Follow
Yiyuan Luo
Yiyuan Luo
School of Computer Science and Engineering, Huizhou University
Verified email at hzu.edu.cn - Homepage
Title
Cited by
Cited by
Year
A unified method for finding impossible differentials of block cipher structures
Y Luo, X Lai, Z Wu, G Gong
Information Sciences 263, 211-220, 2014
1002014
A lightweight stream cipher WG-7 for RFID encryption and authentication
Y Luo, Q Chai, G Gong, X Lai
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-6, 2010
922010
A conditional privacy-preserving certificateless aggregate signature scheme in the standard model for VANETs
H Wang, L Wang, K Zhang, J Li, Y Luo
IEEE Access 10, 15605-15618, 2022
432022
Pseudorandomness analysis of the (extended) Lai–Massey scheme
Y Luo, X Lai, Z Gong
Information processing letters 111 (2), 90-96, 2010
242010
Towards key-recovery-attack friendly distinguishers: application to GIFT-128
R Zong, X Dong, H Chen, Y Luo, S Wang, Z Li
IACR Transactions on Symmetric Cryptology, 156-184, 2021
232021
Tag impersonation attack on two RFID mutual authentication protocols
M Safkhani, N Bagheri, M Naderi, Y Luo, Q Chai
2011 Sixth International Conference on Availability, Reliability and …, 2011
182011
WG-7: a lightweight stream cipher with good cryptographic properties
Y Luo, Q Chai, G Gong, X Lai
IEEE Global Communications Conference–GLOBECOM, 1-6, 2010
172010
New quantum circuit implementations of SM4 and SM3
J Zou, L Li, Z Wei, Y Luo, Q Liu, W Wu
Quantum Information Processing 21 (5), 181, 2022
162022
Impossible differential cryptanalysis of FOX
Z Wu, X Lai, B Zhu, Y Luo
Cryptology ePrint Archive, 2009
132009
A blockchain-based dynamic and traceable data integrity verification scheme for smart homes
C Chen, L Wang, Y Long, Y Luo, K Chen
Journal of Systems Architecture 130, 102677, 2022
112022
Improvements for finding impossible differentials of block cipher structures
Y Luo, X Lai
Security and Communication Networks 2017 (1), 5980251, 2017
102017
The Pseudorandomness of Many-Round Lai-Massey Scheme.
Y Luo, X Lai, J Hu
J. Inf. Sci. Eng. 31 (3), 1085-1096, 2015
102015
On the security of multivariate hash functions
Y Luo, X Lai
Journal of Shanghai Jiaotong University (Science) 14, 219-222, 2009
102009
Revisiting the indifferentiability of PGV hash functions
Y Luo, Z Gong, M Duan, B Zhu, X Lai
Cryptology ePrint Archive, 2009
102009
A lightweight certificateless aggregate ring signature scheme for privacy protection in smart grids
H Wang, L Wang, M Wen, K Chen, Y Luo
Wireless Personal Communications 126 (2), 1577-1599, 2022
92022
Improved cryptanalysis of the FOX block cipher
Z Wu, Y Luo, X Lai, B Zhu
International Conference on Trusted Systems, 236-249, 2009
82009
Generic attacks on the Lai–Massey scheme
Y Luo, X Lai, Y Zhou
Designs, Codes and Cryptography 83, 407-423, 2017
72017
A differential privacy budget allocation algorithm based on out-of-bag estimation in random forest
X Li, B Qin, Y Luo, D Zheng
Mathematics 10 (22), 4338, 2022
62022
Some efficient quantum circuit implementations of camellia
J Zou, Z Wei, S Sun, Y Luo, Q Liu, W Wu
Quantum Information Processing 21 (4), 131, 2022
62022
Attacks on a double length blockcipher-based hash proposal
Y Luo, X Lai, T Jia
Cryptography and communications 7, 289-295, 2015
62015
The system can't perform the operation now. Try again later.
Articles 1–20