Search results for: Xiaoyun Wang
Environmental Science and Pollution Research > 2017 > 24 > 2 > 1578-1587
Lecture Notes in Computer Science > Advances in Cryptology – EUROCRYPT 2005 > Cryptanalysis I > 19-35
Lecture Notes in Computer Science > Computer Mathematics > Cryptology > 322-322
SpringerPlus > 2016 > 5 > 1 > 1-11
Archives of Gynecology and Obstetrics > 2017 > 295 > 1 > 119-124
Meat Science > 2016 > 118 > C > 96-102
Regulatory Toxicology and Pharmacology > 2016 > 77 > C > 134-142
Multimedia Tools and Applications > 2017 > 76 > 7 > 9195-9218
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2007 > Hash Functions – I > 206-226
Lecture Notes in Computer Science > Information Security Practice and Experience > Hash Functions and MACs > 285-297
Lecture Notes in Computer Science > Advances in Cryptology - CRYPTO 2009 > Block-Cipher Cryptanalysis > 209-230
Lecture Notes in Computer Science > Fast Software Encryption > Message Authentication Codes > 363-374
Lecture Notes in Computer Science > Information Security and Privacy > Symmetric Key Cryptography > 16-33