Follow
Yi LU
Title
Cited by
Cited by
Year
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Y Lu, S Vaudenay
Advances in Cryptology - CRYPTO 2005 3621, 97-117, 2005
1272005
Faster Correlation Attack on Bluetooth Keystream Generator E0
Y Lu, S Vaudenay
Advances in Cryptology - CRYPTO 2004 3152, 407-425, 2004
1232004
Cryptanalysis of Bluetooth Keystream Generator Two-level E0
Y Lu, S Vaudenay
Advances in Cryptology - ASIACRYPT 2004 3329, 483-499, 2004
552004
A classical introduction to cryptography exercise book
T Baignères, P Junod, Y Lu, J Monnerat, S Vaudenay
Springer-Verlag New York Inc, 2006
282006
Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing
Y Lu, Y Desmedt
http://eprint.iacr.org/2016/419, 2016
27*2016
Walsh transforms and cryptographic applications in bias computing
Y Lu, Y Desmedt
Cryptography and Communications 8 (3), 435-453, 2015
272015
Cryptanalysis of an E0-like Combiner with Memory
Y Lu, S Vaudenay
Journal of Cryptology 21 (3), 430-457, 2008
212008
Cryptanalysis of Rabbit
Y Lu, H Wang, S Ling
International Conference on Information Security - ISC 2008 5222, 204-214, 2008
202008
Applied stream ciphers in mobile communications
Y Lu
EPFL, 2006
92006
Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher
Y Lu, Y Desmedt
International Conference on Information Security and Cryptology - ICISC 2010 …, 2011
72011
Practical Tera-scale Walsh-Hadamard Transform
Y Lu
Future Technologies Conference - FTC 2016, San Francisco, 6 - 7 Dec., IEEE …, 2017
62017
Improved Distinguishing Attack on Rabbit
Y Lu, Y Desmedt
International Conference on Information Security - ISC 2010 6531, 17-23, 2011
52011
Walsh Sampling with Incomplete Noisy Signals
Y LU
http://arxiv.org/abs/1602.00095, 2016
42016
Improved Davies-Murphy's Attack on DES Revisited
Y Lu, Y Desmedt
International Symposium on Foundations and Practice of Security - FPS 2013 …, 2014
32014
New Results on the DMC Capacity and Renyi’s Divergence
Y Lu
https://sites.google.com/site/yilusite/yilu_capacity_report.pdf, 2017
22017
Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit
Y Lu, S Vaudenay, W Meier, L Ding, J Jiang
International Conference on Information Security and Cryptology - ICISC 2011 …, 2012
22012
Synthetic Linear Analysis with Applications to CubeHash and Rabbit
Y Lu, S Vaudenay, W Meier
Cryptography and Communications 4 (3), 259-276, 2012
22012
New Linear Attacks on Block Cipher GOST
Y Lu
http://eprint.iacr.org/2017/487, 2017
12017
Sampling with Walsh Transforms
Y LU
http://arxiv.org/abs/1502.06221, 2015
12015
Privacy-Preserving Location Assurance Protocols for Mobile Applications.
G Wu, Y He, Y Lu, L Ding
JSW 9 (8), 1991-2001, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–20