantum circuit implementations of camellia J Zou, Z Wei, S Sun, Y Luo, Q Liu, W Wu Quantum Information Processing 21 (4), 131, 2022 | 6 | 2022 |
Attacks on a double length blockcipher-based hash proposal Y Luo, X Lai, T Jia Cryptography and communications 7, 289-295, 2015 | 6 | 2015 |