1. LNCS;X. Y. Wang,2005
2. Wang X Y, Yao A, Yao F. Cryptanalysis of SHA-1 Hash Function. Cryptographic Hash Workshop, Invited Report, 2005
3. Wang X Y, Yu H B, Wang W, et al. Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. In: Proceedings of EUROCRYPT 2009. Berlin: Springer-Verlag, 2009. 121–133
4. Yu H B, Wang X Y. Distinguishing attack on the secret-prefix MAC based on the 39-step SHA-256. In: Proceedings of ACISP 2009. Berlin: Springer-Verlag, 2009. 185–201
5. Zhang H N, Li L, Wang X Y. Fast correlation attack on stream cipher ABC v3. Sci China Ser F-Inf Sci, 2008, 51: 936–947.