The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption Y Lu, S Vaudenay Advances in Cryptology - CRYPTO 2005 3621, 97-117, 2005 | 126 | 2005 |
Faster Correlation Attack on Bluetooth Keystream Generator E0 Y Lu, S Vaudenay Advances in Cryptology - CRYPTO 2004 3152, 407-425, 2004 | 122 | 2004 |
Cryptanalysis of Bluetooth Keystream Generator Two-level E0 Y Lu, S Vaudenay Advances in Cryptology - ASIACRYPT 2004 3329, 483-499, 2004 | 58 | 2004 |
A classical introduction to cryptography exercise book T Baignères, P Junod, Y Lu, J Monnerat, S Vaudenay Springer-Verlag New York Inc, 2006 | 27 | 2006 |
Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing Y Lu, Y Desmedt http://eprint.iacr.org/2016/419, 2016 | 26* | 2016 |
Walsh transforms and cryptographic applications in bias computing Y Lu, Y Desmedt Cryptography and Communications 8 (3), 435-453, 2015 | 26 | 2015 |
Cryptanalysis of an E0-like Combiner with Memory Y Lu, S Vaudenay Journal of Cryptology 21 (3), 430-457, 2008 | 21 | 2008 |
Cryptanalysis of Rabbit Y Lu, H Wang, S Ling International Conference on Information Security - ISC 2008 5222, 204-214, 2008 | 20 | 2008 |
Applied stream ciphers in mobile communications Y Lu EPFL, 2006 | 9 | 2006 |
Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher Y Lu, Y Desmedt International Conference on Information Security and Cryptology - ICISC 2010 …, 2011 | 7 | 2011 |
Practical Tera-scale Walsh-Hadamard Transform Y Lu Future Technologies Conference - FTC 2016, San Francisco, 6 - 7 Dec., IEEE …, 2017 | 6 | 2017 |
Improved Distinguishing Attack on Rabbit Y Lu, Y Desmedt International Conference on Information Security - ISC 2010 6531, 17-23, 2011 | 5 | 2011 |
Walsh Sampling with Incomplete Noisy Signals Y LU http://arxiv.org/abs/1602.00095, 2016 | 4 | 2016 |
Improved Davies-Murphy's Attack on DES Revisited Y Lu, Y Desmedt International Symposium on Foundations and Practice of Security - FPS 2013 …, 2014 | 3 | 2014 |
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit Y Lu, S Vaudenay, W Meier, L Ding, J Jiang International Conference on Information Security and Cryptology - ICISC 2011 …, 2012 | 3 | 2012 |
New Results on the DMC Capacity and Renyi’s Divergence Y Lu https://sites.google.com/site/yilusite/yilu_capacity_report.pdf, 2017 | 2 | 2017 |
Synthetic Linear Analysis with Applications to CubeHash and Rabbit Y Lu, S Vaudenay, W Meier Cryptography and Communications 4 (3), 259-276, 2012 | 2 | 2012 |
New Linear Attacks on Block Cipher GOST Y Lu http://eprint.iacr.org/2017/487, 2017 | 1 | 2017 |
Sampling with Walsh Transforms Y LU http://arxiv.org/abs/1502.06221, 2015 | 1 | 2015 |
Privacy-Preserving Location Assurance Protocols for Mobile Applications. G Wu, Y He, Y Lu, L Ding JSW 9 (8), 1991-2001, 2014 | 1 | 2014 |