Follow
Yiqun Lisa Yin
Yiqun Lisa Yin
Independent Security Consultant
Verified email at alum.mit.edu
Title
Cited by
Cited by
Year
Finding collisions in the full SHA-1
X Wang, YL Yin, H Yu
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
21262005
The RC6TM block cipher
RL Rivest, MJB Robshaw, R Sidney, YL Yin
First advanced encryption standard (AES) conference, 16, 1998
6991998
Efficient collision search attacks on SHA-0
X Wang, H Yu, YL Yin
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
5602005
Securing binding update using address based keys
J Kempf, C Gentry, A Silverberg, A Desai, S Okazaki, Y Yin
US Patent App. 10/364,289, 2003
3012003
Secure user identification based on constrained polynomials
J Hoffstein, BS Kaliski Jr, DB Lieman, MJB Robshaw, YL Yin
US Patent 6,076,163, 2000
3002000
Enhanced block ciphers with data-dependent rotations
RL Rivest, MJB Robshaw, RM Sidney, YL Yin
US Patent 6,269,163, 2001
2932001
Efficient finite field multiplication in normal basis
YL Yin, P Ning
US Patent 6,389,442, 2002
2382002
Efficient methods for integrating traceability and broadcast encryption
E Gafni, J Staddon, YL Yin
Annual International Cryptology Conference, 372-387, 1999
1611999
On differential and linear cryptanalysis of the RC5 encryption algorithm
BS Kaliski Jr, YL Yin
Annual international cryptology conference, 171-184, 1995
1471995
Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
S Contini, YL Yin
AsiaCrypt 2006, 37-53, 2006
1422006
The MD6 hash function–a proposal to NIST for SHA-3
RL Rivest, B Agre, DV Bailey, C Crutchfield, Y Dodis, KE Fleming, A Khan, ...
Submission to NIST 2 (3), 1-234, 2008
121*2008
Design and analysis of password-based key derivation functions
FF Yao, YL Yin
Topics in Cryptology–CT-RSA 2005: The Cryptographers’ Track at the RSA …, 2005
1012005
Collision search attacks on SHA1
X Wang, YL Yin, H Yu
Feb, 2005
982005
The security of the RC6 block cipher
S Contini, RL Rivest, MJB Robshaw, YL Yin
v1. 0. Available at www. rsa. com/rsalabs/aes/. Google Scholar, 1998
95*1998
Optimal constructions of hybrid algorithms
MY Kao, Y Ma, M Sipser, Y Yin
Journal of Algorithms 29 (1), 142-164, 1998
941998
On the security of the RC5 encryption algorithm
BS Kaliski, YL Yin
RSA Laboratories Technical Report TR-602. To appear, 1998
901998
Elliptic curve cryptosystems
MJB Robshaw, YL Yin
RSA Laboratories Technical Report, 1997
771997
A practice-oriented treatment of pseudorandom number generators
A Desai, A Hevia, YL Yin
International Conference on the Theory and Applications of Cryptographic …, 2002
672002
Efficient software implementation for finite field multiplication in normal basis
P Ning, YL Yin
International Conference on Information and Communications Security, 177-188, 2001
622001
On permutation operations in cipher design
RB Lee, ZJ Shi, YL Yin, RL Rivest, MJB Robshaw
International Conference on Information Technology: Coding and Computing …, 2004
542004
The system can't perform the operation now. Try again later.
Articles 1–20