Yi LU
TitreCitée parAnnée
Faster Correlation Attack on Bluetooth Keystream Generator E0
Y Lu, S Vaudenay
Advances in Cryptology - CRYPTO 2004 3152, 407-425, 2004
932004
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Y Lu, S Vaudenay
Advances in Cryptology - CRYPTO 2005 3621, 97-117, 2005
922005
Cryptanalysis of Bluetooth Keystream Generator Two-level E0
Y Lu, S Vaudenay
Advances in Cryptology - ASIACRYPT 2004 3329, 483-499, 2004
452004
A classical introduction to cryptography exercise book
T Baignères, P Junod, Y Lu, J Monnerat, S Vaudenay
Springer-Verlag New York Inc, 2006
222006
Cryptanalysis of Rabbit
Y Lu, H Wang, S Ling
International Conference on Information Security - ISC 2008 5222, 204-214, 2008
162008
Cryptanalysis of an E0-like Combiner with Memory
Y Lu, S Vaudenay
Journal of Cryptology 21 (3), 430-457, 2008
132008
Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing
Y Lu, Y Desmedt
http://eprint.iacr.org/2016/419, 2016
8*2016
Walsh transforms and cryptographic applications in bias computing
Y Lu, Y Desmedt
Cryptography and Communications 8 (3), 435-453, 2015
82015
Applied stream ciphers in mobile communications
Y Lu
EPFL, 2006
72006
Improved Distinguishing Attack on Rabbit
Y Lu, Y Desmedt
International Conference on Information Security - ISC 2010 6531, 17-23, 2011
52011
Walsh Sampling with Incomplete Noisy Signals
Y LU
http://arxiv.org/abs/1602.00095, 2016
42016
Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher
Y Lu, Y Desmedt
International Conference on Information Security and Cryptology - ICISC 2010 …, 2011
42011
Practical Tera-scale Walsh-Hadamard Transform
Y Lu
Future Technologies Conference - FTC 2016, San Francisco, 6 - 7 Dec., IEEE …, 2017
32017
New Results on the DMC Capacity and Renyi’s Divergence
Y Lu
https://sites.google.com/site/yilusite/yilu_capacity_report.pdf, 2017
22017
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit
Y Lu, S Vaudenay, W Meier, L Ding, J Jiang
International Conference on Information Security and Cryptology - ICISC 2011 …, 2012
22012
Synthetic Linear Analysis with Applications to CubeHash and Rabbit
Y Lu, S Vaudenay, W Meier
Cryptography and Communications 4 (3), 259-276, 2012
22012
Sampling with Walsh Transforms
Y LU
http://arxiv.org/abs/1502.06221, 2015
12015
Privacy-Preserving Location Assurance Protocols for Mobile Applications.
G Wu, Y He, Y Lu, L Ding
JSW 9 (8), 1991-2001, 2014
12014
Efficient Interval Check in the Presence of Malicious Adversaries.
G Wu, Y He, Y Lu, L Ding
IACR Cryptology ePrint Archive 2014, 690, 2014
12014
Improved Davies-Murphy's Attack on DES Revisited
Y Lu, Y Desmedt
International Symposium on Foundations and Practice of Security - FPS 2013 …, 2014
12014
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20