Yiqun Lisa Yin
Yiqun Lisa Yin
Independent Security Consultant
Verified email at alum.mit.edu
Title
Cited by
Cited by
Year
Finding collisions in the full SHA-1
X Wang, YL Yin, H Yu
Annual international cryptology conference, 17-36, 2005
18842005
The RC6 block cipher
RL Rivest, MJB Robshaw, R Sidney, YL Yin
in First Advanced Encryption Standard (AES) Conference, 1998
6161998
Efficient collision search attacks on SHA-0
X Wang, H Yu, YL Yin
Annual International Cryptology Conference, 1-16, 2005
5142005
Enhanced block ciphers with data-dependent rotations
RL Rivest, MJB Robshaw, RM Sidney, YL Yin
US Patent 6,269,163, 2001
2712001
Secure user identification based on constrained polynomials
J Hoffstein, BS Kaliski Jr, DB Lieman, MJB Robshaw, YL Yin
US Patent 6,076,163, 2000
2692000
Securing binding update using address based keys
J Kempf, C Gentry, A Silverberg, A Desai, S Okazaki, Y Yin
US Patent App. 10/364,289, 2003
2322003
Efficient finite field multiplication in normal basis
YL Yin, P Ning
US Patent 6,389,442, 2002
2172002
Efficient methods for integrating traceability and broadcast encryption
E Gafni, J Staddon, YL Yin
Annual International Cryptology Conference, 372-387, 1999
1531999
On differential and linear cryptanalysis of the RC5 encryption algorithm
BS Kaliski, YL Yin
Annual International Cryptology Conference, 171-184, 1995
1351995
Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
S Contini, YL Yin
AsiaCrypt 2006, 37-53, 2006
1342006
The MD6 hash function–a proposal to NIST for SHA-3
RL Rivest, B Agre, DV Bailey, C Crutchfield, Y Dodis, KE Fleming, A Khan, ...
Submission to NIST 2 (3), 1-234, 2008
103*2008
Collision search attacks on SHA1
X Wang, YL Yin, H Yu
Feb, 2005
892005
Elliptic curve cryptosystems
MJB Robshaw, YL Yin
RSA Laboratories Technical Report, 1997
861997
The security of the RC6 block cipher
S Contini, RL Rivest, MJB Robshaw, YL Yin
NIST AES SUBMISSION, 1998
85*1998
On the security of the RC5 encryption algorithm
BS Kaliski, YL Yin
RSA Laboratories Technical Report TR-602. To appear, 1998
811998
Optimal constructions of hybrid algorithms
MY Kao, Y Ma, M Sipser, Y Yin
Journal of Algorithms 29 (1), 142-164, 1998
791998
Design and analysis of password-based key derivation functions
FF Yao, YL Yin
Cryptographers’ Track at the RSA Conference, 245-261, 2005
762005
Efficient software implementation for finite field multiplication in normal basis
P Ning, YL Yin
International Conference on Information and Communications Security, 177-188, 2001
592001
A practice-oriented treatment of pseudorandom number generators
A Desai, A Hevia, YL Yin
International Conference on the Theory and Applications of Cryptographic …, 2002
572002
On permutation operations in cipher design
RB Lee, ZJ Shi, YL Yin, RL Rivest, MJB Robshaw
International Conference on Information Technology: Coding and Computing …, 2004
442004
The system can't perform the operation now. Try again later.
Articles 1–20