NOTES

Photo Gallery

VIDEOS

You are now here Home > Academics > Professors >

SE:Xuyun Nie

published: 2015-11-27 22:42:35       hits: 

name : Xuyun Nie Gender: Male phone: 13541070970
email: xynie@uestc.edu.cn office-address: Main Building, 428, Shahe
major: Cryptography
research interst Multivariate public key cryptography, Security in cloud computing
Biography Ph.D. September 2004 to July 2007. Gradate University of Chinese Academy of Sciences, Beijing, P.R. China. Major in Information Security
My dissertation:Multivariate Public Key Cryptosystems and Their Algebraic Attacks (in Chinese)
M.S. September 2001 to July 2004. School of Mathematic, Capital Normal University, Beijing, P.R. China. Major in Group Theory and its Applications
Teaching Schedule Finite Field and its application
SELECTED PUBLICATIONS [1]Xuyun Nie, Zhaohu Xu, Johannes Buchmann. Cryptanalysis of Hash-based Tamed Transformation and Minus Signature Scheme. PQcrypto 2013. LNCS 7932, pp. 155–164, Springer, 2013.
[2] Xunyun Nie, Albrecht Petzoldt, Johannes Buchmann. Cryptanalysis of 2-layer Nonlinear piece in hand method. MoCrySEn 2013, LNCS 8128, pp. 91–104, Springer, 2013.
 Xuyun Nie, Zhaohu Xu, Li Lu, and Yongjian Liao. Security Analysis of an Improved MFE Public Key Cryptosystem. The 10th International Conference on Cryptography and Network Security( CANS 2011), LNCS 7092, pp. 118–125, Springer 2011.
[3] Weiwei Cao, Xuyun Nie, Lei Hu, Xiling Tang and Jintai Ding. Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme. Lecture Notes in Computer Science, 2010, Volume 6061, Post-Quantum Cryptography, Pages 41-60.
[4] Xuyun Nie, Xin Jiang, Lei Hu, Jintai Ding, and Zhiguang Qin, “Breaking Instance II of New TTM Cryptosystems”, International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIH-MSP), IIH-MSP 2008, p 1332-1335, 2008.
[5] Xuyun Nie, Xin Jiang, Lei Hu, Jintai Ding, and Fengli Zhang, “Breaking Instance I of New TTM Cryptosystems”, International Conference on Communications, Circuits and Systems (ICCCSA), ICCCAS 2008, p 493-497, 2008.
[6] Jintai Ding,Lei Hu,Xuyun Nie,Jianyu Li and John Wagner, “High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems”, The International Workshop on Practice and Theory in Public Key Cryptography (PKC),  LNCS, Volume 4450, pp.233-248, Springer 2007.
[7] Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li and John Wagner, “Cryptanalysis of TRMC-4 Public Key Cryptosystem”, International Conference on Applied Cryptography and Network Security (ACNS), LNCS, Volume 4521, pp. 104–115, Springer 2007.
[8] Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove and Jintai Ding, “Breaking A New Instance of TTM Cryptosystem”, International Conference on Applied Cryptography and Network Security (ACNS),LNCS,volume 3989, Springer,2006.
[9] Zhiwei Wang, Xuyun Nie, Shihui Zheng, and Yixian Yang, “A New Construction of Multivariate Public key Encryption Scheme Through Internally Perturbed Plus”, International Conference on Computational Science and Its Applications (ICCSA), LNCS, volume 5073,PART 2, p 1-13. Springer 2008.